| Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery | USENIX Security '06 | Radmilo Racic, Denys Ma, Hao Chen |
| Applying Machine-model Based Countermeasure Design to Improve Protection Against Code Injection Attacks | USENIX Security '06 | Yves Younan, Frank Piessens, Wouter Joosen |
| Building a Trusted Network Connect Evaluation Test Bed | USENIX Security '06 | Jesus Molina |
| The SAAM Project at UBC | USENIX Security '06 | Jason Crampton, Wing Leung |
| ID-SAVE: Incrementally Deployable Source Address Validity Enforcement | USENIX Security '06 | Toby Ehrenkranz |
| Automatic Repair Validation | USENIX Security '06 | Michael E. Locasto, Matthew Burnside, Angelos D. Keromytis |
| Secure Software Updates: Not Really | USENIX Security '06 | Kevin Fu |
| The Utility vs. Strength Tradeoff: Anonymization for Log Sharing | USENIX Security '06 | Kiran Lakkaraju |
| Malware Prevalence in the KaZaA File-Sharing Network | USENIX Security '06 | Jaeyeon Jung |
| Election Audits | USENIX Security '06 | Arel Cordero |
| The Joe-E Subset of Java | USENIX Security '06 | Adrian Mettler |
| Prerendered User Interfaces for Higher-Assurance Electronic Voting | USENIX Security '06 | Ka-Ping Yee |
| Fine-Grained Secure Localization for 802.11 Networks | USENIX Security '06 | Patrick Traynor |
| KernelSecNet | USENIX Security '06 | Manigandan Radhakrishnan, Jon A. Solworth |
| Taking Malware Detection To The Next Level (Down) | USENIX Security '06 | Adrienne Felt, Nathanael Paul, David Evans, Sudhanva Gurumurthi |
| Data Sandboxing for Confidentiality | USENIX Security '06 | Tejas Khatiwala, Raj Swaminathan |
| Opening Remarks | USENIX ATC '06 | |
| PlanetLab: Evolution vs. Intelligent Design in Planetary-Scale Infrastructure | USENIX ATC '06 | Larry Peterson |
| Deploying a Sensor Network on an Active Volcano | USENIX ATC '06 | Matt Welsh |
| Panel: Open Source Software Business Models | USENIX ATC '06 | Mike Olsen, Brian Aker, Miguel de Icaza |
| Success, Failure, and Alternative Solutions for Network Security | USENIX ATC '06 | Peiter "Mudge" Zatko |
| Panel: Is University Systems Teaching and Research Relevant to Industry? | USENIX ATC '06 | Gernot Heiser |
| Architectures and Algorithms for Biomolecular Simulation | USENIX ATC '06 | Cliff Young |
| Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography | USENIX ATC '06 | Steven M. Bellovin |
| Gold and Fool's Gold: Successes, Failures, and Futures in Computer Systems Research | USENIX ATC '06 | Butler Lampson |