| 2008 | 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA |
| 2008 | Anonymous Networking with Minimum Latency in Multihop Networks. Parvathinathan Venkitasubramaniam, Lang Tong |
| 2008 | Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage. Bruno Blanchet, Avik Chaudhuri |
| 2008 | Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. David Brumley, Pongsin Poosankam, Dawn Xiaodong Song, Jiang Zheng |
| 2008 | Casting out Demons: Sanitizing Training Data for Anomaly Sensors. Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis |
| 2008 | Civitas: Toward a Secure Voting System. Michael R. Clarkson, Stephen Chong, Andrew C. Myers |
| 2008 | ClearShot: Eavesdropping on Keyboard Input from Video. Davide Balzarotti, Marco Cova, Giovanni Vigna |
| 2008 | Cloaker: Hardware Supported Rootkit Concealment. Francis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell |
| 2008 | Compromising Reflections-or-How to Read LCD Monitors around the Corner. Michael Backes, Markus Dürmuth, Dominique Unruh |
| 2008 | Efficient and Robust TCP Stream Normalization. Mythili Vutukuru, Hari Balakrishnan, Vern Paxson |
| 2008 | Expressive Declassification Policies and Modular Static Enforcement. Anindya Banerjee, David A. Naumann, Stan Rosenberg |
| 2008 | Fable: A Language for Enforcing User-defined Security Policies. Nikhil Swamy, Brian J. Corcoran, Michael Hicks |
| 2008 | Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj |
| 2008 | Lares: An Architecture for Secure Active Monitoring Using Virtualization. Bryan D. Payne, Martim Carbone, Monirul Islam Sharif, Wenke Lee |
| 2008 | Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, William H. Maisel |
| 2008 | Practical Proactive Integrity Preservation: A Basis for Malware Defense. Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karandikar |
| 2008 | Predictable Design of Network-Based Covert Communication Systems. Ronald William Smith, George Scott Knight |
| 2008 | Preserving Caller Anonymity in Voice-over-IP Networks. Mudhakar Srivatsa, Ling Liu, Arun Iyengar |
| 2008 | Preventing Memory Error Exploits with WIT. Periklis Akritidis, Cristian Cadar, Costin Raiciu, Manuel Costa, Miguel Castro |
| 2008 | Robust De-anonymization of Large Sparse Datasets. Arvind Narayanan, Vitaly Shmatikov |
| 2008 | Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna |
| 2008 | Secure Web Browsing with the OP Web Browser. Chris Grier, Shuo Tang, Samuel T. King |
| 2008 | Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations. Charles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson |
| 2008 | SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, Feng Xiao |
| 2008 | Thinking Inside the Box: System-Level Failures of Tamper Proofing. Saar Drimer, Steven J. Murdoch, Ross J. Anderson |
| 2008 | Towards Practical Privacy for Genomic Computation. Somesh Jha, Louis Kruger, Vitaly Shmatikov |
| 2008 | Verifying the Safety of User Pointer Dereferences. Suhabe Bugrara, Alex Aiken |
| 2008 | XFA: Faster Signature Matching with Extended Automata. Randy Smith, Cristian Estan, Somesh Jha |
| 2008 | Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. Michael Backes, Matteo Maffei, Dominique Unruh |