32. S&P 2011: Berleley, California, USA

Session 1: Security of Authentication and Protection Mechanisms

Session 2: Hardware Security

Session 3: Systematization of Knowledge I

Session 4: Browsing Security and Privacy

Session 5: Secure Information Flow and Information Policies

Session 6: Privacy and Social Networks

Session 7: Virtualization and Trusted Computing

Session 8: Program Security Analysis

Session 9: Systematization of Knowledge II

Session 10: Underground Economy/Malware

Session 11: Vulnerability Analysis

Session 12: Anonymity and Voting