| 2011 | 20th USENIX Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings |
| 2011 | A Study of Android Application Security. William Enck, Damien Octeau, Patrick D. McDaniel, Swarat Chaudhuri |
| 2011 | ADsafety: Type-Based Verification of JavaScript Sandboxing. Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi |
| 2011 | BOTMAGNIFIER: Locating Spambots on the Internet. Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna |
| 2011 | Bubble Trouble: Off-Line De-Anonymization of Bubble Forms. Joseph A. Calandrino, William Clarkson, Edward W. Felten |
| 2011 | Cloaking Malware with the Trusted Platform Module. Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel |
| 2011 | Comprehensive Experimental Analyses of Automotive Attack Surfaces. Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno |
| 2011 | Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar R. Weippl |
| 2011 | Detecting Malware Domains at the Upper DNS Hierarchy. Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou, David Dagon |
| 2011 | Differential Privacy Under Fire. Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan |
| 2011 | Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker |
| 2011 | Fast and Precise Sanitizer Analysis with BEK. Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes |
| 2011 | Faster Secure Two-Party Computation Using Garbled Circuits. Yan Huang, David Evans, Jonathan Katz, Lior Malka |
| 2011 | Forensic Triage for Mobile Phones with DEC0DE. Robert J. Walls, Erik G. Learned-Miller, Brian Neil Levine |
| 2011 | JACKSTRAWS: Picking Command and Control Connections from Bot Traffic. Grégoire Jacob, Ralf Hund, Christopher Kruegel, Thorsten Holz |
| 2011 | MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery. Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu, Dawn Song |
| 2011 | Measuring Pay-per-Install: The Commoditization of Malware Distribution. Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson |
| 2011 | Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade. Nektarios Leontiadis, Tyler Moore, Nicolas Christin |
| 2011 | Outsourcing the Decryption of ABE Ciphertexts. Matthew Green, Susan Hohenberger, Brent Waters |
| 2011 | PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval. Prateek Mittal, Femi G. Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg |
| 2011 | Permission Re-Delegation: Attacks and Defenses. Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin |
| 2011 | Q: Exploit Hardening Made Easy. Edward J. Schwartz, Thanassis Avgerinos, David Brumley |
| 2011 | QUIRE: Lightweight Provenance for Smart Phone Operating Systems. Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach |
| 2011 | SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks. Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos |
| 2011 | SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale. Collin Mulliner, Nico Golde, Jean-Pierre Seifert |
| 2011 | Secure In-Band Wireless Pairing. Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi |
| 2011 | Show Me the Money: Characterizing Spam-advertised Revenue. Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage |
| 2011 | Static Detection of Access Control Vulnerabilities in Web Applications. Fangqi Sun, Liang Xu, Zhendong Su |
| 2011 | TRESOR Runs Encryption Securely Outside RAM. Tilo Müller, Felix C. Freiling, Andreas Dewald |
| 2011 | Telex: Anticensorship in the Network Infrastructure. Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman |
| 2011 | The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion. Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham |
| 2011 | Toward Secure Embedded Web Interfaces. Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein |
| 2011 | Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System. Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, Matt Blaze |
| 2011 | ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection. Charlie Curtsinger, Benjamin Livshits, Benjamin G. Zorn, Christian Seifert |
| 2011 | deSEO: Combating Search-Result Poisoning. John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi |
| 2011 | mCarve: Carving Attributed Dump Sets. Ton van Deursen, Sjouke Mauw, Sasa Radomirovic |