Eunsuk Kang

Orcid: 0000-0001-7891-6885

Affiliations:
  • Carnegie Mellon University, Pittsburgh, PA, USA
  • University of California, Berkeley, Department of Electrical Engineering and Computer Sciences, CA, USA (former)
  • Massachusetts Institute of Technology, Computer Science and Artificial Intelligence Laboratory, Cambridge, MA, USA (former)


According to our database1, Eunsuk Kang authored at least 81 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Safe Planning through Incremental Decomposition of Signal Temporal Logic Specifications.
CoRR, 2024

User-Driven Adaptation: Tailoring Autonomous Driving Systems with Dynamic Preferences.
CoRR, 2024

Integrating Graceful Degradation and Recovery through Requirement-driven Adaptation.
CoRR, 2024

2023
On tolerance of discrete systems with respect to transition perturbations.
Discret. Event Dyn. Syst., December, 2023

System Verification and Runtime Monitoring with Multiple Weakly-Hard Constraints.
ACM Trans. Cyber Phys. Syst., July, 2023

Investigating Robustness in Cyber-Physical Systems: Specification-Centric Analysis in the face of System Deviations.
CoRR, 2023

Toward Large-Scale Test for Certifying Autonomous Driving Software in Collaborative Virtual Environment.
IEEE Access, 2023

Task Model Design and Analysis with Alloy.
Proceedings of the Rigorous State-Based Methods - 9th International Conference, 2023

Negative Transfer in Task-Based Human Reliability Analysis: A Formal Methods Approach.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

Preference Adaptation: user satisfaction is all you need!
Proceedings of the 18th IEEE/ACM Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2023

Runtime Resolution of Feature Interactions through Adaptive Requirement Weakening.
Proceedings of the 18th IEEE/ACM Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2023

Towards Safe ML-Based Systems in Presence of Feedback Loops.
Proceedings of the 1st International Workshop on Dependability and Trustworthiness of Safety-Critical Systems with Machine Learned Components, 2023

Robustification of Behavioral Designs against Environmental Deviations.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Open Design Case Study - A Crowdsourcing Effort to Curate Software Design Case Studies.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering Education and Training, 2023

An Empirical Study Assessing Software Modeling in Alloy.
Proceedings of the 11th IEEE/ACM International Conference on Formal Methods in Software Engineering, 2023

Fortis: A Tool for Analysis and Repair of Robust Software Systems.
Proceedings of the Formal Methods in Computer-Aided Design, 2023

Safe Environmental Envelopes of Discrete Systems.
Proceedings of the Computer Aided Verification - 35th International Conference, 2023

2022
Modeling and Analysis of Explanation for Secure Industrial Control Systems.
ACM Trans. Auton. Adapt. Syst., December, 2022

Feature Interactions on Steroids: On the Composition of ML Models.
IEEE Softw., 2022

Requirements Engineering for Feedback Loops in Software-Intensive Systems.
Proceedings of the 30th IEEE International Requirements Engineering Conference Workshops, 2022

Mapping Synthesis for Hyperproperties.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

Reconfigurability For Industry 4.0 Middleware Software Architectures.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2022

2021
A formal method for including the probability of erroneous human task behavior in system analyses.
Reliab. Eng. Syst. Saf., 2021

The current state of research on people, culture and cybersecurity.
Pers. Ubiquitous Comput., 2021

A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems.
CoRR, 2021

AlloyMax: bringing maximum satisfaction to relational specifications.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Counterexample Classification.
Proceedings of the Software Engineering and Formal Methods - 19th International Conference, 2021

The Role of Environmental Deviations in Engineering Robust Systems.
Proceedings of the 29th IEEE International Requirements Engineering Conference Workshops, 2021

Model-based clinical assist system for cardiac ablation.
Proceedings of the ICCPS '21: ACM/IEEE 12th International Conference on Cyber-Physical Systems, 2021

Engineering Secure Self-Adaptive Systems with Bayesian Games.
Proceedings of the Fundamental Approaches to Software Engineering, 2021

Self-adaptive Machine Learning Systems: Research Challenges and Opportunities.
Proceedings of the Software Architecture - 15th European Conference, 2021

Self-Adaptation for Machine Learning Based Systems.
Proceedings of the ECSA 2021 Companion Volume, 2021

2020
Reliable Smart Road Signs.
IEEE Trans. Intell. Transp. Syst., 2020

Resilient Authentication and Authorization for the Internet of Things (IoT) Using Edge Computing.
ACM Trans. Internet Things, 2020

Synthesis of sensor deception attacks at the supervisory layer of Cyber-Physical Systems.
Autom., 2020

A behavioral notion of robustness for software systems.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Runtime-Safety-Guided Policy Repair.
Proceedings of the Runtime Verification - 20th International Conference, 2020

Efficient System Verification with Multiple Weakly-Hard Constraints for Runtime Monitoring.
Proceedings of the Runtime Verification - 20th International Conference, 2020

