| RepuScore: Collaborative Reputation Management Framework for Email Infrastructure | LISA '07 | Gautam Singaraju, Brent ByungHoon Kang |
 | Homeless Vikings: BGP Prefix Hijacking and the Spam Wars | LISA '07 | David Josephsen |
 | The Economic Meltdown of Moore's Law and the Green Data Center | LISA '07 | Kenneth G. Brill |
| Moobi: A Thin Server Management System Using BitTorrent | LISA '07 | Chris McEniry |
| PoDIM: A Language for High-Level Configuration Management | LISA '07 | Thomas Delaet, Wouter Joosen |
| Network Patterns in Cfengine and Scalable Data Aggregation | LISA '07 | Matt Disney, Rolf Stadler |
 | Data Center Growing Pains | LISA '07 | Lou Marchant |
| WORK-IN-PROGRESS REPORTS (WIPS) | LISA '07 | |
| How the iPod Shuffled the World as We Know It | USENIX Security '07 | Steven Levy |
| SIF: Enforcing Confidentiality and Integrity in Web Applications | USENIX Security '07 | Stephen Chong, K. Vikram, Andrew C. Myers |
| Combating Click Fraud via Premium Clicks | USENIX Security '07 | Ari Juels, Sid Stamm, Markus Jakobsson |
| SpyProxy: Execution-based Detection of Malicious Web Content | USENIX Security '07 | Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy |
| The Human Factor in Online Fraud | USENIX Security '07 | Markus Jakobsson |
| Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? | USENIX Security '07 | Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson |
| Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing | USENIX Security '07 | T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno |
| Web-Based Inference Detection | USENIX Security '07 | Jessica Staddon, Philippe Golle, Bryce Zimny |
| Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks | USENIX Security '07 | Saar Drimer, Steven J. Murdoch |
| Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords | USENIX Security '07 | Julie Thorpe, P.C. van Oorschot |
| Halting Password Puzzles: Hard-to-break Encryption from Human-memorable Keys | USENIX Security '07 | Xavier Boyen |
| How to Obtain and Assert Composable Security | USENIX Security '07 | Ran Canetti |
| Spamscatter: Characterizing Internet Scam Hosting Infrastructure | USENIX Security '07 | David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker |
| Exploiting Network Structure for Proactive Spam Mitigation | USENIX Security '07 | Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song |
| BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation | USENIX Security '07 | Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong |
| Opening Remarks | USENIX ATC '06 | |
| PlanetLab: Evolution vs. Intelligent Design in Planetary-Scale Infrastructure | USENIX ATC '06 | Larry Peterson |