@unpublished{hosd, author = {Gilray, Thomas and Sahebolamri, Arash and Kumar, Sidharth and Micinski, Kristopher}, title = {Higher-Order Structured Deduction}, note = {Submission currently under blind review}, month = {September}, year = {2022}, url = {https://kmicinski.com/assets/hosd.pdf} }
@inproceedings{KeFan:2022, author = {Fan, Ke and Gilray, Thomas and Pascucci, Valerio and Huang, Xuan and Micinski, Kristopher and Kumar, Sidharth}, title = {Optimizing the Bruck Algorithm for Non-Uniform All-to-All Communication}, year = {2022}, isbn = {9781450391993}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3502181.3531468}, doi = {10.1145/3502181.3531468}, booktitle = {Proceedings of the 31st International Symposium on High-Performance Parallel and Distributed Computing}, pages = {172–184}, numpages = {13}, keywords = {mpi, collective communication, bruck algorithm, alltoallv}, location = {Minneapolis, MN, USA}, series = {HPDC '22} }
@inproceedings{Sahebolamri:2022, author = {Sahebolamri, Arash and Gilray, Thomas and Micinski, Kristopher}, title = {Seamless Deductive Inference via Macros}, year = {2022}, isbn = {9781450391832}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://dl.acm.org/doi/abs/10.1145/3497776.3517779}, doi = {10.1145/3497776.3517779}, booktitle = {Proceedings of the 31st ACM SIGPLAN International Conference on Compiler Construction}, pages = {77–88}, numpages = {12}, keywords = {Logic Programming, Ascent, Static Analysis, Program Analysis, Datalog, Rust}, location = {Seoul, South Korea}, series = {CC 2022} }
@inproceedings{KeFan:2021, author = {Fan, Ke and Micinski, Kristopher and Gilray, Thomas and Kumar, Sidharth}, booktitle = {2021 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)}, title = {Exploring MPI Collective I/O and File-per-process I/O for Checkpointing a Logical Inference Task}, year = {2021}, volume = {}, number = {}, url = {https://ieeexplore.ieee.org/abstract/document/9460577}, pages = {965-972}, doi = {10.1109/IPDPSW52791.2021.00153} }
@inproceedings{Gilray:2021, author = {Gilray, Thomas and Kumar, Sidharth and Micinski, Kristopher}, title = {Compiling Data-Parallel Datalog}, year = {2021}, isbn = {9781450383257}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3446804.3446855}, doi = {10.1145/3446804.3446855}, booktitle = {Proceedings of the 30th ACM SIGPLAN International Conference on Compiler Construction}, pages = {23–35}, numpages = {13}, keywords = {Datalog, Relational Algebra, Parallelism, Logic}, location = {Virtual, Republic of Korea}, series = {CC 2021} }
@inproceedings{faamcets, author = {Micinski, Kristopher and Darais, David and Gilray, Thomas}, title = {Abstracting Faceted Execution}, booktitle = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston, Massachusetts, June 22-26, 2020}, publisher = {{IEEE} Computer Society}, url = {http://kmicinski.com/assets/faamcets.pdf}, year = {2020} }
@inproceedings{votipka:usenix19, author = {Votipka, Daniel and Rabin, Seth and Micinski, Kristopher and Foster, Jeffrey S. and Mazurek, Michelle L.}, title = {An Observational Investigation of Reverse Engineers' Processes}, year = {2019}, url = {http://kmicinski.com/assets/usenix19.pdf}, series = {USENIX Security} }
@inproceedings{micinski:hogarth, author = {Kristopher Micinski and Thomas Gilray and Daniel Votipka and Jeffrey S. Foster and Michelle L. Mazurek}, title = {Symbolic Path Tracing to Find Android Permission-Use Triggers}, booktitle = {To appear at the NDSS workshop on Binary Analysis Research (BAR '19)}, url = {http://kmicinski.com/assets/icst2019.pdf}, year = {2019} }
