| 2009 | 3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009. Saurabh Bagchi, Miguel Correia, Partha P. Pal |
| 2009 | A QoS-aware fault tolerant middleware for dependable service composition. Zibin Zheng, Michael R. Lyu |
| 2009 | A linguistic analysis engine for natural language use case description and its application to dependability analysis in industrial use cases. Avik Sinha, Amit M. Paradkar, Palani Kumanan, Branimir Boguraev |
| 2009 | A low-tech solution to avoid the severe impact of transient errors on the IP interconnect. Derek Graham, Per Strid, Scott Roy, Fernando Rodriguez |
| 2009 | A self-diagnosis technique using Reed-Solomon codes for self-repairing chips. Xiangyu Tang, Seongmoon Wang |
| 2009 | A simple equation for estimating reliability of an N+1 redundant array of independent disks (RAID). Jon G. Elerath |
| 2009 | An efficient XOR-scheduling algorithm for erasure codes encoding. Jianqiang Luo, Lihao Xu, James S. Plank |
| 2009 | An end-to-end approach for the automatic derivation of application-aware error detectors. Galen Lyle, Shelley Cheny, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
| 2009 | An energy efficient circuit level technique to protect register file from MBUs and SETs in embedded processors. Mahdi Fazeli, Alireza Namazi, Seyed Ghassem Miremadi |
| 2009 | Analyzing the process of installing rogue software. Robin Berthier, Jorge Arjona, Michel Cukier |
| 2009 | Automatic fault detection and diagnosis in complex software systems by information-theoretic monitoring. Miao Jiang, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward |
| 2009 | Blue-Watchdog: Detecting Bluetooth worm propagation in public areas. Guanhua Yan, Leticia Cuellar, Stephan J. Eidenbenz, Nicolas W. Hengartner |
| 2009 | Comparing anomaly-detection algorithms for keystroke dynamics. Kevin S. Killourhy, Roy A. Maxion |
| 2009 | Data management mechanisms for embedded system gateways. Justin Ray, Philip Koopman |
| 2009 | Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor. Hari Kannan, Michael Dalton, Christos Kozyrakis |
| 2009 | Dependability - How does the market value it? Gonçalo Quadros |
| 2009 | Dependability in the cloud: Challenges and opportunities. Kaustubh R. Joshi, Guy Bunker, Farnam Jahanian, Aad P. A. van Moorsel, Joseph Weinman |
| 2009 | Design and development of a proof-of-concept platooning application using the HIDENETS architecture. Luis Marques, António Casimiro, Mario Calha |
| 2009 | Deterministic high-speed simulation of complex systems including fault-injection. Matthias Sand, Stefan Potyra, Volkmar Sieh |
| 2009 | Dynamic content web applications: Crash, failover, and recovery analysis. Luiz Eduardo Buzato, Gustavo M. D. Vieira, Willy Zwaenepoel |
| 2009 | Effectiveness of machine checks for error diagnostics. Nikhil Pandit, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
| 2009 | Efficient resource management on template-based web servers. Eli Courtwright, Chuan Yue, Haining Wang |
| 2009 | Emµcode: Masking hard faults in complex functional units. Nicholas Weaver, John H. Kelm, Matthew I. Frank |
| 2009 | Evaluating the impact of Undetected Disk Errors in RAID systems. Eric Rozier, Wendy Belluomini, Veera Deenadhayalan, Jim Hafner, K. K. Rao, Pin Zhou |
| 2009 | Exception triggered DoS attacks on wireless networks. Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Hai Zhou, Zhi Fu |
| 2009 | Exploiting refactoring in formal verification. Xiang Yin, John C. Knight, Westley Weimer |
| 2009 | Fail-Aware Untrusted Storage. Christian Cachin, Idit Keidar, Alexander Shraer |
| 2009 | Fast Abstracts. Luigi Romano |
| 2009 | Fast memory state synchronization for virtualization-based fault tolerance. Maohua Lu, Tzi-cker Chiueh |
| 2009 | Fault isolation for device drivers. Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum |
| 2009 | Fifth Workshop on Hot Topics in System Dependability (HotDep 2009). Christof Fetzer, Rodrigo Rodrigues |
| 2009 | Fitness-guided path exploration in dynamic symbolic execution. Tao Xie, Nikolai Tillmann, Jonathan de Halleux, Wolfram Schulte |
| 2009 | Flexible multicast authentication for time-triggered embedded control network applications. Christopher Szilagyi, Philip Koopman |
| 2009 | Fluid modeling and control for server system performance and availability. Luc Malrait, Sara Bouchenak, Nicolas Marchand |
| 2009 | From assessment to standardised benchmarking: Will it happen? What could we do about it? Henrique Madeira, István Majzik |
| 2009 | Future prospects of research on security and dependability. Jacques Bus |
| 2009 | HC-BGP: A light-weight and flexible scheme for securing prefix ownership. Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. Charlie Hu |
| 2009 | I-JVM: a Java Virtual Machine for component isolation in OSGi. Nicolas Geoffray, Gaël Thomas, Gilles Muller, Pierre Parrend, Stéphane Frénot, Bertil Folliot |
| 2009 | ICT resilience of power control systems: experimental results from the CRUTIAL testbeds. Giovanna Dondossola, Fabrizio Garrone, Judit Szanto, Geert Deconinck, T. Loix, Hakem Beitollahi |
