Kristopher Micinski
Kristopher Micinski
Verified email at - Homepage
Cited by
Cited by
Dr. Android and Mr. Hide: fine-grained permissions in android applications
J Jeon, KK Micinski, JA Vaughan, A Fogel, N Reddy, JS Foster, T Millstein
Proceedings of the second ACM workshop on Security and privacy in …, 2012
Temporal logics for hyperproperties
MR Clarkson, B Finkbeiner, M Koleini, KK Micinski, MN Rabe, C Sánchez
Principles of Security and Trust: Third International Conference, POST 2014 …, 2014
Distributed Cooperative Caching In Social Wireless Networks
M Taghizadeh, K Micinski, S Biswas
IEEE Transactions on Mobile Computing, 2012
An Observational Investigation of Reverse Engineers’ Processes
D Votipka, S Rabin, K Micinski, JS Foster, ML Mazurek
29th USENIX Security Symposium (USENIX '20), 1875-1892, 2020
SymDroid: Symbolic execution for Dalvik bytecode
J Jeon, KK Micinski, JS Foster
University of Maryland, Tech. Rep 7, 2012
An Empirical Study of Location Truncation on Android
K Micinski, P Phelps, JS Foster
Mobile Security Technologies, 2013
User Interactions and Permission Use on Android
K Micinski, D Votipka, R Stevens, N Kofinas, JS Foster, ML Mazurek
CHI 2017, 2017
Checking interaction-based declassification policies for android using symbolic execution
K Micinski, J Fetter-Degges, J Jeon, JS Foster, MR Clarkson
European Symposium on Research in Computer Security (ESORICS '15), 520-538, 2015
User Comfort with Android Background Resource Accesses in Different Contexts
D Votipka, K Micinski, SM Rabin, T Gilray, MM Mazurek, JS Foster
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 2018
Seamless deductive inference via macros
A Sahebolamri, T Gilray, K Micinski
Proceedings of the 31st ACM SIGPLAN International Conference on Compiler …, 2022
Optimizing the bruck algorithm for non-uniform all-to-all communication
K Fan, T Gilray, V Pascucci, X Huang, K Micinski, S Kumar
Proceedings of the 31st International Symposium on High-Performance Parallel …, 2022
Abstracting Faceted Execution
K Micinski, D Darais, T Gilray
33rd IEEE Computer Security Foundations Symposium (CSF '20), 2020
Compiling data-parallel datalog
T Gilray, S Kumar, K Micinski
Proceedings of the 30th ACM SIGPLAN International Conference on Compiler …, 2021
Bring your own data structures to Datalog
A Sahebolamri, L Barrett, S Moore, K Micinski
Proceedings of the ACM on Programming Languages 7 (OOPSLA2), 1198-1223, 2023
Racets: Faceted execution in racket
K Micinski, Z Wang, T Gilray
arXiv preprint arXiv:1807.09377, 2018
Exploring mpi collective i/o and file-per-process i/o for checkpointing a logical inference task
K Fan, K Micinski, T Gilray, S Kumar
2021 IEEE International Parallel and Distributed Processing Symposium …, 2021
Towards Iterative Relational Algebra on the GPU
AR Shovon, T Gilray, K Micinski, S Kumar
2023 USENIX Annual Technical Conference (USENIX ATC 23), 1009-1016, 2023
A temporal logic of security
M Koleini, MR Clarkson, KK Micinski
arXiv preprint arXiv:1306.5678, 2013
Communication Avoiding Recursive Aggregation
Y Sun, S Kumar, T Gilray, K Micinski
IEEE Cluster '23, 2023
Declarative demand-driven reverse engineering
Y Sun, J Ching, K Micinski
arXiv preprint arXiv:2101.04718, 2021
The system can't perform the operation now. Try again later.
Articles 1–20