| 2008 | A Survey to Guide Group Key Protocol Development. Ahren Studer, Christina Johns, Jaanus Kase, Kyle O'Meara, Lorrie Faith Cranor |
| 2008 | Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis. Robert J. Cole, Peng Liu |
| 2008 | Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Window. Yolanta Beres, Jonathan Griffin, Simon Shiu, Max Heitman, David Markle, Peter Ventura |
| 2008 | Anti-Phishing in Offense and Defense. Chuan Yue, Haining Wang |
| 2008 | Assessing Quality of Policy Properties in Verification of Access Control Policies. Evan Martin, Jeehyun Hwang, Tao Xie, Vincent C. Hu |
| 2008 | Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences. Yinqian Zhang, Xun Fan, Yijun Wang, Zhi Xue |
| 2008 | Automatic Inference and Enforcement of Kernel Data Structure Invariants. Arati Baliga, Vinod Ganapathy, Liviu Iftode |
| 2008 | Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis |
| 2008 | Bluetooth Network-Based Misuse Detection. Terrence O'Connor, Douglas S. Reeves |
| 2008 | Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection. Peng Li, Hyundo Park, Debin Gao, Jianming Fu |
| 2008 | DARE: A Framework for Dynamic Authentication of Remote Executions. Erdem Aktas, Kanad Ghose |
| 2008 | Defending Against Attacks on Main Memory Persistence. William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick D. McDaniel, Adam D. Smith |
| 2008 | Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. Karsten Sohr, Tanveer Mustafa, Xinyu Bao, Gail-Joon Ahn |
| 2008 | Epilogue for RFC 1281, Guidelines for the Secure Operation of the Internet. Barbara Fraser, Stephen D. Crocker |
| 2008 | Execution Trace-Driven Automated Attack Signature Generation. Susanta Nanda, Tzi-cker Chiueh |
| 2008 | Host-Centric Model Checking for Network Vulnerability Analysis. Rattikorn Hewett, Phongphun Kijsanayothin |
| 2008 | Implementing ACL-Based Policies in XACML. Günter Karjoth, Andreas Schade, Els Van Herreweghen |
| 2008 | Improving Security Visualization with Exposure Map Filtering. Mansour Alsaleh, David Barrera, Paul C. van Oorschot |
| 2008 | Improving the Efficiency of Capture-Resistant Biometric Authentication Based on Set Intersection. Xunhua Wang, Philip D. Huff, Brett C. Tjaden |
| 2008 | Instruction Set Extensions for Enhancing the Performance of Symmetric-Key Cryptography. Sean O'Melia, Adam J. Elbirt |
| 2008 | MalTRAK: Tracking and Eliminating Unknown Malware. Amit Vasudevan |
| 2008 | McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. Roberto Perdisci, Andrea Lanzi, Wenke Lee |
| 2008 | New Side Channels Targeted at Passwords. Albert Tannous, Jonathan T. Trostle, Mohamed Hassan, Stephen E. McLaughlin, Trent Jaeger |
| 2008 | OMOS: A Framework for Secure Communication in Mashup Applications. Saman Zarandioon, Danfeng Yao, Vinod Ganapathy |
| 2008 | On Purely Automated Attacks and Click-Based Graphical Passwords. Amirali Salehi-Abari, Julie Thorpe, Paul C. van Oorschot |
| 2008 | PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries. Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang, Dong Xuan, Bin Ma |
| 2008 | Permission Set Mining: Discovering Practical and Useful Roles. Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer, Trevor Yann |
| 2008 | PinUP: Pinning User Files to Known Applications. William Enck, Patrick D. McDaniel, Trent Jaeger |
| 2008 | Please Permit Me: Stateless Delegated Authorization in Mashups. Ragib Hasan, Marianne Winslett, Richard M. Conlan, Brian Slesinsky, Nandakumar Ramani |
| 2008 | Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage. Paul F. Farrell Jr., Simson L. Garfinkel, Douglas White |
| 2008 | Preventing Information Leaks through Shadow Executions. Roberto Capizzi, Antonio Longo, V. N. Venkatakrishnan, A. Prasad Sistla |
| 2008 | Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System. Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi, Fabio Scotti |
| 2008 | ProActive Access Control for Business Process-Driven Environments. Mathias Kohler, Andreas Schaad |
| 2008 | STILL: Exploit Code Detection via Static Taint and Initialization Analyses. Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu |
| 2008 | Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense. Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calton Pu |
| 2008 | Structuring for Strategic Cyber Defense: A Cyber Manhattan Project Blueprint. O. Sami Saydjari |
| 2008 | Systematic Signature Engineering by Re-use of Snort Signatures. Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier, René Rietz |
| 2008 | The Evolution of System-Call Monitoring. Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji |
| 2008 | The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri |
| 2008 | Toward Automatic Generation of Intrusion Detection Verification Rules. Frédéric Massicotte, Yvan Labiche, Lionel C. Briand |
| 2008 | Transaction Oriented Text Messaging with Trusted-SMS. Antonio Grillo, Alessandro Lentini, Gianluigi Me, Giuseppe F. Italiano |
| 2008 | Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008 |
| 2008 | VICI Virtual Machine Introspection for Cognitive Immunity. Timothy Fraser, Matthew R. Evenson, William A. Arbaugh |
| 2008 | XSSDS: Server-Side Detection of Cross-Site Scripting Attacks. Martin Johns, Björn Engelmann, Joachim Posegga |
| 2008 | YAGP: Yet Another Graphical Password Strategy. Haichang Gao, Xuewu Guo, Xiaoping Chen, Liming Wang, Xiyang Liu |
| 2008 | pwdArmor: Protecting Conventional Password-Based Authentications. Timothy W. van der Horst, Kent E. Seamons |