| An SSH-based Toolkit for User-based Network Services | LISA '09 | Joyita Sikder, Manigandan Radhakrishnan, Jon A. Solworth |
| Delay/Disruption Tolerant Networking | LISA '09 | Keith Scott |
| Towards Zero-Emission Datacenters Through Direct Reuse of Waste Heat | LISA '09 | Bruno Michel |
| Federated Access Control and Workflow Enforcement in Systems Configuration | LISA '09 | Bart Vanbrabant, Thomas Delaet, Wouter Joosen |
| CIMDIFF: Advanced Difference Tracking Tool for CIM Compliant Devices | LISA '09 | Ramani Routray, Shripad Nadgowda |
| Transparent Mobile Storage Protection in Trusted Virtual Domains | LISA '09 | Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy |
| Visualizing DTrace: Sun Storage 7000 Analytics | LISA '09 | Bryan Cantrill |
| E Unum Pluribus: Google Network Filtering Management | LISA '09 | Paul (Tony) Watson, Peter Moody |
| Above the Clouds: A Berkeley View of Cloud Computing | LISA '09 | Armando Fox |
| Frank Lloyd Wright Was Right! | LISA '09 | Daniel V. Klein |
| Keynote Address | EVT/WOTE '09 | Lawrence Norden |
| Now Do Voters Notice Review Screen Anomalies? A Look at Voting System Usability | EVT/WOTE '09 | Bryan A. Campbell, Michael D. Byrne |
| Style Guide for Voting System Documentation: Why User-Centered Documentation Matters to Voting Security | EVT/WOTE '09 | Dana Chisnell, Susan Becker, Sharon Laskowski, Svetlana Lowry |
| E-Voting and Forensics: Prying Open the Black Box | EVT/WOTE '09 | Matt Bishop, Sean Peisert, Candice Hoke, Mark Graff |
| Detecting Voter Fraud in an Electronic Voting Context: An Analysis of the Unlimited Reelection Vote in Venezuela | EVT/WOTE '09 | Inés Levin, Gabe A. Cohn, Peter C. Ordeshook, R. Michael Alvarez |
| Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage | EVT/WOTE '09 | Stephen Checkoway, Ariel J. Feldman, Brian Kantor, J. Alex Halderman, Edward W. Felten, Hovav Shacham |
| Understanding the Security Properties of Ballot-Based Verification Techniques | EVT/WOTE '09 | Eric Rescorla |
| VoteBox Nano: A Smaller, Stronger FPGA-based Voting Machine | EVT/WOTE '09 | Ersin Öksüzoǧlu, Dan S. Wallach |
| Some Consequences of Paper Fingerprinting for Elections | EVT/WOTE '09 | Joseph A. Calandrino, William Clarkson |
| Invited Talk | EVT/WOTE '09 | The Honorable Rush Holt (NJ) |
| Voting Cryptography Tutorial for Non-Cryptographers | EVT/WOTE '09 | Ben Adida |
| Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios | EVT/WOTE '09 | Olivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater |
| Efficient Receipt-Free Ballot Casting Resistant to Covert Channels | EVT/WOTE '09 | C. Andrew Neff |
| On Subliminal Channels in Encrypt-on-Cast Voting Systems | EVT/WOTE '09 | Ariel J. Feldman, Josh Benaloh |
| Permutations in Prêt à Voter | EVT/WOTE '09 | Peter Y A Ryan, Vanessa Teague |