| 2009 | Intrusion-tolerant self-healing devices for critical infrastructure protection. Paulo Sousa, Alysson Neves Bessani, Wagner Saback Dantas, Fabio Souto, Miguel Correia, Nuno Ferreira Neves |
| 2009 | LFI: A practical and general library-level fault injector. Paul Dan Marinescu, George Candea |
| 2009 | Language level checkpointing support for stream processing applications. Gabriela Jacques-Silva, Bugra Gedik, Henrique Andrade, Kun-Lung Wu |
| 2009 | Low overhead Soft Error Mitigation techniques for high-performance and aggressive systems. Naga Durga Prasad Avirneni, Viswanathan Subramanian, Arun K. Somani |
| 2009 | MAP-AMVA: Approximate mean value analysis of bursty systems. Giuliano Casale, Evgenia Smirni |
| 2009 | Maximizing system lifetime by battery scheduling. Marijn R. Jongerden, Boudewijn R. Haverkort, Henrik C. Bohnenkamp, Joost-Pieter Katoen |
| 2009 | Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models. Tod Courtney, Shravan Gaonkar, Ken Keefe, Eric Rozier, William H. Sanders |
| 2009 | On the effectiveness of low latency anonymous network in the presence of timing attack. Jing Jin, Xinyuan Wang |
| 2009 | On the effectiveness of structural detection and defense against P2P-based botnets. Duc T. Ha, Guanhua Yan, Stephan J. Eidenbenz, Hung Q. Ngo |
| 2009 | Overloading vulnerability of VoIP networks. Hemant Sengar |
| 2009 | Parametric NdRFT for the derivation of optimal repair strategies. Marco Beccuti, Giuliana Franceschinis, Daniele Codetta Raiteri, Serge Haddad |
| 2009 | Power supply induced common cause faults-experimental assessment of potential countermeasures. Peter Tummeltshammer, Andreas Steininger |
| 2009 | Precise request tracing and performance debugging for multi-tier services of black boxes. Zhihong Zhang, Jianfeng Zhan, Yong Li, Lei Wang, Dan Meng, Bo Sang |
| 2009 | Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009 |
| 2009 | Processor reliability enhancement through compiler-directed register file peak temperature reduction. Chengmo Yang, Alex Orailoglu |
| 2009 | Providing transactional quality of service in event stream processing middleware. Robert E. Strom, Chitra Dorai |
| 2009 | RRE: A game-theoretic intrusion Response and Recovery Engine. Saman A. Zonouz, Himanshu Khurana, William H. Sanders, Timothy M. Yardley |
| 2009 | Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Peng Ning, Xiaolan Zhang |
| 2009 | Replacing linear Hamming codes by robust nonlinear codes results in a reliability improvement of memories. Zhen Wang, Mark G. Karpovsky, Konrad J. Kulikowski |
| 2009 | Report generation for simulation traces with Traviando. Peter Kemper |
| 2009 | Safety modeling and evaluation of Automated Highway Systems. Ossama Hamouda, Mohamed Kaâniche, Karama Kanoun |
| 2009 | Second workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS). Karthik Pattabiraman, Zbigniew Kalbarczyk |
| 2009 | Sharing end-user negative symptoms for improving overlay network dependability. Yongning Tang, Ehab Al-Shaer |
| 2009 | Spam detection in voice-over-IP calls through semi-supervised clustering. Yu-Sung Wu, Saurabh Bagchi, Navjot Singh, Ratsameetip Wita |
| 2009 | Stretching gossip with live streaming. Davide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Maxime Monod, Vivien Quéma |
| 2009 | Student Forum. Marco Vieira |
| 2009 | System log pre-processing to improve failure prediction. Ziming Zheng, Zhiling Lan, Byung-Hoon Park, Al Geist |
| 2009 | System safety as an emergent property in composite systems. Jennifer Black, Philip Koopman |
| 2009 | Third workshop on dependable and secure nanocomputing. Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Johan Karlsson, Michael Nicolaidis |
| 2009 | Using web security scanners to detect vulnerabilities in web services. Marco Vieira, Nuno Antunes, Henrique Madeira |
| 2009 | VNsnap: Taking snapshots of virtual networked environments with minimal downtime. Ardalan Kangarlou, Patrick Eugster, Dongyan Xu |
| 2009 | Verme: Worm containment in overlay networks. Filipe Freitas, Edgar Marques, Rodrigo Rodrigues, Carlos Ribeiro, Paulo Ferreira, Luís E. T. Rodrigues |
| 2009 | Vulnerability & attack injection for web applications. José Fonseca, Marco Vieira, Henrique Madeira |
| 2009 | WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks. Roberto Perdisci, Manos Antonakakis, Xiapu Luo, Wenke Lee |
| 2009 | WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code. Julia L. Lawall, Julien Brunel, Nicolas Palix, René Rydhof Hansen, Henrik Stuart, Gilles Muller |
| 2009 | Workshop on Architecting Dependable Systems (WADS 2009). António Casimiro, Rogério de Lemos, Cristina Gacek |
| 2009 | Workshop on proactive failure avoidance, recovery and maintenance (PFARM). Miroslaw Malek, Felix Salfner, Kishor S. Trivedi |
| 2009 | Xprobe2++: Low volume remote network information gathering tool. Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, Shih-Yao Dai, Yennun Huang, Sy-Yen Kuo |