| Deploying a Sensor Network on an Active Volcano | USENIX ATC '06 | Matt Welsh |
| Panel: Open Source Software Business Models | USENIX ATC '06 | Mike Olsen, Brian Aker, Miguel de Icaza |
| Success, Failure, and Alternative Solutions for Network Security | USENIX ATC '06 | Peiter "Mudge" Zatko |
| Panel: Is University Systems Teaching and Research Relevant to Industry? | USENIX ATC '06 | Gernot Heiser |
| Architectures and Algorithms for Biomolecular Simulation | USENIX ATC '06 | Cliff Young |
| Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography | USENIX ATC '06 | Steven M. Bellovin |
| Gold and Fool's Gold: Successes, Failures, and Futures in Computer Systems Research | USENIX ATC '06 | Butler Lampson |
| Routing Without Tears, Bridging Without Danger | USENIX ATC '06 | Radia Perlman |
 | Exploiting Online Games | USENIX Security '07 | Gary McGraw |
| Integrity Checking in Cryptographic File Systems with Constant Trusted Storage | USENIX Security '07 | Alina Oprea, Michael K. Reiter |
| Discoverer: Automatic Protocol Reverse Engineering from Network Traces | USENIX Security '07 | Weidong Cui, Jayanthkumar Kannan, Helen J. Wang |
| Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation | USENIX Security '07 | David Brumley, Juan Caballero, Zhenkai Liang, James Newsome |
| Computer Security in a Large Enterprise | USENIX Security '07 | Jerry Brady |
| PANEL | USENIX Security '07 | Ron Buskey, John Larson, Simon Mizikovsky, Thomas La Porta, Patrick Traynor |
 | Mobile Malware | USENIX Security '07 | Mikko Hypponen |
| OSLO: Improving the Security of Trusted Computing | USENIX Security '07 | Bernhard Kauer |
| Secretly Monopolizing the CPU Without Superuser Privileges | USENIX Security '07 | Dan Tsafrir, Yoav Etsion, Dror G. Feitelson |
| Memory Performance Attacks: Denial of Memory Service in Multi-Core Systems | USENIX Security '07 | Thomas Moscibroda, Onur Mutlu |
| Computer Security and Voting | USENIX Security '07 | David Dill |
| Report of the California Voting Systems Review | USENIX Security '07 | David Wagner |
| Binary Obfuscation Using Signals | USENIX Security '07 | Igor V. Popov, Saumya K. Debray, Gregory R. Andrews |
| Active Hardware Metering for Intellectual Property Protection and Security | USENIX Security '07 | Yousra M. Alkabani, Farinaz Koushanfar |
| Advanced Rootkits | USENIX Security '07 | Greg Hoglund |
| On Attack Causality in Internet-Connected Cellular Networks | USENIX Security '07 | Patrick McDaniel |
| Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks | USENIX Security '07 | P. Akritidis, W.Y. Chin, V.T. Lam, S. Sidiroglou, K.G. Anagnostakis |