| 2025 | 30th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2025, Seoul, Republic of Korea, November 3-5, 2025 |
| 2025 | A Self-Synchronizing Cyber Deception Framework via Infrastructure as Code Reflection. Junyeong Park, Sayeon Kim, Woohyun Jang, Yeon-Jae Kim, Shinwoo Shim, Olmi Lee, Ki-Woong Park |
| 2025 | A Study on User Approval Criteria and User Interfaces for Dependability of AI-based Code Generation Tools. Minseo Ju, Hyung Kook Jun, Taeho Kim, Hyung-Jong Kim |
| 2025 | An Analysis of Sui's Transactions and Conflicts. Dvir Biton, Roy Friedman |
| 2025 | An Approach to Creating the Optimal Attack Path Based on Reinforcement Learning. Hyo Sun Lee, Min Geun Song, Huy Kang Kim |
| 2025 | Automated Timeline-Based Forensic Report Generation with Anomaly Detection and LLM-Based CTI Mapping. Yongsik Kim, Saehee Jun, Junho Jang, Huy Kang Kim |
| 2025 | Automated Vulnerability Repair of Obfuscated and Non-Obfuscated Smart Contracts Using Large Language Models. Chihiro Kado, Tatsuhiro Tsuchiya |
| 2025 | CLGuard: A Context-Aware Suppression Framework for Resilient Driving Control. Yeongju Seong, Hyuk Lim, Seunghyun Yoon |
| 2025 | Dependable Code Repair with LLMs: AI-Driven Vulnerability Detection and Automated Patching. Sungmin Han, Hyoungshick Kim, Hojoon Lee, Hyungon Moon, Yuseok Jeon, Ho Bae, Donghyun Yeo, Gail-Joon Ahn, Sangkyun Lee |
| 2025 | Efficient Scheduling of Smart Contract Transactions via Conflict Graph Coloring. Ankit Ravish, Yaron Hay, Manaswini Piduguralla, Rishabh Jain, Roy Friedman, Sathya Peri |
| 2025 | GALAXY: Generalized Attention-Based LSTM Architecture with External Query for Intrusion Detection in UAV Communication. Jae Yeon Lee, Huy Kang Kim |
| 2025 | Guided Importance Sampling for Safety and Reliability: A Pragmatic Comparison of Symbolic and Simulation-Based Approaches. Tim Gonschorek, Frank Ortmeier |
| 2025 | Integrating Threat Analysis and Formal Verification for Secure OTA Updates. Sheraz Mazhar, Abdur Rakib, Robin Doss, Adnan Anwar, Frank Jiang |
| 2025 | Keyspector: Secure Monitoring of IoT Devices Using RISC-V Keystone. Takahito Iwano, Kenichi Kourai |
| 2025 | Orchestrating Fail-Safe, Black-Box Models Within Federated Learning Scenarios. Fahad Ahmed KhoKhar, Tommaso Zoppi, Jamal Hussain Shah |
| 2025 | Physics-Guided and Explainable Anomaly Detection for IEC 61850 Sampled Values. Sunoh Ryu, Ryangsoo Kim, Hark Yoo, Hyuk Lim, Seunghyun Yoon |
| 2025 | Robustness Evaluation Under RGB-Camera Attacks in CARLA: A Systematic Evaluation of Color Modes and Attack Types. Yufeng Lin, Sangmin Park, Hyunjae Kang, Huy Kang Kim, Dan Dongseong Kim |
| 2025 | SIROCCO: A Dry Wind to Warn you from Bluetooth Attacks. Paul L. R. Olivier, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Romain Cayre |
| 2025 | Speeding Up the Development for the Computing Continuum with WebAssembly. Mehmet Cihan Sakman, Josef Spillner, Valerio Schiavoni |
| 2025 | Support System for Creating Medical Incident and Accident Reports Utilizing Two Types of Medical Accident Databases. Koichi Bando, Kenjiro Inaba, Sachiko Honda, Tetsuro Yumoto, Atsunobu Sagara, Kenji Tanaka |
| 2025 | TZmediator: Secure Cooperative Execution of Cloud Applications Using POSIX APIs on Arm TrustZone. Taiyo Sato, Kenichi Kourai |
| 2025 | Toward Dependability Simulation for Intelligent Transportation Systems in Connected Vehicle Environments. Saehoon Oh, Sangbeom Park, Gang Min Kim, Huy Kang Kim |
| 2025 | Toward an Autonomous Purple Teaming Framework for Security and Safety in Large Language Models. Leo Hyun Park, Yoonsik Kim, Eunbi Hwang, Sangsoo Han, Hyoungshick Kim, Taekyoung Kwon |
| 2025 | Towards Secure Containerized Applications with Seccomp Profile Refinement. Linh Nguyen-Thuy, Long Nguyen-Vu, Thien-Phuc Doan, Jungsoo Park, Souhwan Jung |