@inproceedings{micinski:sw19sub, author = {Kristopher Micinski and Zhanpeng Wang and Thomas Gilray}, title = {Racets: Faceted Execution in Racket}, booktitle = {ACM Workshop on Scheme and Functional Programming (Scheme) '18}, url = {http://kmicinski.com/assets/scheme19.pdf}, year = {2018} }
@inproceedings{votipka:soups18, author = {Daniel Votipka and Kristopher Micinski and Seth M. Rabin and Thomas Gilray and Michelle M. Mazurek and Jeffrey S. Foster}, title = {User Comfort with Android Background Resource Accesses in Different Contexts}, booktitle = {Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018)}, year = {2018}, address = {Baltimore, MD}, url = {http://kmicinski.com/assets/soups18.pdf}, publisher = {{USENIX} Association} }
@inproceedings{micinski:apptracer, author = {Kristopher Micinski and Daniel Votipka and Rock Stevens and Nikolaos Kofinas and Jeffrey S. Foster and Michelle L. Mazurek}, title = {User Interactions and Permission Use on Android}, booktitle = {ACM CHI Conference on Human Factors in Computing Systems (CHI '17)}, url = {http://kmicinski.com/assets/apptracer.pdf}, year = {2017}, address = {Denver, CO} }
@inproceedings{micinski:esorics15, author = {Kristopher Micinski and Jonathan Fetter-Degges and Jinseong Jeon and Jeffrey S. Foster and Michael R. Clarkson}, title = {{Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution}}, booktitle = {European Symposium on Research in Computer Security (ESORICS '15)}, pages = {520--538}, year = {2015}, url = {http://www.cs.cornell.edu/~clarkson/papers/clarkson_clickrelease.pdf}, volume = {9327}, series = {Lecture Notes in Computer Science}, address = {Vienna, Austria}, month = {September} }
@incollection{clarkson:post14, year = {2014}, isbn = {978-3-642-54791-1}, booktitle = {Principles of Security and Trust (POST '14)}, volume = {8414}, series = {Lecture Notes in Computer Science}, editor = {Abadi, Martín and Kremer, Steve}, doi = {10.1007/978-3-642-54792-8_15}, title = {Temporal Logics for Hyperproperties}, url = {http://cs.umd.edu/~micinski/post14.pdf}, publisher = {Springer Berlin Heidelberg}, author = {Clarkson, Michael R. and Finkbeiner, Bernd and Koleini, Masoud and Micinski, KristopherK. and Rabe, Markus N. and Sánchez, César}, pages = {265-284}, language = {English} }
@inproceedings{micinski:most13, author = {Kristopher Micinski and Philip Phelps and Jeffrey S. Foster}, title = {{An Empirical Study of Location Truncation on Android}}, booktitle = {Mobile Security Technologies (MoST '13)}, year = {2013}, url = {http://www.cs.umd.edu/~jfoster/papers/most13.pdf}, address = {San Francisco, CA}, month = {May} }
@inproceedings{jeon:spsm12, author = {Jinseong Jeon and Kristopher K. Micinski and Jeffrey A. Vaughan and Ari Fogel and Nikhilesh Reddy and Jeffrey S. Foster and Todd Millstein}, title = {{Dr. Android and Mr. Hide: Fine-grained Permissions in Android Applications}}, booktitle = {ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '12)}, pages = {3--14}, year = {2012}, url = {http://cs.umd.edu/~jfoster/papers/spsm12.pdf}, address = {Raleigh, NC, USA}, month = {October} }
@techreport{jeon:cs-tr-5022, author = {Jinseong Jeon and Kristopher K. Micinski and Jeffrey S. Foster}, title = {{SymDroid: Symbolic Execution for Dalvik Bytecode}}, institution = {Department of Computer Science, University of Maryland, College Park}, year = {2012}, url = {http://www.cs.umd.edu/~jfoster/papers/cs-tr-5022.pdf}, number = {CS-TR-5022}, month = {July} }
This file was generated by bibtex2html 1.99.