[1] Thomas Gilray, Arash Sahebolamri, Sidharth Kumar, and Kristopher Micinski. Higher-order structured deduction. Submission currently under blind review, September 2022. [ bib | .pdf ]
[2] Ke Fan, Thomas Gilray, Valerio Pascucci, Xuan Huang, Kristopher Micinski, and Sidharth Kumar. Optimizing the bruck algorithm for non-uniform all-to-all communication. In Proceedings of the 31st International Symposium on High-Performance Parallel and Distributed Computing, HPDC '22, page 172–184, New York, NY, USA, 2022. Association for Computing Machinery. [ bib | DOI | http ]
Keywords: mpi, collective communication, bruck algorithm, alltoallv
[3] Arash Sahebolamri, Thomas Gilray, and Kristopher Micinski. Seamless deductive inference via macros. In Proceedings of the 31st ACM SIGPLAN International Conference on Compiler Construction, CC 2022, page 77–88, New York, NY, USA, 2022. Association for Computing Machinery. [ bib | DOI | http ]
Keywords: Logic Programming, Ascent, Static Analysis, Program Analysis, Datalog, Rust
[4] Ke Fan, Kristopher Micinski, Thomas Gilray, and Sidharth Kumar. Exploring mpi collective i/o and file-per-process i/o for checkpointing a logical inference task. In 2021 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), pages 965--972, 2021. [ bib | DOI | http ]
[5] Thomas Gilray, Sidharth Kumar, and Kristopher Micinski. Compiling data-parallel datalog. In Proceedings of the 30th ACM SIGPLAN International Conference on Compiler Construction, CC 2021, page 23–35, New York, NY, USA, 2021. Association for Computing Machinery. [ bib | DOI | http ]
Keywords: Datalog, Relational Algebra, Parallelism, Logic
[6] Kristopher Micinski, David Darais, and Thomas Gilray. Abstracting faceted execution. In 33rd IEEE Computer Security Foundations Symposium, CSF 2020, Boston, Massachusetts, June 22-26, 2020. IEEE Computer Society, 2020. [ bib | .pdf ]
[7] Daniel Votipka, Seth Rabin, Kristopher Micinski, Jeffrey S. Foster, and Michelle L. Mazurek. An observational investigation of reverse engineers' processes. USENIX Security, 2019. [ bib | .pdf ]
[8] Kristopher Micinski, Thomas Gilray, Daniel Votipka, Jeffrey S. Foster, and Michelle L. Mazurek. Symbolic path tracing to find android permission-use triggers. In To appear at the NDSS workshop on Binary Analysis Research (BAR '19), 2019. [ bib | .pdf ]
[9] Kristopher Micinski, Zhanpeng Wang, and Thomas Gilray. Racets: Faceted execution in racket. In ACM Workshop on Scheme and Functional Programming (Scheme) '18, 2018. [ bib | .pdf ]
[10] Daniel Votipka, Kristopher Micinski, Seth M. Rabin, Thomas Gilray, Michelle M. Mazurek, and Jeffrey S. Foster. User comfort with android background resource accesses in different contexts. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), Baltimore, MD, 2018. USENIX Association. [ bib | .pdf ]
[11] Kristopher Micinski, Daniel Votipka, Rock Stevens, Nikolaos Kofinas, Jeffrey S. Foster, and Michelle L. Mazurek. User interactions and permission use on android. In ACM CHI Conference on Human Factors in Computing Systems (CHI '17), Denver, CO, 2017. [ bib | .pdf ]
[12] Kristopher Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey S. Foster, and Michael R. Clarkson. Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution. In European Symposium on Research in Computer Security (ESORICS '15), volume 9327 of Lecture Notes in Computer Science, pages 520--538, Vienna, Austria, September 2015. [ bib | .pdf ]
[13] Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, KristopherK. Micinski, Markus N. Rabe, and César Sánchez. Temporal logics for hyperproperties. In Martín Abadi and Steve Kremer, editors, Principles of Security and Trust (POST '14), volume 8414 of Lecture Notes in Computer Science, pages 265--284. Springer Berlin Heidelberg, 2014. [ bib | DOI | .pdf ]
[14] Kristopher Micinski, Philip Phelps, and Jeffrey S. Foster. An Empirical Study of Location Truncation on Android. In Mobile Security Technologies (MoST '13), San Francisco, CA, May 2013. [ bib | .pdf ]
[15] Jinseong Jeon, Kristopher K. Micinski, Jeffrey A. Vaughan, Ari Fogel, Nikhilesh Reddy, Jeffrey S. Foster, and Todd Millstein. Dr. Android and Mr. Hide: Fine-grained Permissions in Android Applications. In ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '12), pages 3--14, Raleigh, NC, USA, October 2012. [ bib | .pdf ]
[16] Jinseong Jeon, Kristopher K. Micinski, and Jeffrey S. Foster. SymDroid: Symbolic Execution for Dalvik Bytecode. Technical Report CS-TR-5022, Department of Computer Science, University of Maryland, College Park, July 2012. [ bib | .pdf ]

This file was generated by bibtex2html 1.99.