Stephen Magill
Stephen Magill
Galois, Inc.
E-mail confirmado em galois.com - Página inicial
Título
Citado por
Citado por
Ano
Automatic numeric abstractions for heap-manipulating programs
S Magill, MH Tsai, P Lee, YK Tsay
Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2010
1042010
Arithmetic strengthening for shape analysis
S Magill, J Berdine, E Clarke, B Cook
International Static Analysis Symposium, 419-436, 2007
962007
Specifying and verifying the correctness of dynamic software updates
CM Hayden, S Magill, M Hicks, N Foster, JS Foster
International Conference on Verified Software: Tools, Theories, Experiments …, 2012
722012
Specifying and verifying the correctness of dynamic software updates
CM Hayden, S Magill, M Hicks, N Foster, JS Foster
International Conference on Verified Software: Tools, Theories, Experiments …, 2012
722012
Inferring invariants in separation logic for imperative list-processing programs
S Magill, A Nanevski, E Clarke, P Lee
SPACE 1 (1), 5.7, 2006
712006
THOR: A tool for reasoning about shape and arithmetic
S Magill, MH Tsai, P Lee, YK Tsay
International Conference on Computer Aided Verification, 428-432, 2008
682008
Dynamic enforcement of knowledge-based security policies
P Mardziel, S Magill, M Hicks, M Srivatsa
2011 IEEE 24th Computer Security Foundations Symposium, 114-128, 2011
442011
Finding heap-bounds for hardware synthesis
B Cook, A Gupta, S Magill, A Rybalchenko, J Simsa, S Singh, V Vafeiadis
2009 Formal Methods in Computer-Aided Design, 205-212, 2009
412009
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation
P Mardziel, S Magill, M Hicks, M Srivatsa
Journal of Computer Security 21 (4), 463-532, 2013
342013
Automating object transformations for dynamic software updating
S Magill, M Hicks, S Subramanian, KS McKinley
ACM SIGPLAN Notices 47 (10), 265-280, 2012
302012
Continuous formal verification of Amazon s2n
A Chudnov, N Collins, B Cook, J Dodds, B Huffman, C MacCárthaigh, ...
International Conference on Computer Aided Verification, 430-446, 2018
232018
An inductive synthesis framework for verifiable reinforcement learning
H Zhu, Z Xiong, S Magill, S Jagannathan
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language …, 2019
212019
A data-driven CHC solver
H Zhu, S Magill, S Jagannathan
ACM SIGPLAN Notices 53 (4), 707-721, 2018
202018
The inverse method for the logic of bunched implications
K Donnelly, T Gibson, N Krishnaswami, S Magill, S Park
International Conference on Logic for Programming Artificial Intelligence …, 2005
172005
Instrumentation analysis: an automated method for producing numeric abstractions of heap-manipulating programs
S Magill
CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE, 2010
82010
What’s the over/under? probabilistic bounds on information leakage
I Sweet, JMC Trilla, C Scherrer, M Hicks, S Magill
International Conference on Principles of Security and Trust, 3-27, 2018
52018
Making fast hardware with separation logic
B Cook, S Magill, M Raza, J Simsa, S Singh
Unpublished, http://cs. cmu. edu/~ smagill/papers/fast-hardware. pdf, 2010
52010
Privacy technologies for controlled information sharing in coalition operations
K Myers, T Ellis, T Lepoint, RA Moore, D Archer, G Denker, S Lu, S Magill, ...
Proceedings of the Symposium on Knowledge System for Coalition Operations …, 2017
22017
Specifying and verifying the correctness of dynamic software updates (extended version
CM Hayden, S Magill, M Hicks, N Foster, JS Foster
22011
Simulation and analysis of cryptographic protocols
M Papa, O Bremer, S Magill, J Hale, S Shenoi
Data and Application Security, 89-100, 2002
22002
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20