micinski.bib
@inproceedings{sun:2021d3re,
author = {Sun, Yihao and Ching, Jeffrey and Micinski, Kristopher},
title = {Declarative Demand-Driven Reverse Engineering},
booktitle = {Currently under blind submission},
url = {https://arxiv.org/abs/2101.04718},
year = {2021}
}
@inproceedings{gilray:2021,
author = {Gilray, Thomas and Kumar, Sidharth and Micinski, Kristopher},
title = {Compiling Data-Parallel Datalog},
booktitle = {SIGPLAN International Conference on Compiler Construction ({CC}) 2021, March 2--3, 2020},
publisher = {Association for Computing Machinery {ACM}},
url = {http://kmicinski.com/assets/cc21.pdf},
year = {2021}
}
@inproceedings{micinski:2020,
author = {Micinski, Kristopher and Darais, David and Gilray, Thomas},
title = {Abstracting Faceted Execution},
booktitle = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston,
Massachusetts, June 22-26, 2020},
publisher = {{IEEE} Computer Society},
url = {http://kmicinski.com/assets/faamcets.pdf},
year = {2020}
}
@inproceedings{votipka:2020,
author = {Daniel Votipka and Seth Rabin and Kristopher Micinski and Jeffrey S. Foster and Michelle L. Mazurek},
title = {An Observational Investigation of Reverse Engineers{\textquoteright} Processes},
booktitle = {29th {USENIX} Security Symposium ({USENIX} Security '20)},
year = {2020},
isbn = {978-1-939133-17-5},
pages = {1875--1892},
url = {http://kmicinski.com/assets/usenix19.pdf},
publisher = {{USENIX} Association},
month = aug
}
@inproceedings{micinski:2019,
author = {Kristopher Micinski and Thomas Gilray and Daniel Votipka and Jeffrey S. Foster and Michelle L. Mazurek},
title = {Symbolic Path Tracing to Find Android Permission-Use Triggers},
booktitle = {The NDSS workshop on Binary Analysis Research (BAR '19)},
url = {http://kmicinski.com/assets/icst2019.pdf},
year = {2019}
}
@inproceedings{micinski:sw19sub,
author = {Kristopher Micinski and Zhanpeng Wang and Thomas Gilray},
title = {Racets: Faceted Execution in Racket},
booktitle = {ACM Workshop on Scheme and Functional Programming (Scheme) '18},
url = {http://kmicinski.com/assets/scheme19.pdf},
year = {2018}
}
@inproceedings{votipka:soups18,
author = {Daniel Votipka and Kristopher Micinski and Seth M. Rabin and Thomas Gilray and Michelle M. Mazurek and Jeffrey S. Foster},
title = {User Comfort with Android Background Resource Accesses in Different Contexts},
booktitle = {Fourteenth Symposium on Usable Privacy and Security ({SOUPS} '18)},
year = {2018},
address = {Baltimore, MD},
url = {http://kmicinski.com/assets/soups18.pdf},
publisher = {{USENIX} Association}
}
@inproceedings{micinski:apptracer,
author = {Kristopher Micinski and Daniel Votipka and Rock Stevens and Nikolaos Kofinas and Jeffrey S. Foster and Michelle L. Mazurek},
title = {User Interactions and Permission Use on Android},
booktitle = {ACM CHI Conference on Human Factors in Computing Systems (CHI '17)},
url = {http://kmicinski.com/assets/apptracer.pdf},
year = {2017},
address = {Denver, CO}
}
@inproceedings{micinski:esorics15,
author = {Kristopher Micinski and Jonathan Fetter-Degges and Jinseong Jeon and Jeffrey S. Foster and Michael R. Clarkson},
title = {{Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution}},
booktitle = {European Symposium on Research in Computer Security (ESORICS '15)},
pages = {520--538},
year = {2015},
url = {http://www.cs.cornell.edu/~clarkson/papers/clarkson_clickrelease.pdf},
volume = {9327},
series = {Lecture Notes in Computer Science},
address = {Vienna, Austria},
month = {September}
}
@incollection{clarkson:post14,
year = {2014},
isbn = {978-3-642-54791-1},
booktitle = {Principles of Security and Trust (POST '14)},
volume = {8414},
series = {Lecture Notes in Computer Science},
editor = {Abadi, Martín and Kremer, Steve},
doi = {10.1007/978-3-642-54792-8_15},
title = {Temporal Logics for Hyperproperties},
url = {http://cs.umd.edu/~micinski/post14.pdf},
publisher = {Springer Berlin Heidelberg},
author = {Clarkson, Michael R. and Finkbeiner, Bernd and Koleini, Masoud and Micinski, KristopherK. and Rabe, Markus N. and Sánchez, César},
pages = {265-284},
language = {English}
}
@inproceedings{micinski:most13,
author = {Kristopher Micinski and Philip Phelps and Jeffrey S. Foster},
title = {{An Empirical Study of Location Truncation on Android}},
booktitle = {Mobile Security Technologies (MoST '13)},
year = {2013},
url = {http://www.cs.umd.edu/~jfoster/papers/most13.pdf},
address = {San Francisco, CA},
month = {May}
}
@inproceedings{jeon:spsm12,
author = {Jinseong Jeon and Kristopher K. Micinski and Jeffrey A. Vaughan and Ari Fogel and Nikhilesh Reddy and Jeffrey S. Foster and Todd Millstein},
title = {{Dr. Android and Mr. Hide: Fine-grained Permissions in Android Applications}},
booktitle = {ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '12)},
pages = {3--14},
year = {2012},
url = {http://cs.umd.edu/~jfoster/papers/spsm12.pdf},
address = {Raleigh, NC, USA},
month = {October}
}
@techreport{jeon:cs-tr-5022,
author = {Jinseong Jeon and Kristopher K. Micinski and Jeffrey S. Foster},
title = {{SymDroid: Symbolic Execution for Dalvik Bytecode}},
institution = {Department of Computer Science, University of Maryland, College Park},
year = {2012},
url = {http://www.cs.umd.edu/~jfoster/papers/cs-tr-5022.pdf},
number = {CS-TR-5022},
month = {July}
}