Lightweight Formal Method for Robust Routing in Track-based Traffic Control Systems.
Proceedings of the 18th ACM/IEEE International Conference on Formal Methods and Models for System Design, 2020

Synthesis-Based Resolution of Feature Interactions in Cyber-Physical Systems.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Explanations for human-on-the-loop: a probabilistic model checking approach.
Proceedings of the SEAMS '20: IEEE/ACM 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Seoul, Republic of Korea, 29 June, 2020

Teaching software engineering for AI-enabled systems.
Proceedings of the ICSE-SEET 2020: 42nd International Conference on Software Engineering, Software Engineering Education and Training, Seoul, South Korea, 27 June, 2020

Synthesis of assurance cases for software certification.
Proceedings of the ICSE-NIER 2020: 42nd International Conference on Software Engineering, New Ideas and Emerging Results, Seoul, South Korea, 27 June, 2020

2019
Alloy*: a general-purpose higher-order relational constraint solver.
Formal Methods Syst. Des., 2019

A Game Theoretical Error-Correction Framework for Secure Traffic-Sign Classification.
CoRR, 2019

A Byzantine-Tolerant Distributed Consensus Algorithm for Connected Vehicles Using Proof-of-Eligibility.
Proceedings of the 22nd International ACM Conference on Modeling, 2019

Challenges in Secure Engineering of Critical Infrastructure Systems.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2019

Trade-off-oriented development: making quality attribute trade-offs first-class.
Proceedings of the 41st International Conference on Software Engineering: New Ideas and Emerging Results, 2019

Optimizing Assume-Guarantee Contracts for Cyber-Physical System Design.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

Automated Synthesis of Secure Platform Mappings.
Proceedings of the Computer Aided Verification - 31st International Conference, 2019

2018
An Adaptive Markov Strategy for Defending Smart Grid False Data Injection From Malicious Attackers.
IEEE Trans. Smart Grid, 2018

A formal approach for detection of security flaws in the android permission system.
Formal Aspects Comput., 2018

Safe and Secure Automotive Over-the-Air Updates.
Proceedings of the Computer Safety, Reliability, and Security, 2018

Property-Driven Runtime Resolution of Feature Interactions.
Proceedings of the Runtime Verification - 18th International Conference, 2018

Digital Behavioral Twins for Safe Connected Cars.
Proceedings of the 21th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2018

Quotient for Assume-Guarantee Contracts.
Proceedings of the 16th ACM/IEEE International Conference on Formal Methods and Models for System Design, 2018

Platform-Independent QoS Parameters and Primitive APIs for Automotive Software.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

Network and system level security in connected vehicle applications.
Proceedings of the International Conference on Computer-Aided Design, 2018

Runtime monitoring for safety of intelligent vehicles.
Proceedings of the 55th Annual Design Automation Conference, 2018

2017
Software Engineering for Smart Cyber-Physical Systems: Challenges and Promising Solutions.
ACM SIGSOFT Softw. Eng. Notes, 2017

Synthesis of Property-Preserving Mappings.
CoRR, 2017

An Architectural Mechanism for Resilient IoT Services.
Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 2017

A Toolkit for Construction of Authorization Service Infrastructure for the Internet of Things.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

Stealthy deception attacks for cyber-physical systems.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

2016
Multi-representational security modeling and analysis.
PhD thesis, 2016

Multi-representational security analysis.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Designing minimal effective normative systems with the help of lightweight formal methods.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Design Space Exploration for Security.
Proceedings of the IEEE Cybersecurity Development, 2016

Model-based security analysis of a water treatment system.
Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2016

2015
Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification.
Proceedings of the FM 2015: Formal Methods, 2015

2014
Adaptive Defending Strategy for Smart Grid Attacks.
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014

2011
A lightweight code analysis and its role in evaluation of a dependability case.
Proceedings of the 33rd International Conference on Software Engineering, 2011

2010
Separation of concerns for dependable software design.
Proceedings of the Workshop on Future of Software Engineering Research, 2010

Dependability Arguments with Trusted Bases.
Proceedings of the RE 2010, 18th IEEE International Requirements Engineering Conference, Sydney, New South Wales, Australia, September 27, 2010

Patterns for building dependable systems with trusted bases.
Proceedings of the 17th Conference on Pattern Languages of Programs, 2010

An Approach for Effective Design Space Exploration.
Proceedings of the Foundations of Computer Software. Modeling, Development, and Verification of Adaptive Systems, 2010

Components, platforms and possibilities: towards generic automation for MDA.
Proceedings of the 10th International conference on Embedded software, 2010

A Structure for Dependability Arguments.
Proceedings of the Abstract State Machines, 2010

2009
Designing and Analyzing a Flash File System with Alloy.
Int. J. Softw. Informatics, 2009

2008
Formal Modeling and Analysis of a Flash Filesystem in Alloy.
Proceedings of the Abstract State Machines, B and Z, First International Conference, 2008

2007
Improving the Usability of HOL Through Controlled Automation Tactics.
Proceedings of the Theorem Proving in Higher Order Logics, 20th International Conference, 2007


  Loading...