26. ACSAC 2010: Austin, Texas, USA

Social networks

Software defenses


Vulnerability assessment of embedded devices

Classic paper I

Invited essayist


Email, e-commerce, and web 2.0

Hardware-assisted security

Security protocols and portable storage

Model checking and vulnerability analysis

Classic paper II

Intrusion detection and live forensics

Distributed systems and operating systems

Mobile and wireless

Security engineering and management