LEET '08 | The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage |
LEET '08 | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | Michalis Polychronakis, Panayiotis Mavrommatis |
WOWCS '08 | WOWCS Scribe Notes | Colin Dixon, Fred Douglis, Geoff Kuenning, Jane-Ellen Long, Jeffrey C. Mogul |
WOWCS '08 | Best Practices for the Care and Feeding of a Program Committee, and Other Thoughts on Conference Organization | Fred Douglis |
WOWCS '08 | What Ought a Program Committee to Do? | Mark Allman |
WOWCS '08 | Program Committee Meetings Considered Harmful | Robbert van Renesse |
WOWCS '08 | Paper Rating vs. Paper Ranking | John R. Douceur |
WOWCS '08 | Overcoming Challenges of Maturity | Ken Birman |
WOWCS '08 | Thoughts on Improving Review Quality | Paul Francis |
WOWCS '08 | Scaling Internet Research Publication Processes to Internet Scale | Jon Crowcroft, S. Keshav, Nick McKeown |
WOWCS '08 | Towards a Model of Computer Systems Research | Thomas Anderson |
WOWCS '08 | Banal: Because Format Checking Is So Trite | Geoffrey M. Voelker |
WOWCS '08 | Hot Crap! | Eddie Kohler |
WOWCS '08 | Moderated Discussion on Concrete Things We Can Do | |
UPSEC '08 | A Framework for Reasoning About the Human in the Loop | Lorrie Faith Cranor |
UPSEC '08 | Understanding Privacy Settings in Facebook with an Audience View | Heather Richter Lipford, Andrew Besmer, Jason Watson |
UPSEC '08 | Where's The Beep? Security, Privacy, and User Misunderstandings of RFID | Jennifer King, Andrew McDiarmid |
UPSEC '08 | Biometric Daemons: Authentication via Electronic Pets | Pam Briggs, Patrick Olivier |
UPSEC '08 | Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model | Meredith L. Patterson, Len Sassaman, David Chaum |
UPSEC '08 | Centered Discretization with Application to Graphical Passwords | Sonia Chiasson, Jayakumar Srinivasan, Robert Biddle, P.C. van Oorschot |
UPSEC '08 | Using Salience Differentials to Making Visual Cues Noticeable | Andreas Heiner, N. Asokan |
UPSEC '08 | Predicted and Observed User Behavior in the Weakest-link Security Game | Jens Grossklags, Nicolas Christin, John Chuang |
UPSEC '08 | Ad-hoc Guesting: When Exceptions Are the Rule | Brinda Dalal, Les Nelson, Diana Smetters, Nathaniel Good, Ame Elliot |
UPSEC '08 | iPhish: Phishing Vulnerabilities on Consumer Electronics | Yuan Niu, Francis Hsu, Hao Chen |
UPSEC '08 | RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies | Maritza L. Johnson, Chaitanya Atreya, Adam J. Aviv, Gail E. Kaiser |