| VoteBox: A Tamper-evident, Verifiable Electronic Voting System | USENIX Security '08 | Daniel Sandler, Kyle Derr, Dan S. Wallach |
| The Ghost in the Browser and Other Frightening Stories About Web Malware | USENIX Security '08 | Niels Provos |
| An Empirical Security Study of the Native Code in the JDK | USENIX Security '08 | Gang Tan, Jason Croft |
| AutoISES: Automatically Inferring Security Specification and Detecting Violations | USENIX Security '08 | Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou |
| Real-World Buffer Overflow Protection for Userspace & Kernelspace | USENIX Security '08 | Michael Dalton, Hari Kannan, Christos Kozyrakis |
| Managing Insecurity: Practitioner Reflections on Social Costs of Security | USENIX Security '08 | Darren Lacey |
| BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | USENIX Security '08 | Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee |
| Measurement and Classification of Humans and Bots in Internet Chat | USENIX Security '08 | Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang |
| To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads | USENIX Security '08 | Sam Small, Joshua Mason, Niels Provos, Adam Stubblefield |
| Security Analysis of Network Protocols | USENIX Security '08 | John Mitchell |
| Reverse-Engineering a Cryptographic RFID Tag | USENIX Security '08 | Starbug , Henryk Plötz |
| Practical Symmetric Key Cryptography on Modern Graphics Hardware | USENIX Security '08 | Owen Harrison, John Waldron |
| An Improved Clock-skew Measurement Technique for Revealing Hidden Services | USENIX Security '08 | Sebastian Zander, Steven J. Murdoch |
| Enterprise Security in the Brave New (Virtual) World | USENIX Security '08 | Tal Garfinkel |
| NetAuth: Supporting User-Based Network Services | USENIX Security '08 | Manigandan Radhakrishnan, Jon A. Solworth |
| Hypervisor Support for Identifying Covertly Executing Binaries | USENIX Security '08 | Lionel Litty, H. Andrés Lagar-Cavilla, David Lie |
| Selective Versioning in a Secure Disk System | USENIX Security '08 | Swaminathan Sundararaman, Gopalan Sivathanu, Erez Zadok |
| Hackernomics | USENIX Security '08 | Hugh Thompson |
| Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs | USENIX Security '08 | Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy |
| Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software | USENIX Security '08 | Rui Wang, XiaoFeng Wang, Zhuowei Li |
| Multi-flow Attacks Against Network Flow Watermarking Schemes | USENIX Security '08 | Negar Kiyavash, Amir Houmansadr, Nikita Borisov |
| Setting DNS's Hair on Fire | USENIX Security '08 | David Dagon, Paul Vixie |
| All Your iFRAMEs Point to Us | USENIX Security '08 | Niels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab, Fabian Monrose |
| Securing Frame Communication in Browsers | USENIX Security '08 | Adam Barth, Collin Jackson, John C. Mitchell |
| Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking | USENIX Security '08 | Michael Martin, Monica S. Lam |