Abstract is missing.
- Delegating Responsibility in Digital Systems: Horton's "Who Done It?"Mark S. Miller, James E. Donnelley, Alan H. Karp.   [doi]
 - Turtles All the Way Down: Research Challenges in User-Based AttestationJonathan M. McCune, Adrian Perrig, Arvind Seshadri, Leendert van Doorn.   [doi]
 - The Strengths of Weaker Identities: Opportunistic PersonasMark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver.   [doi]
 - Quantifying the Strength of Security SystemsDavid Lie, M. Satyanarayanan.   [doi]
 - Rethinking Antivirus: Executable Analysis in the Network CloudJon Oberheide, Evan Cooke, Farnam Jahanian.   [doi]
 - Towards Application-Aware Anonymous RoutingMicah Sherr, Boon Thau Loo, Matt Blaze.   [doi]
 - Self-Signed Executables: Restricting Replacement of Program Binaries by MalwareGlenn Wurster, Paul C. van Oorschot.   [doi]
 - Securing Network Input via a Trusted Input ProxyKevin Borders, Atul Prakash.   [doi]
 - Do Strong Web Passwords Accomplish Anything?Dinei FlorĂȘncio, Cormac Herley, Baris Coskun.   [doi]
 - Transaction Generators: Root Kits for WebCollin Jackson, Dan Boneh, John C. Mitchell.   [doi]