| 2008 | A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. Leo Juan, Christian Kreibich, Chih-Hung Lin, Vern Paxson |
| 2008 | Data Space Randomization. Sandeep Bhatkar, R. Sekar |
| 2008 | Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings Diego Zamboni |
| 2008 | Dynamic Binary Instrumentation-Based Framework for Malware Defense. Najwa Aaraj, Anand Raghunathan, Niraj K. Jha |
| 2008 | Embedded Malware Detection Using Markov n-Grams. M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq |
| 2008 | Expanding Malware Defense by Securing Software Installations. Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkatakrishnan |
| 2008 | FluXOR: Detecting and Monitoring Fast-Flux Service Networks. Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni, Danilo Bruschi |
| 2008 | Learning and Classification of Malware Behavior. Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov |
| 2008 | On Race Vulnerabilities in Web Applications. Roberto Paleari, Davide Marrone, Danilo Bruschi, Mattia Monga |
| 2008 | On the Limits of Information Flow Techniques for Malware Analysis and Containment. Lorenzo Cavallaro, Prateek Saxena, R. Sekar |
| 2008 | The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors. Carrie Gates, John McHugh |
| 2008 | The Quest for Multi-headed Worms. Van-Hau Pham, Marc Dacier, Guillaume Urvoy-Keller, Taoufik En-Najjary |
| 2008 | Traffic Aggregation for Malware Detection. Ting-Fang Yen, Michael K. Reiter |
| 2008 | VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. Brett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin C. Almeroth, Christopher Kruegel |
| 2008 | XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks. Prithvi Bisht, V. N. Venkatakrishnan |