A full list of publications may be found at my Google Scholar Profile

 
Bring Your Own Data Structures to Datalog. Arash Sahebolamri, Langston Barrett, Scott Moore, and Kristopher Micinski. In Proc. ACM Program. Lang. (OOPSLA '23), volume 7. Association for Computing Machinery, October 2023. [ bib | DOI | .pdf ]
 
Communication-Avoiding Recursive Aggregation. Yihao Sun, Sidharth Kumar, Thomas Gilray, and Kristopher Micinski. In 2023 IEEE International Conference on Cluster Computing (CLUSTER '23), pages 1--12, 2023. [ bib | .pdf ]
 
Towards Iterative Relational Algebra on the GPU. Ahmedur Rahman Shovon, Thomas Gilray, Kristopher Micinski, and Sidharth Kumar. In 2023 USENIX Annual Technical Conference (USENIX ATC '23), pages 1009--1016, Boston, MA, July 2023. USENIX Association. [ bib | .pdf ]
 
Optimizing the Bruck Algorithm for Non-Uniform All-to-All Communication. Ke Fan, Thomas Gilray, Valerio Pascucci, Xuan Huang, Kristopher Micinski, and Sidharth Kumar. In Proceedings of the 31st International Symposium on High-Performance Parallel and Distributed Computing, HPDC '22, page 172–184, New York, NY, USA, 2022. Association for Computing Machinery. [ bib | DOI | http ]
 
Seamless Deductive Inference via Macros. Arash Sahebolamri, Thomas Gilray, and Kristopher Micinski. In Proceedings of the 31st ACM SIGPLAN International Conference on Compiler Construction, CC 2022, page 77–88, New York, NY, USA, 2022. Association for Computing Machinery. [ bib | DOI | http ]
 
Exploring MPI Collective I/O and File-per-process I/O for Checkpointing a Logical Inference Task. Ke Fan, Kristopher Micinski, Thomas Gilray, and Sidharth Kumar. In 2021 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), pages 965--972, 2021. [ bib | DOI | http ]
 
Compiling Data-Parallel Datalog. Thomas Gilray, Sidharth Kumar, and Kristopher Micinski. In Proceedings of the 30th ACM SIGPLAN International Conference on Compiler Construction, CC 2021, page 23–35, New York, NY, USA, 2021. Association for Computing Machinery. [ bib | DOI | http ]
 
Abstracting Faceted Execution. Kristopher Micinski, David Darais, and Thomas Gilray. In 33rd IEEE Computer Security Foundations Symposium, CSF 2020, Boston, Massachusetts, June 22-26, 2020. IEEE Computer Society, 2020. [ bib | .pdf ]
 
An Observational Investigation of Reverse Engineers' Processes. Daniel Votipka, Seth Rabin, Kristopher Micinski, Jeffrey S. Foster, and Michelle L. Mazurek. USENIX Security, 2019. [ bib | .pdf ]
 
Symbolic Path Tracing to Find Android Permission-Use Triggers. Kristopher Micinski, Thomas Gilray, Daniel Votipka, Jeffrey S. Foster, and Michelle L. Mazurek. In To appear at the NDSS workshop on Binary Analysis Research (BAR '19), 2019. [ bib | .pdf ]
 
Racets: Faceted Execution in Racket. Kristopher Micinski, Zhanpeng Wang, and Thomas Gilray. In ACM Workshop on Scheme and Functional Programming (Scheme) '18, 2018. [ bib | .pdf ]
 
User Comfort with Android Background Resource Accesses in Different Contexts. Daniel Votipka, Kristopher Micinski, Seth M. Rabin, Thomas Gilray, Michelle M. Mazurek, and Jeffrey S. Foster. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), Baltimore, MD, 2018. USENIX Association. [ bib | .pdf ]
 
User Interactions and Permission Use on Android. Kristopher Micinski, Daniel Votipka, Rock Stevens, Nikolaos Kofinas, Jeffrey S. Foster, and Michelle L. Mazurek. In ACM CHI Conference on Human Factors in Computing Systems (CHI '17), Denver, CO, 2017. [ bib | .pdf ]
 
Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution. Kristopher Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey S. Foster, and Michael R. Clarkson. In European Symposium on Research in Computer Security (ESORICS '15), volume 9327 of Lecture Notes in Computer Science, pages 520--538, Vienna, Austria, September 2015. [ bib | http ]
 
Temporal Logics for Hyperproperties. Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, KristopherK. Micinski, Markus N. Rabe, and César Sánchez. In Martín Abadi and Steve Kremer, editors, Principles of Security and Trust (POST '14), volume 8414 of Lecture Notes in Computer Science, pages 265--284. Springer Berlin Heidelberg, 2014. [ bib | DOI | .pdf ]
 
An Empirical Study of Location Truncation on Android. Kristopher Micinski, Philip Phelps, and Jeffrey S. Foster. In Mobile Security Technologies (MoST '13), San Francisco, CA, May 2013. [ bib | .pdf ]
 
Dr. Android and Mr. Hide: Fine-grained Permissions in Android Applications. Jinseong Jeon, Kristopher K. Micinski, Jeffrey A. Vaughan, Ari Fogel, Nikhilesh Reddy, Jeffrey S. Foster, and Todd Millstein. In ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '12), pages 3--14, Raleigh, NC, USA, October 2012. [ bib | .pdf ]
 
SymDroid: Symbolic Execution for Dalvik Bytecode. Jinseong Jeon, Kristopher K. Micinski, and Jeffrey S. Foster. Technical Report CS-TR-5022, Department of Computer Science, University of Maryland, College Park, July 2012. [ bib | .pdf ]