| 2008 | A user study of off-the-record messaging. Ryan Stedman, Kayo Yoshida, Ian Goldberg |
| 2008 | Analyzing websites for user-visible security design flaws. Laura Falk, Atul Prakash, Kevin Borders |
| 2008 | Evaluating assistance of natural language policy authoring. Kami Vaniea, Clare-Marie Karat, Joshua B. Gross, John Karat, Carolyn Brodie |
| 2008 | Evaluating the usability of usage controls in electronic collaboration. José Carlos Brustoloni, Ricardo Villamarín-Salomón, Peter Djalaliev, David Kyle |
| 2008 | Expressions of expertness: the virtuous circle of natural language for access control policy specification. Philip Inglesant, Martina Angela Sasse, David W. Chadwick, Lei Lei Shi |
| 2008 | Improving text passwords through persuasion. Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle |
| 2008 | Personal knowledge questions for fallback authentication: security questions in the era of Facebook. Ariel Rabkin |
| 2008 | Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008 Lorrie Faith Cranor |
| 2008 | Securing passfaces for description. Paul Dunphy, James Nicholson, Patrick Olivier |
| 2008 | The challenges of using an intrusion detection system: is it worth the effort? Rodrigo Werlinger, Kirstie Hawkey, Kasia Muldner, Pooya Jaferian, Konstantin Beznosov |
| 2008 | Universal device pairing using an auxiliary device. Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris |
| 2008 | Usability of CAPTCHAs or usability issues in CAPTCHA design. Jeff Yan, Ahmad Salah El Ahmad |
| 2008 | Use Your Illusion: secure authentication usable anywhere. Eiji Hayashi, Rachna Dhamija, Nicolas Christin, Adrian Perrig |