| 2008 | A New Privacy-Enhanced Matchmaking Protocol. Ji Sun Shin, Virgil D. Gligor |
| 2008 | A Tune-up for Tor: Improving Security and Performance in the Tor Network. Robin Snader, Nikita Borisov |
| 2008 | Analysis-Resistant Malware. John Bethencourt, Dawn Song, Brent Waters |
| 2008 | Analyzing Privacy in Enterprise Packet Trace Anonymization. Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Donald F. Towsley |
| 2008 | Automated Whitebox Fuzz Testing. Patrice Godefroid, Michael Y. Levin, David A. Molnar |
| 2008 | Automatic Network Protocol Analysis. Gilbert Wondracek, Paolo Milani Comparetti, Christopher Krügel, Engin Kirda |
| 2008 | Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zhang |
| 2008 | BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. Guofei Gu, Junjie Zhang, Wenke Lee |
| 2008 | Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. David Dagon, Niels Provos, Christopher P. Lee, Wenke Lee |
| 2008 | Exploiting Opportunistic Scheduling in Cellular Data Networks. Radmilo Racic, Denys Ma, Hao Chen, Xin Liu |
| 2008 | Halo: High-Assurance Locate for Distributed Hash Tables. Apu Kapadia, Nikos Triandopoulos |
| 2008 | HookFinder: Identifying and Understanding Malware Hooking Behaviors. Heng Yin, Zhenkai Liang, Dawn Song |
| 2008 | Impeding Malware Analysis Using Conditional Code Obfuscation. Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee |
| 2008 | Limits of Learning-based Signature Generation with Adversaries. Shobha Venkataraman, Avrim Blum, Dawn Song |
| 2008 | Measuring and Detecting Fast-Flux Service Networks. Thorsten Holz, Christian Gorecki, Konrad Rieck, Felix C. Freiling |
| 2008 | PRECIP: Towards Practical and Retrofittable Confidential Information Protection. Xiaofeng Wang, Zhuowei Li, Ninghui Li, Jong Youl Choi |
| 2008 | Proceedings of the Network and Distributed System Security Symposium, NDSS 2008, San Diego, California, USA, 10th February - 13th February 2008 |
| 2008 | Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick D. McDaniel |
| 2008 | Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. Sherman S. M. Chow, Joseph K. Liu, Duncan S. Wong |
| 2008 | Taming the Devil: Techniques for Evaluating Anonymized Network Data. Scott E. Coull, Charles V. Wright, Angelos D. Keromytis, Fabian Monrose, Michael K. Reiter |
| 2008 | Usable PIR. Peter Williams, Radu Sion |
| 2008 | Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects? Juan Caballero, Theocharis Kampouris, Dawn Song, Jia Wang |