micinski.bib

@unpublished{hosd,
  author = {Gilray, Thomas and Sahebolamri, Arash and Kumar, Sidharth and Micinski, Kristopher},
  title = {Higher-Order Structured Deduction},
  note = {Submission currently under blind review},
  month = {September},
  year = {2022},
  url = {https://kmicinski.com/assets/hosd.pdf}
}
@inproceedings{KeFan:2022,
  author = {Fan, Ke and Gilray, Thomas and Pascucci, Valerio and Huang, Xuan and Micinski, Kristopher and Kumar, Sidharth},
  title = {Optimizing the Bruck Algorithm for Non-Uniform All-to-All Communication},
  year = {2022},
  isbn = {9781450391993},
  publisher = {Association for Computing Machinery},
  address = {New York, NY, USA},
  url = {https://doi.org/10.1145/3502181.3531468},
  doi = {10.1145/3502181.3531468},
  booktitle = {Proceedings of the 31st International Symposium on High-Performance Parallel and Distributed Computing},
  pages = {172–184},
  numpages = {13},
  keywords = {mpi, collective communication, bruck algorithm, alltoallv},
  location = {Minneapolis, MN, USA},
  series = {HPDC '22}
}
@inproceedings{Sahebolamri:2022,
  author = {Sahebolamri, Arash and Gilray, Thomas and Micinski, Kristopher},
  title = {Seamless Deductive Inference via Macros},
  year = {2022},
  isbn = {9781450391832},
  publisher = {Association for Computing Machinery},
  address = {New York, NY, USA},
  url = {https://dl.acm.org/doi/abs/10.1145/3497776.3517779},
  doi = {10.1145/3497776.3517779},
  booktitle = {Proceedings of the 31st ACM SIGPLAN International Conference on Compiler Construction},
  pages = {77–88},
  numpages = {12},
  keywords = {Logic Programming, Ascent, Static Analysis, Program Analysis, Datalog, Rust},
  location = {Seoul, South Korea},
  series = {CC 2022}
}
@inproceedings{KeFan:2021,
  author = {Fan, Ke and Micinski, Kristopher and Gilray, Thomas and Kumar, Sidharth},
  booktitle = {2021 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)},
  title = {Exploring MPI Collective I/O and File-per-process I/O for Checkpointing a Logical Inference Task},
  year = {2021},
  volume = {},
  number = {},
  url = {https://ieeexplore.ieee.org/abstract/document/9460577},
  pages = {965-972},
  doi = {10.1109/IPDPSW52791.2021.00153}
}
@inproceedings{Gilray:2021,
  author = {Gilray, Thomas and Kumar, Sidharth and Micinski, Kristopher},
  title = {Compiling Data-Parallel Datalog},
  year = {2021},
  isbn = {9781450383257},
  publisher = {Association for Computing Machinery},
  address = {New York, NY, USA},
  url = {https://doi.org/10.1145/3446804.3446855},
  doi = {10.1145/3446804.3446855},
  booktitle = {Proceedings of the 30th ACM SIGPLAN International Conference on Compiler Construction},
  pages = {23–35},
  numpages = {13},
  keywords = {Datalog, Relational Algebra, Parallelism, Logic},
  location = {Virtual, Republic of Korea},
  series = {CC 2021}
}
@inproceedings{faamcets,
  author = {Micinski, Kristopher and Darais, David and Gilray, Thomas},
  title = {Abstracting Faceted Execution},
  booktitle = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston,
               Massachusetts, June 22-26, 2020},
  publisher = {{IEEE} Computer Society},
  url = {http://kmicinski.com/assets/faamcets.pdf},
  year = {2020}
}
@inproceedings{votipka:usenix19,
  author = {Votipka, Daniel and Rabin, Seth and Micinski, Kristopher and Foster, Jeffrey S. and Mazurek, Michelle L.},
  title = {An Observational Investigation of Reverse Engineers' Processes},
  year = {2019},
  url = {http://kmicinski.com/assets/usenix19.pdf},
  series = {USENIX Security}
}
@inproceedings{micinski:hogarth,
  author = {Kristopher Micinski and Thomas Gilray and Daniel Votipka and Jeffrey S. Foster and Michelle L. Mazurek},
  title = {Symbolic Path Tracing to Find Android Permission-Use Triggers},
