| 2008 | A Demonstrative Ad Hoc Attestation System. Endre Bangerter, Maksim Djackov, Ahmad-Reza Sadeghi |
| 2008 | A Five-Round Algebraic Property of the Advanced Encryption Standard. Jianyong Huang, Jennifer Seberry, Willy Susilo |
| 2008 | A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka |
| 2008 | A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance. Yali Liu, Ken Chiang, Cherita L. Corbett, Rennie Archibald, Biswanath Mukherjee, Dipak Ghosal |
| 2008 | Algebraic Attack on HFE Revisited. Jintai Ding, Dieter Schmidt, Fabian Werner |
| 2008 | An Efficient PIR Construction Using Trusted Hardware. Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao |
| 2008 | An RSA-Based (t, n) Threshold Proxy Signature Scheme without Any Trusted Combiner. Pei-Yih Ting, Xiao-Wei Huang |
| 2008 | Antisocial Networks: Turning a Social Network into a Botnet. Elias Athanasopoulos, A. Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, Evangelos P. Markatos |
| 2008 | Athos: Efficient Authentication of Outsourced File Systems. Michael T. Goodrich, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos |
| 2008 | Behavior-Based Network Access Control: A Proof-of-Concept. Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis |
| 2008 | BotTracer: Execution-Based Bot-Like Malware Detection. Lei Liu, Songqing Chen, Guanhua Yan, Zhao Zhang |
| 2008 | Can "Something You Know" Be Saved?. Baris Coskun, Cormac Herley |
| 2008 | Certificate-Based Signature Schemes without Pairings or Random Oracles. Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou |
| 2008 | Collisions for RC4-Hash. Sebastiaan Indesteege, Bart Preneel |
| 2008 | Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip. Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust |
| 2008 | Compromising Anonymity Using Packet Spinning. Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos |
| 2008 | Cryptanalysis of Rabbit. Yi Lu, Huaxiong Wang, San Ling |
| 2008 | Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. Somitra Kumar Sanadhya, Palash Sarkar |
| 2008 | Distinguishing between FE and DDoS Using Randomness Check. Hyundo Park, Peng Li, Debin Gao, Heejo Lee, Robert H. Deng |
| 2008 | HAPADEP: Human-Assisted Pure Audio Device Pairing. Claudio Soriente, Gene Tsudik, Ersin Uzun |
| 2008 | Improved Impossible Differential Attacks on Large-Block Rijndael. Lei Zhang, Wenling Wu, Je Hong Park, Bonwook Koo, Yongjin Yeom |
| 2008 | Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee |
| 2008 | New Applications of Differential Bounds of the SDS Structure. Jiali Choy, Khoongming Khoo |
| 2008 | New Communication-Efficient Oblivious Transfer Protocols Based on Pairings. Helger Lipmaa |
| 2008 | One-Time Password Access to Any Server without Changing the Server. Dinei A. F. Florêncio, Cormac Herley |
| 2008 | Path-Based Access Control for Enterprise Networks. Matthew Burnside, Angelos D. Keromytis |
| 2008 | Property-Based Attestation without a Trusted Third Party. Liqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi |
| 2008 | Property-Based TPM Virtualization. Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy |
| 2008 | Proxy Re-signatures in the Standard Model. Sherman S. M. Chow, Raphael C.-W. Phan |
| 2008 | Revisiting Wiener's Attack - New Weak Keys in RSA. Subhamoy Maitra, Santanu Sarkar |
| 2008 | Strong Accumulators from Collision-Resistant Hashing. Philippe Camacho, Alejandro Hevia, Marcos A. Kiwi, Roberto Opazo |
| 2008 | The Reduced Address Space (RAS) for Application Memory Authentication. David Champagne, Reouven Elbaz, Ruby B. Lee |
| 2008 | Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. Ryan Iwahashi, Daniela Alvim Seabra de Oliveira, Shyhtsun Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jintae Oh, Jong-Soo Jang |
| 2008 | Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication. Shay Gueron, Michael E. Kounavis |