micinski.bib

@inproceedings{sun:2021d3re,
  author = {Sun, Yihao and Ching, Jeffrey and Micinski, Kristopher},
  title = {Declarative Demand-Driven Reverse Engineering},
  booktitle = {Currently under blind submission},
  url = {https://arxiv.org/abs/2101.04718},
  year = {2021}
}
@inproceedings{gilray:2021,
  author = {Gilray, Thomas and Kumar, Sidharth and Micinski, Kristopher},
  title = {Compiling Data-Parallel Datalog},
  booktitle = {SIGPLAN International Conference on Compiler Construction ({CC}) 2021, March 2--3, 2020},
  publisher = {Association for Computing Machinery {ACM}},
  url = {http://kmicinski.com/assets/cc21.pdf},
  year = {2021}
}
@inproceedings{micinski:2020,
  author = {Micinski, Kristopher and Darais, David and Gilray, Thomas},
  title = {Abstracting Faceted Execution},
  booktitle = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston,
               Massachusetts, June 22-26, 2020},
  publisher = {{IEEE} Computer Society},
  url = {http://kmicinski.com/assets/faamcets.pdf},
  year = {2020}
}
@inproceedings{votipka:2020,
  author = {Daniel Votipka and Seth Rabin and Kristopher Micinski and Jeffrey S. Foster and Michelle L. Mazurek},
  title = {An Observational Investigation of Reverse Engineers{\textquoteright} Processes},
  booktitle = {29th {USENIX} Security Symposium ({USENIX} Security '20)},
  year = {2020},
  isbn = {978-1-939133-17-5},
  pages = {1875--1892},
  url = {http://kmicinski.com/assets/usenix19.pdf},
  publisher = {{USENIX} Association},
  month = aug
}
@inproceedings{micinski:2019,
  author = {Kristopher Micinski and Thomas Gilray and Daniel Votipka and Jeffrey S. Foster and Michelle L. Mazurek},
  title = {Symbolic Path Tracing to Find Android Permission-Use Triggers},
  booktitle = {The NDSS workshop on Binary Analysis Research (BAR '19)},
  url = {http://kmicinski.com/assets/icst2019.pdf},
  year = {2019}
}
@inproceedings{micinski:sw19sub,
  author = {Kristopher Micinski and Zhanpeng Wang and Thomas Gilray},
  title = {Racets: Faceted Execution in Racket},
  booktitle = {ACM Workshop on Scheme and Functional Programming (Scheme) '18},
  url = {http://kmicinski.com/assets/scheme19.pdf},
  year = {2018}
}
@inproceedings{votipka:soups18,
  author = {Daniel Votipka and Kristopher Micinski and Seth M. Rabin and Thomas Gilray and Michelle M. Mazurek and Jeffrey S. Foster},
  title = {User Comfort with Android Background Resource Accesses in Different Contexts},
  booktitle = {Fourteenth Symposium on Usable Privacy and Security ({SOUPS} '18)},
  year = {2018},
  address = {Baltimore, MD},
  url = {http://kmicinski.com/assets/soups18.pdf},
  publisher = {{USENIX} Association}
}
@inproceedings{micinski:apptracer,
  author = {Kristopher Micinski and Daniel Votipka and Rock Stevens and Nikolaos Kofinas and Jeffrey S. Foster and Michelle L. Mazurek},
  title = {User Interactions and Permission Use on Android},
  booktitle = {ACM CHI Conference on Human Factors in Computing Systems (CHI '17)},
  url = {http://kmicinski.com/assets/apptracer.pdf},
  year = {2017},
  address = {Denver, CO}
}
@inproceedings{micinski:esorics15,
  author = {Kristopher Micinski and Jonathan Fetter-Degges and Jinseong Jeon and Jeffrey S. Foster and Michael R. Clarkson},
  title = {{Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution}},
  booktitle = {European Symposium on Research in Computer Security (ESORICS '15)},
  pages = {520--538},
  year = {2015},
  url = {http://www.cs.cornell.edu/~clarkson/papers/clarkson_clickrelease.pdf},
  volume = {9327},
  series = {Lecture Notes in Computer Science},
  address = {Vienna, Austria},
  month = {September}
}
@incollection{clarkson:post14,
  year = {2014},
  isbn = {978-3-642-54791-1},
  booktitle = {Principles of Security and Trust (POST '14)},
  volume = {8414},
  series = {Lecture Notes in Computer Science},
  editor = {Abadi, Martín and Kremer, Steve},
  doi = {10.1007/978-3-642-54792-8_15},
  title = {Temporal Logics for Hyperproperties},
  url = {http://cs.umd.edu/~micinski/post14.pdf},
  publisher = {Springer Berlin Heidelberg},
  author = {Clarkson, Michael R. and Finkbeiner, Bernd and Koleini, Masoud and Micinski, KristopherK. and Rabe, Markus N. and Sánchez, César},
  pages = {265-284},
  language = {English}
}
@inproceedings{micinski:most13,
  author = {Kristopher Micinski and Philip Phelps and Jeffrey S. Foster},
  title = {{An Empirical Study of Location Truncation on Android}},
  booktitle = {Mobile Security Technologies (MoST '13)},
  year = {2013},
  url = {http://www.cs.umd.edu/~jfoster/papers/most13.pdf},
  address = {San Francisco, CA},
  month = {May}
}
@inproceedings{jeon:spsm12,
  author = {Jinseong Jeon and Kristopher K. Micinski and Jeffrey A. Vaughan and Ari Fogel and Nikhilesh Reddy and Jeffrey S. Foster and Todd Millstein},
  title = {{Dr. Android and Mr. Hide: Fine-grained Permissions in Android Applications}},
  booktitle = {ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '12)},
  pages = {3--14},
  year = {2012},
  url = {http://cs.umd.edu/~jfoster/papers/spsm12.pdf},
  address = {Raleigh, NC, USA},
  month = {October}
}
@techreport{jeon:cs-tr-5022,
  author = {Jinseong Jeon and Kristopher K. Micinski and Jeffrey S. Foster},
  title = {{SymDroid: Symbolic Execution for Dalvik Bytecode}},
  institution = {Department of Computer Science, University of Maryland, College Park},
  year = {2012},
  url = {http://www.cs.umd.edu/~jfoster/papers/cs-tr-5022.pdf},
  number = {CS-TR-5022},
  month = {July}
}