| Securing Distributed Systems with Information Flow Control | NSDI '08 | Nickolai Zeldovich, Silas Boyd-Wickizer, David Mazières |
| Wedge: Splitting Applications into Reduced-Privilege Compartments | NSDI '08 | Andrea Bittau, Petr Marchenko, Mark Handley, Brad Karp |
| Reducing Network Energy Consumption via Sleeping and Rate-Adaptation | NSDI '08 | Sergiu Nedevschi, Lucian Popa, Gianluca Iannaccone, Sylvia Ratnasamy, David Wetherall |
| Energy-Aware Server Provisioning and Load Dispatching for Connection-Intensive Internet Services | NSDI '08 | Gong Chen, Wenbo He, Jie Liu, Suman Nath, Leonidas Rigas, Lin Xiao, Feng Zhao |
| Consensus Routing: The Internet as a Distributed System | NSDI '08 | John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, Thomas Anderson, Arun Venkataramani |
| Passport: Secure and Adoptable Source Authentication | NSDI '08 | Xin Liu, Ang Li, Xiaowei Yang, David Wetherall |
| Context-based Routing: Technique, Applications, and Experience | NSDI '08 | Saumitra Das, Yunnan Wu, Ranveer Chandra, Y. Charlie Hu |
| NetComplex: A Complexity Metric for Networked System Designs | NSDI '08 | Byung-Gon Chun, Sylvia Ratnasamy, Eddie Kohler |
| DieCast: Testing Distributed Systems with an Accurate Scale Model | NSDI '08 | Diwaker Gupta, Kashi V. Vishwanath |
| D3S: Debugging Deployed Distributed Systems | NSDI '08 | Xuezheng Liu, Zhenyu Guo, Xi Wang, Feibo Chen, Xiaochen Lian, Jian Tang, Ming Wu, Zheng Zhang |
| On the Spam Campaign Trail | LEET '08 | Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage |
| Characterizing Botnets from Email Spam Records | LEET '08 | Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, Geoff Hulten, J.D. Tygar |
| Peeking into Spammer Behavior from a Unique Vantage Point | LEET '08 | Abhinav Pathak, Y. Charlie Hu, Z. Morley Mao |
| Behind Phishing: An Examination of Phisher Modi Operandi | LEET '08 | D. Kevin McGrath, Minaxi Gupta |
| Designing and Implementing Malicious Hardware | LEET '08 | Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou |
| Catching Instant Messaging Worms with Change-Point Detection Techniques | LEET '08 | Guanhua Yan, Zhen Xiao, Stephan Eidenbenz |
| Exploiting Machine Learning to Subvert Your Spam Filter | LEET '08 | Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I.P. Rubinstein, Udam Saini, Charles Sutton, Kai Xia |
| Conducting Cybersecurity Research Legally and Ethically | LEET '08 | Aaron J. Burstein |
| Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm | LEET '08 | Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling |
| The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | LEET '08 | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage |
| Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | LEET '08 | Michalis Polychronakis, Panayiotis Mavrommatis |
| Work-in-Progress Session | LEET '08 | |
| "It's like a fire. You just have to move on": Rethinking Personal Digital Archiving | FAST '08 | Cathy Marshall |
| Scalable Performance of the Panasas Parallel File System | FAST '08 | Brent Welch, Marc Unangst, Zainul Abbasi, Garth Gibson, Brian Mueller, Jason Small, Jim Zelenka, Bin Zhou |
| TierStore: A Distributed Filesystem for Challenged Networks in Developing Regions | FAST '08 | Michael Demmer, Bowei Du, Eric Brewer |