Declarative Demand-Driven Reverse Engineering. Yihao Sun, Jeffrey Ching, and Kristopher Micinski. In Currently under blind submission, 2021. [ bib | http ]
 
Compiling Data-Parallel Datalog. Thomas Gilray, Sidharth Kumar, and Kristopher Micinski. In SIGPLAN International Conference on Compiler Construction (CC) 2021, March 2--3, 2020. Association for Computing Machinery ACM, 2021. [ bib | .pdf ]
 
Abstracting Faceted Execution. Kristopher Micinski, David Darais, and Thomas Gilray. In 33rd IEEE Computer Security Foundations Symposium, CSF 2020, Boston, Massachusetts, June 22-26, 2020. IEEE Computer Society, 2020. [ bib | .pdf ]
 
An Observational Investigation of Reverse Engineers Processes. Daniel Votipka, Seth Rabin, Kristopher Micinski, Jeffrey S. Foster, and Michelle L. Mazurek. In 29th USENIX Security Symposium (USENIX Security '20), pages 1875--1892. USENIX Association, August 2020. [ bib | .pdf ]
 
Symbolic Path Tracing to Find Android Permission-Use Triggers. Kristopher Micinski, Thomas Gilray, Daniel Votipka, Jeffrey S. Foster, and Michelle L. Mazurek. In The NDSS workshop on Binary Analysis Research (BAR '19), 2019. [ bib | .pdf ]
 
Racets: Faceted Execution in Racket. Kristopher Micinski, Zhanpeng Wang, and Thomas Gilray. In ACM Workshop on Scheme and Functional Programming (Scheme) '18, 2018. [ bib | .pdf ]
 
User Comfort with Android Background Resource Accesses in Different Contexts. Daniel Votipka, Kristopher Micinski, Seth M. Rabin, Thomas Gilray, Michelle M. Mazurek, and Jeffrey S. Foster. In Fourteenth Symposium on Usable Privacy and Security (SOUPS '18), Baltimore, MD, 2018. USENIX Association. [ bib | .pdf ]
 
User Interactions and Permission Use on Android. Kristopher Micinski, Daniel Votipka, Rock Stevens, Nikolaos Kofinas, Jeffrey S. Foster, and Michelle L. Mazurek. In ACM CHI Conference on Human Factors in Computing Systems (CHI '17), Denver, CO, 2017. [ bib | .pdf ]
 
Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution. Kristopher Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey S. Foster, and Michael R. Clarkson. In European Symposium on Research in Computer Security (ESORICS '15), volume 9327 of Lecture Notes in Computer Science, pages 520--538, Vienna, Austria, September 2015. [ bib | .pdf ]
 
Temporal Logics for Hyperproperties. Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, KristopherK. Micinski, Markus N. Rabe, and César Sánchez. In Martín Abadi and Steve Kremer, editors, Principles of Security and Trust (POST '14), volume 8414 of Lecture Notes in Computer Science, pages 265--284. Springer Berlin Heidelberg, 2014. [ bib | DOI | .pdf ]
 
An Empirical Study of Location Truncation on Android. Kristopher Micinski, Philip Phelps, and Jeffrey S. Foster. In Mobile Security Technologies (MoST '13), San Francisco, CA, May 2013. [ bib | .pdf ]
 
Dr. Android and Mr. Hide: Fine-grained Permissions in Android Applications. Jinseong Jeon, Kristopher K. Micinski, Jeffrey A. Vaughan, Ari Fogel, Nikhilesh Reddy, Jeffrey S. Foster, and Todd Millstein. In ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '12), pages 3--14, Raleigh, NC, USA, October 2012. [ bib | .pdf ]
 
SymDroid: Symbolic Execution for Dalvik Bytecode. Jinseong Jeon, Kristopher K. Micinski, and Jeffrey S. Foster. Technical Report CS-TR-5022, Department of Computer Science, University of Maryland, College Park, July 2012. [ bib | .pdf ]