| Deterministic System Administration | LISA '08 | Andrew Hume |
| Designing, Building, and Populating a 10-Megawatt Datacenter | LISA '08 | Doug Hughes |
| "Standard Deviations" of the "Average" System Administrator | LISA '08 | Alva L. Couch |
| System Administration and the Economics of Plenty | LISA '08 | Tom Limoncelli |
| Inside DreamWorks Animation Studios: A Look at Past, Present, and Future Challenges | LISA '08 | Sean Kamath, Mike Cutler |
| Beyond VDI: Why Thin Client Computing and Virtual Desktop Infrastructures Aren't Cutting It | LISA '08 | Monica Lam |
| LISA Quiz Show | LISA '08 | Jeremy Allison |
| Keynote Address Implementing Intellipedia Within a "Need to Know" Culture | LISA '08 | Sean Dennehy |
| Integrating Linux (and UNIX and Mac) Identity Management in Microsoft Active Directory | LISA '08 | Mike Patnode |
| Programming the Virtual Infrastructure | LISA '08 | Paul Anderson |
| How to Proceed When 1000 Call Agents Tell You, "My Computer Is Slow": Creating a User Experience Monitoring System | LISA '08 | Tobias Oetiker |
| How to Stop Hating MySQL: Fixing Common Mistakes and Myths | LISA '08 | Sheeri K. Cabral |
| Does Your House Have Lions? Controlling for the Risk from Trusted Insiders | LISA '08 | Marcel Simon |
| Spine: Automating Systems Configuration and Management | LISA '08 | Rafi Khardalian |
| Verifying Compliance of Trusted Programs | USENIX Security '08 | Sandra Rueda, Dave King, Trent Jaeger |
| Helios: Web-based Open-Audit Voting | USENIX Security '08 | Ben Adida |
| VoteBox: A Tamper-evident, Verifiable Electronic Voting System | USENIX Security '08 | Daniel Sandler, Kyle Derr, Dan S. Wallach |
| The Ghost in the Browser and Other Frightening Stories About Web Malware | USENIX Security '08 | Niels Provos |
| An Empirical Security Study of the Native Code in the JDK | USENIX Security '08 | Gang Tan, Jason Croft |
| AutoISES: Automatically Inferring Security Specification and Detecting Violations | USENIX Security '08 | Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou |
| Real-World Buffer Overflow Protection for Userspace & Kernelspace | USENIX Security '08 | Michael Dalton, Hari Kannan, Christos Kozyrakis |
| Managing Insecurity: Practitioner Reflections on Social Costs of Security | USENIX Security '08 | Darren Lacey |
| BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | USENIX Security '08 | Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee |
| Measurement and Classification of Humans and Bots in Internet Chat | USENIX Security '08 | Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang |
| To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads | USENIX Security '08 | Sam Small, Joshua Mason, Niels Provos, Adam Stubblefield |