Christopher M. Poskitt

Orcid: 0000-0002-9376-2471

Affiliations:
  • Singapore Management University, Singapore
  • Singapore University of Technology and Design, Singapore (former)
  • ETH Zurich, Department of Computer Science (former)
  • University of York, Department of Computer Science, UK (former)


According to our database1, Christopher M. Poskitt authored at least 46 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ACAV: A Framework for Automatic Causality Analysis in Autonomous Vehicle Accident Recordings.
CoRR, 2024

REDriver: Runtime Enforcement for Autonomous Vehicles.
CoRR, 2024

Fixing Your Own Smells: Adding a Mistake-Based Familiarisation Step When Teaching Code Refactoring.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

2023
Boosting Adversarial Training in Safety-Critical Systems Through Boundary Data Selection.
IEEE Robotics Autom. Lett., December, 2023

Constructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing.
IEEE Trans. Software Eng., November, 2023

K-ST: A Formal Executable Semantics of the Structured Text Language for PLCs.
IEEE Trans. Software Eng., October, 2023

Specification-Based Autonomous Driving System Testing.
IEEE Trans. Software Eng., June, 2023

Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2023

Monadic second-order incorrectness logic for GP 2.
J. Log. Algebraic Methods Program., 2023

How Generalizable are Deepfake Detectors? An Empirical Study.
CoRR, 2023

How Helpful do Novice Programmers Find the Feedback of an Automated Repair Tool?
Proceedings of the IEEE International Conference on Teaching, 2023

Finding Causally Different Tests for an Industrial Control System.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

2022
Physical Adversarial Attack on a Robotic Arm.
IEEE Robotics Autom. Lett., 2022

K-ST: A Formal Executable Semantics of PLC Structured Text Language.
CoRR, 2022

LawBreaker: An Approach for Specifying Traffic Laws and Fuzzing Autonomous Vehicles.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

XSS for the Masses: Integrating Security in a Web Programming Course using a Security Scanner.
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022

Mind the Gap: Reimagining an Interactive Programming Course for the Synchronous Hybrid Classroom.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Steps Before Syntax: Helping Novice Programmers Solve Problems using the PCDIT Framework.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems.
Int. J. Crit. Infrastructure Prot., 2021

Deriving invariant checkers for critical infrastructure using axiomatic design principles.
Cybersecur., 2021

Code integrity attestation for PLCs using black box neural network predictions.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Incorrectness Logic for Graph Programs.
Proceedings of the Graph Transformation - 14th International Conference, 2021

Microservices Orchestration vs. Choreography: A Decision Framework.
Proceedings of the 25th IEEE International Enterprise Distributed Object Computing Conference, 2021

2020
Securing Bring-Your-Own-Device (BYOD) Programming Exams.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Active fuzzing for testing and securing cyber-physical systems.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

Towards Systematically Deriving Defence Mechanisms from Functional Requirements of Cyber-Physical Systems.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020

2019
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

2018
A semantics comparison workbench for a concurrent, asynchronous, distributed programming language.
Formal Aspects Comput., 2018

Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
SafeGPU: Contract- and library-based GPGPU for object-oriented languages.
Comput. Lang. Syst. Struct., 2017

Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

2016
Towards Learning and Verifying Invariants of Cyber-Physical Systems by Code Mutation.
Proceedings of the FM 2016: Formal Methods, 2016

A Graph-Based Semantics Workbench for Concurrent Asynchronous Programs.
Proceedings of the Fundamental Approaches to Software Engineering, 2016

An Interference-Free Programming Model for Network Objects.
Proceedings of the Coordination Models and Languages, 2016

2015
Towards Practical Graph-Based Verification for an Object-Oriented Concurrency Model.
Proceedings of the Proceedings Graphs as Models, 2015

The AutoProof Verifier: Usability by Non-Experts and on Standard Code.
Proceedings of the Proceedings Second International Workshop on Formal Integrated Development Environment, 2015

Contract-based general-purpose GPU programming.
Proceedings of the 2015 ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, 2015

2014
Towards Rigorously Faking Bidirectional Model Transformations.
Proceedings of the Workshop on Analysis of Model Transformations co-located with ACM/IEEE 17th International Conference on Model Driven Engineering Languages & Systems (MoDELS 2014), 2014

Verifying Monadic Second-Order Properties of Graph Programs.
Proceedings of the Graph Transformation - 7th International Conference, 2014

2013
Verification of graph programs.
PhD thesis, 2013

Verifying Total Correctness of Graph Programs.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2013

Using Contracts to Guide the Search-Based Verification of Concurrent Programs.
Proceedings of the Search Based Software Engineering - 5th International Symposium, 2013

Applying Search in an Automatic Contract-Based Testing Tool.
Proceedings of the Search Based Software Engineering - 5th International Symposium, 2013

2012
Hoare-Style Verification of Graph Programs.
Fundam. Informaticae, 2012

Verification of Graph Programs.
Proceedings of the Graph Transformations - 6th International Conference, 2012

2010
A Hoare Calculus for Graph Programs.
Proceedings of the Graph Transformations - 5th International Conference, 2010


  Loading...