  booktitle = {To appear at the NDSS workshop on Binary Analysis Research (BAR '19)},
  url = {http://kmicinski.com/assets/icst2019.pdf},
  year = {2019}
}
@inproceedings{micinski:sw19sub,
  author = {Kristopher Micinski and Zhanpeng Wang and Thomas Gilray},
  title = {Racets: Faceted Execution in Racket},
  booktitle = {ACM Workshop on Scheme and Functional Programming (Scheme) '18},
  url = {http://kmicinski.com/assets/scheme19.pdf},
  year = {2018}
}
@inproceedings{votipka:soups18,
  author = {Daniel Votipka and Kristopher Micinski and Seth M. Rabin and Thomas Gilray and Michelle M. Mazurek and Jeffrey S. Foster},
  title = {User Comfort with Android Background Resource Accesses in Different Contexts},
  booktitle = {Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018)},
  year = {2018},
  address = {Baltimore, MD},
  url = {http://kmicinski.com/assets/soups18.pdf},
  publisher = {{USENIX} Association}
}
@inproceedings{micinski:apptracer,
  author = {Kristopher Micinski and Daniel Votipka and Rock Stevens and Nikolaos Kofinas and Jeffrey S. Foster and Michelle L. Mazurek},
  title = {User Interactions and Permission Use on Android},
  booktitle = {ACM CHI Conference on Human Factors in Computing Systems (CHI '17)},
  url = {http://kmicinski.com/assets/apptracer.pdf},
  year = {2017},
  address = {Denver, CO}
}
@inproceedings{micinski:esorics15,
  author = {Kristopher Micinski and Jonathan Fetter-Degges and Jinseong Jeon and Jeffrey S. Foster and Michael R. Clarkson},
  title = {{Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution}},
  booktitle = {European Symposium on Research in Computer Security (ESORICS '15)},
  pages = {520--538},
  year = {2015},
  url = {http://www.cs.cornell.edu/~clarkson/papers/clarkson_clickrelease.pdf},
  volume = {9327},
  series = {Lecture Notes in Computer Science},
  address = {Vienna, Austria},
  month = {September}
}
@incollection{clarkson:post14,
  year = {2014},
  isbn = {978-3-642-54791-1},
  booktitle = {Principles of Security and Trust (POST '14)},
  volume = {8414},
  series = {Lecture Notes in Computer Science},
  editor = {Abadi, Martín and Kremer, Steve},
  doi = {10.1007/978-3-642-54792-8_15},
  title = {Temporal Logics for Hyperproperties},
  url = {http://cs.umd.edu/~micinski/post14.pdf},
  publisher = {Springer Berlin Heidelberg},
  author = {Clarkson, Michael R. and Finkbeiner, Bernd and Koleini, Masoud and Micinski, KristopherK. and Rabe, Markus N. and Sánchez, César},
  pages = {265-284},
  language = {English}
}
@inproceedings{micinski:most13,
  author = {Kristopher Micinski and Philip Phelps and Jeffrey S. Foster},
  title = {{An Empirical Study of Location Truncation on Android}},
  booktitle = {Mobile Security Technologies (MoST '13)},
  year = {2013},
  url = {http://www.cs.umd.edu/~jfoster/papers/most13.pdf},
  address = {San Francisco, CA},
  month = {May}
}
@inproceedings{jeon:spsm12,
  author = {Jinseong Jeon and Kristopher K. Micinski and Jeffrey A. Vaughan and Ari Fogel and Nikhilesh Reddy and Jeffrey S. Foster and Todd Millstein},
  title = {{Dr. Android and Mr. Hide: Fine-grained Permissions in Android Applications}},
  booktitle = {ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '12)},
  pages = {3--14},
  year = {2012},
  url = {http://cs.umd.edu/~jfoster/papers/spsm12.pdf},
  address = {Raleigh, NC, USA},
  month = {October}
}
@techreport{jeon:cs-tr-5022,
  author = {Jinseong Jeon and Kristopher K. Micinski and Jeffrey S. Foster},
  title = {{SymDroid: Symbolic Execution for Dalvik Bytecode}},
  institution = {Department of Computer Science, University of Maryland, College Park},
  year = {2012},
  url = {http://www.cs.umd.edu/~jfoster/papers/cs-tr-5022.pdf},
  number = {CS-TR-5022},
  month = {July}
}

This file was generated by bibtex2html 1.99.