| Peeking into Spammer Behavior from a Unique Vantage Point | LEET '08 | Abhinav Pathak, Y. Charlie Hu, Z. Morley Mao |
| Behind Phishing: An Examination of Phisher Modi Operandi | LEET '08 | D. Kevin McGrath, Minaxi Gupta |
| Designing and Implementing Malicious Hardware | LEET '08 | Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou |
| Catching Instant Messaging Worms with Change-Point Detection Techniques | LEET '08 | Guanhua Yan, Zhen Xiao, Stephan Eidenbenz |
| Exploiting Machine Learning to Subvert Your Spam Filter | LEET '08 | Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I.P. Rubinstein, Udam Saini, Charles Sutton, Kai Xia |
| Conducting Cybersecurity Research Legally and Ethically | LEET '08 | Aaron J. Burstein |
| Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm | LEET '08 | Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling |
| The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | LEET '08 | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage |
| Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | LEET '08 | Michalis Polychronakis, Panayiotis Mavrommatis |
| Work-in-Progress Session | LEET '08 | |
 | How to Build a PB Sized Disk Storage System | LISA '09 | Raymond L. Paden |
 | Eucalyptus: An Open Source Infrastructure for Cloud Computing | LISA '09 | Rich Wolski |
 | The Advanced Persistent Threat | LISA '09 | Michael K. Daly |
 | Google Wave | LISA '09 | Daniel Berlin, Joe Gregorio |
 | Cosmic Computing: Supporting the Science of the Planck Space Based Telescope | LISA '09 | Shane Canon |
 | Crossbow Virtual Wire: Network in a Box | LISA '09 | Sunay Tripathi, Nicolas Droux, Kais Belgaied, Shrikrishna Khare |
 | EVA: A Framework for Network Analysis and Risk Assessment | LISA '09 | Melissa Danforth |
 | An Analysis of Network Configuration Artifacts | LISA '09 | David Plonka, Andres Jaan Tack |
 | Searching for Truth, or at Least Data: How to Be an Empiricist Skeptic | LISA '09 | Elizabeth D. Zwicky |
 | Secure Passwords Through Enhanced Hashing | LISA '09 | Benjamin Strahs, Chuan Yue, Haining Wang |
 | SEEdit: SELinux Security Policy Configuration System with Higher Level Language | LISA '09 | Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Tabata |
 | An SSH-based Toolkit for User-based Network Services | LISA '09 | Joyita Sikder, Manigandan Radhakrishnan, Jon A. Solworth |
 | Delay/Disruption Tolerant Networking | LISA '09 | Keith Scott |
 | Towards Zero-Emission Datacenters Through Direct Reuse of Waste Heat | LISA '09 | Bruno Michel |
 | Federated Access Control and Workflow Enforcement in Systems Configuration | LISA '09 | Bart Vanbrabant, Thomas Delaet, Wouter Joosen |