Abstracting Faceted Execution: Static Analysis of Dynamic Information-Flow Control for Higher-Order Languages. Kristopher Micinski, David Darais, and Thomas Gilray. In submission to ESOP '19, 2018. [ bib | .pdf ]
 
Symbolic Path Tracing to Find Android Permission-Use Triggers. Kristopher Micinski, Thomas Gilray, Daniel Votipka, Jeffrey S. Foster, and Michelle L. Mazurek. In anonymous subission to ICST '19, 2018. [ bib | .pdf ]
 
Racets: Faceted Execution in Racket. Kristopher Micinski, Zhanpeng Wang, and Thomas Gilray. In ACM Workshop on Scheme and Functional Programming (Scheme) '18, 2018. [ bib | .pdf ]
 
User Comfort with Android Background Resource Accesses in Different Contexts. Daniel Votipka, Kristopher Micinski, Seth M. Rabin, Thomas Gilray, Michelle M. Mazurek, and Jeffrey S. Foster. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), Baltimore, MD, 2018. USENIX Association. [ bib | .pdf ]
 
User Interactions and Permission Use on Android. Kristopher Micinski, Daniel Votipka, Rock Stevens, Nikolaos Kofinas, Jeffrey S. Foster, and Michelle L. Mazurek. In ACM CHI Conference on Human Factors in Computing Systems (CHI '17), Denver, CO, 2017. [ bib | .pdf ]
 
Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution. Kristopher Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey S. Foster, and Michael R. Clarkson. In European Symposium on Research in Computer Security (ESORICS '15), volume 9327 of Lecture Notes in Computer Science, pages 520--538, Vienna, Austria, September 2015. [ bib | .pdf ]
 
Temporal Logics for Hyperproperties. Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, KristopherK. Micinski, Markus N. Rabe, and César Sánchez. In Martín Abadi and Steve Kremer, editors, Principles of Security and Trust (POST '14), volume 8414 of Lecture Notes in Computer Science, pages 265--284. Springer Berlin Heidelberg, 2014. [ bib | DOI | .pdf ]
 
An Empirical Study of Location Truncation on Android. Kristopher Micinski, Philip Phelps, and Jeffrey S. Foster. In Mobile Security Technologies (MoST '13), San Francisco, CA, May 2013. [ bib | .pdf ]
 
Dr. Android and Mr. Hide: Fine-grained Permissions in Android Applications. Jinseong Jeon, Kristopher K. Micinski, Jeffrey A. Vaughan, Ari Fogel, Nikhilesh Reddy, Jeffrey S. Foster, and Todd Millstein. In ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '12), pages 3--14, Raleigh, NC, USA, October 2012. [ bib | .pdf ]
 
SymDroid: Symbolic Execution for Dalvik Bytecode. Jinseong Jeon, Kristopher K. Micinski, and Jeffrey S. Foster. Technical Report CS-TR-5022, Department of Computer Science, University of Maryland, College Park, July 2012. [ bib | .pdf ]