| Efficient Data Structures for Tamper-Evident Logging | USENIX Security '09 | |
| VPriv: Protecting Privacy in Location-Based Vehicular Services | USENIX Security '09 | |
| Top Ten Web Hacking Techniques of 2008: "What's possible, not probable" | USENIX Security '09 | |
| Effective and Efficient Malware Detection at the End Host | USENIX Security '09 | |
| Protecting Confidential Data on Personal Computers with Storage Capsules | USENIX Security '09 | |
| Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms | USENIX Security '09 | |
| Hash Functions and Their Many Uses in Cryptography | USENIX Security '09 | |
| Crying Wolf: An Empirical Study of SSL Warning Effectiveness | USENIX Security '09 | |
| The Multi-Principal OS Construction of the Gazelle Web Browser | USENIX Security '09 | |
| Work-in-Progress Reports (WiPs) | USENIX Security '09 | |
| Opening Remarks and Awards | USENIX Security '09 | Fabian Monrose |
| Keynote Address Android: Securing a Mobile Platform from the Ground Up | USENIX Security '09 | |
| Compromising Electromagnetic Emanations of Wired and Wireless Keyboards | USENIX Security '09 | |
| Modern Exploitation and Memory Protection Bypasses | USENIX Security '09 | Alexander Sotirov |
| E-Voting and Forensics: Prying Open the Black Box | EVT/WOTE '09 | Matt Bishop, Sean Peisert, Candice Hoke, Mark Graff |
| Detecting Voter Fraud in an Electronic Voting Context: An Analysis of the Unlimited Reelection Vote in Venezuela | EVT/WOTE '09 | Inés Levin, Gabe A. Cohn, Peter C. Ordeshook, R. Michael Alvarez |
| The New Jersey Voting-machine Lawsuit and the AVC Advantage DRE Voting Machine | EVT/WOTE '09 | Andrew W. Appel, Maia Ginsburg, Harri Hursti, Brian W. Kernighan, Christina D. Richards, Gang Tan, Penny Venetis |
| Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage | EVT/WOTE '09 | Stephen Checkoway, Ariel J. Feldman, Brian Kantor, J. Alex Halderman, Edward W. Felten, Hovav Shacham |
| Understanding the Security Properties of Ballot-Based Verification Techniques | EVT/WOTE '09 | Eric Rescorla |
| VoteBox Nano: A Smaller, Stronger FPGA-based Voting Machine | EVT/WOTE '09 | Ersin Öksüzoǧlu, Dan S. Wallach |
| Some Consequences of Paper Fingerprinting for Elections | EVT/WOTE '09 | Joseph A. Calandrino, William Clarkson |
| Invited Talk | EVT/WOTE '09 | The Honorable Rush Holt (NJ) |
| Voting Cryptography Tutorial for Non-Cryptographers | EVT/WOTE '09 | Ben Adida |
| Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios | EVT/WOTE '09 | Olivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater |
| Efficient Receipt-Free Ballot Casting Resistant to Covert Channels | EVT/WOTE '09 | C. Andrew Neff |