| 2008 | 30 seconds is not enough!: a study of operating system timer usage. Simon Peter, Andrew Baumann, Timothy Roscoe, Paul Barham, Rebecca Isaacs |
| 2008 | Application-level isolation and recovery with solitude. Shvetank Jain, Fareha Shafique, Vladan Djeric, Ashvin Goel |
| 2008 | BorderPatrol: isolating events for black-box tracing. Eric Koskinen, John Jannotti |
| 2008 | Controlled, systematic, and efficient code replacement for running java programs. Angela Nicoara, Gustavo Alonso, Timothy Roscoe |
| 2008 | DepSpace: a byzantine fault-tolerant coordination service. Alysson Neves Bessani, Eduardo Adílio Pelinson Alchieri, Miguel Correia, Joni da Silva Fraga |
| 2008 | Documenting and automating collateral evolutions in linux device drivers. Yoann Padioleau, Julia Lawall, René Rydhof Hansen, Gilles Muller |
| 2008 | Efficient guaranteed disk request scheduling with fahrrad. Anna Povzner, Tim Kaldewey, Scott A. Brandt, Richard A. Golding, Theodore M. Wong, Carlos Maltzahn |
| 2008 | Enforcing appropriate process execution for exploiting idle resources from outside operating systems. Yoshihisa Abe, Hiroshi Yamada, Kenji Kono |
| 2008 | Eudaemon: involuntary and on-demand emulation against zero-day exploits. Georgios Portokalidis, Herbert Bos |
| 2008 | Experiences with open overlays: a middleware approach to network heterogeneity. Paul Grace, Danny Hughes, Barry Porter, Gordon S. Blair, Geoff Coulson, François Taïani |
| 2008 | Flicker: an execution infrastructure for tcb minimization. Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki |
| 2008 | GreenFS: making enterprise computers greener by protecting them better. Nikolai Joukov, Josef Sipek |
| 2008 | Hang analysis: fighting responsiveness bugs. Xi Wang, Zhenyu Guo, Xuezheng Liu, Zhilei Xu, Haoxiang Lin, Xiaoge Wang, Zheng Zhang |
| 2008 | Itrustpage: a user-assisted anti-phishing tool. Troy Ronda, Stefan Saroiu, Alec Wolman |
| 2008 | Manageable fine-grained information flow. Petros Efstathopoulos, Eddie Kohler |
| 2008 | Modeling viral economies for digital media. Shan He, Renan G. Cattelan, Darko Kirovski |
| 2008 | Parallax: virtual disks for virtual machines. Dutch T. Meyer, Gitika Aggarwal, Brendan Cully, Geoffrey Lefebvre, Michael J. Feeley, Norman C. Hutchinson, Andrew Warfield |
| 2008 | Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008 Joseph S. Sventek, Steven Hand |
| 2008 | Protectit: trusted distributed services operating on sensitive data. Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ahamad |
| 2008 | Replication degree customization for high availability. Ming Zhong, Kai Shen, Joel I. Seiferas |
| 2008 | Samurai: protecting critical data in unsafe languages. Karthik Pattabiraman, Vinod Grover, Benjamin G. Zorn |
| 2008 | Switchblade: enforcing dynamic personalized system call models. Christof Fetzer, Martin Süßkraut |
| 2008 | Task activity vectors: a new metric for temperature-aware scheduling. Andreas Merkel, Frank Bellosa |
| 2008 | Towards cinematic internet video-on-demand. Bin Cheng, Lex Stein, Hai Jin, Zheng Zhang |
| 2008 | VPFS: building a virtual private file system with a small trusted computing base. Carsten Weinhold, Hermann Härtig |