| Security Analysis of Network Protocols | USENIX Security '08 | John Mitchell |
| Reverse-Engineering a Cryptographic RFID Tag | USENIX Security '08 | Starbug , Henryk Plötz |
| Practical Symmetric Key Cryptography on Modern Graphics Hardware | USENIX Security '08 | Owen Harrison, John Waldron |
| An Improved Clock-skew Measurement Technique for Revealing Hidden Services | USENIX Security '08 | Sebastian Zander, Steven J. Murdoch |
| Enterprise Security in the Brave New (Virtual) World | USENIX Security '08 | Tal Garfinkel |
| NetAuth: Supporting User-Based Network Services | USENIX Security '08 | Manigandan Radhakrishnan, Jon A. Solworth |
| Hypervisor Support for Identifying Covertly Executing Binaries | USENIX Security '08 | Lionel Litty, H. Andrés Lagar-Cavilla, David Lie |
| Selective Versioning in a Secure Disk System | USENIX Security '08 | Swaminathan Sundararaman, Gopalan Sivathanu, Erez Zadok |
| Hackernomics | USENIX Security '08 | Hugh Thompson |
| Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs | USENIX Security '08 | Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy |
| Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software | USENIX Security '08 | Rui Wang, XiaoFeng Wang, Zhuowei Li |
| Multi-flow Attacks Against Network Flow Watermarking Schemes | USENIX Security '08 | Negar Kiyavash, Amir Houmansadr, Nikita Borisov |
| Setting DNS's Hair on Fire | USENIX Security '08 | David Dagon, Paul Vixie |
| All Your iFRAMEs Point to Us | USENIX Security '08 | Niels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab, Fabian Monrose |
| Securing Frame Communication in Browsers | USENIX Security '08 | Adam Barth, Collin Jackson, John C. Mitchell |
| Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking | USENIX Security '08 | Michael Martin, Monica S. Lam |
| Political DDoS: Estonia and Beyond | USENIX Security '08 | Jose Nazario |
| Lest We Remember: Cold Boot Attacks on Encryption Keys | USENIX Security '08 | J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten |
| The Practical Subtleties of Biometric Key Generation | USENIX Security '08 | Lucas Ballard, Seny Kamara, Michael K. Reiter |
| Unidirectional Key Distribution Across Time and Space with Applications to RFID Security | USENIX Security '08 | Ari Juels, Ravikanth Pappu, Bryan Parno |
| Building the Successful Security Software Company | USENIX Security '08 | Ted Schlein |
| CloudAV: N-Version Antivirus in the Network Cloud | USENIX Security '08 | Jon Oberheide, Evan Cooke, Farnam Jahanian |
| Highly Predictive Blacklisting | USENIX Security '08 | Jian Zhang, Phillip Porras, Johannes Ullrich |
| Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks | USENIX Security '08 | Jerry Chou, Bill Lin, Subhabrata Sen, Oliver Spatscheck |
| From the Casebooks of . . . | USENIX Security '08 | Mark Seiden |