18. CCS 2011: Chicago, Illinois, USA

Keynote address

System security

Composability of cryptographic protocols

Hardware, SCADA, and physical security

Authentication and access control

Anonymous communications

Web security

Malware and intrusion detection

Formal methods and verification

Keynote address

Virtual machines and hypervisors

Applied cryptography

Wild woolly web

Cloud computing

Side-channel attacks and defenses

Securing web applications

Privacy and mobile security

Making secure computation practical

Poster and demo session