| xBook: Redesigning Privacy Control in Social Networking Platforms | USENIX Security '09 | |
| Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications | USENIX Security '09 | |
| Static Enforcement of Web Application Integrity Through Strong Typing | USENIX Security '09 | |
| Compression, Correction, Confidentiality, and Comprehension: A Modern Look at Commercial Telegraph Codes | USENIX Security '09 | Steven M. Bellovin |
| Vanish: Increasing Data Privacy with Self-Destructing Data | USENIX Security '09 | |
| Efficient Data Structures for Tamper-Evident Logging | USENIX Security '09 | |
| VPriv: Protecting Privacy in Location-Based Vehicular Services | USENIX Security '09 | |
| Top Ten Web Hacking Techniques of 2008: "What's possible, not probable" | USENIX Security '09 | |
| Effective and Efficient Malware Detection at the End Host | USENIX Security '09 | |
| Protecting Confidential Data on Personal Computers with Storage Capsules | USENIX Security '09 | |
| Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms | USENIX Security '09 | |
| Hash Functions and Their Many Uses in Cryptography | USENIX Security '09 | |
| Crying Wolf: An Empirical Study of SSL Warning Effectiveness | USENIX Security '09 | |
| The Multi-Principal OS Construction of the Gazelle Web Browser | USENIX Security '09 | |
| Work-in-Progress Reports (WiPs) | USENIX Security '09 | |
| The New Jersey Voting-machine Lawsuit and the AVC Advantage DRE Voting Machine | EVT/WOTE '09 | Andrew W. Appel, Maia Ginsburg, Harri Hursti, Brian W. Kernighan, Christina D. Richards, Gang Tan, Penny Venetis |
| Opening Remarks and Best Paper Awards | USENIX ATC '09 | Geoffrey M. Voelker, Alec Wolman |
| Keynote Address: Where Does the Power Go in High-Scale Data Centers? | USENIX ATC '09 | James Hamilton |
| Satori: Enlightened Page Sharing | USENIX ATC '09 | Grzegorz Miłoś, Derek G. Murray, Steven Hand, Michael A. Fetterman |
| vNUMA: A Virtual Shared-Memory Multiprocessor | USENIX ATC '09 | Matthew Chapman, Gernot Heiser |
| ShadowNet: A Platform for Rapid and Safe Network Evolution | USENIX ATC '09 | Xu Chen, Z. Morley Mao, Jacobus Van der Merwe |
| Teaching Computer Science in the Cloud | USENIX ATC '09 | David J. Malan |
| Design and Implementation of TCP Data Probes for Reliable and Metric-Rich Network Path Monitoring | USENIX ATC '09 | Xiapu Luo, Edmond W.W. Chan, Rocky K.C. Chang |
| StrobeLight: Lightweight Availability Mapping and Anomaly Detection | USENIX ATC '09 | James W. Mickens, John R. Douceur, William J. Bolosky, Brian D. Noble |
| Hashing Round-down Prefixes for Rapid Packet Classification | USENIX ATC '09 | Fong Pong, Nian-Feng Tzeng |