26. ACSAC 2010: Austin, Texas, USA

Social networks

Software defenses

Authentication

Vulnerability assessment of embedded devices

Classic paper I

Invited essayist

Botnets

Email, e-commerce, and web 2.0

Hardware-assisted security

Security protocols and portable storage

Model checking and vulnerability analysis

Classic paper II

Intrusion detection and live forensics

Distributed systems and operating systems

Mobile and wireless

Security engineering and management