| 2008 | A Lightweight Container Architecture for Runtime Verification. Hakim Belhaouari, Frédéric Peschanski |
| 2008 | A Scalable, Sound, Eventually-Complete Algorithm for Deadlock Immunity. Horatiu Jula, George Candea |
| 2008 | A Smell of Orchids. Jean Goubault-Larrecq, Julien Olivain |
| 2008 | Checking Traces for Regulatory Conformance. Nikhil Dinesh, Aravind K. Joshi, Insup Lee, Oleg Sokolsky |
| 2008 | Deadlocks: From Exhibiting to Healing. Yarden Nir-Buchbinder, Rachel Tzoref, Shmuel Ur |
| 2008 | Forays into Sequential Composition and Concatenation in Eagle. Joachim Baran, Howard Barringer |
| 2008 | Model-Based Run-Time Checking of Security Permissions Using Guarded Objects. Jan Jürjens |
| 2008 | Property Patterns for Runtime Monitoring of Web Service Conversations. Jocelyn Simmonds, Marsha Chechik, Shiva Nejati, Elena Litani, Bill O'Farrell |
| 2008 | Runtime Certification. John M. Rushby |
| 2008 | Runtime Monitoring of Object Invariants with Guarantee. Madhu Gopinathan, Sriram K. Rajamani |
| 2008 | Runtime Verification, 8th International Workshop, RV 2008, Budapest, Hungary, March 30, 2008. Selected Papers Martin Leucker |
| 2008 | Synthesizing Monitors for Safety Properties: This Time with Calls and Returns. Grigore Rosu, Feng Chen, Thomas Ball |