Stephen Magill

According to our database1, Stephen Magill authored at least 20 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Characterizing Dependency Update Practice of NPM, PyPI and Cargo Packages.
CoRR, 2024

2020
Tutorial: Static Analysis at Scale with Muse.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

2019
An inductive synthesis framework for verifiable reinforcement learning.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

2018
Tutorial: Continuous Verification of Critical Software.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

What's the Over/Under? Probabilistic Bounds on Information Leakage.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

A data-driven CHC solver.
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2018

Continuous Formal Verification of Amazon s2n.
Proceedings of the Computer Aided Verification - 30th International Conference, 2018

2015
Refining Existential Properties in Separation Logic Analyses.
CoRR, 2015

2013
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation.
J. Comput. Secur., 2013

2012
Specifying and Verifying the Correctness of Dynamic Software Updates.
Proceedings of the Verified Software: Theories, Tools, Experiments, 2012

Automating object transformations for dynamic software updating.
Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2012

2011
Dynamic Enforcement of Knowledge-Based Security Policies.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

2010
Instrumentation Analysis: An Automated Method for Producing Numeric Abstractions of Heap-Manipulating Programs.
PhD thesis, 2010

Automatic numeric abstractions for heap-manipulating programs.
Proceedings of the 37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2010

2009
Finding heap-bounds for hardware synthesis.
Proceedings of 9th International Conference on Formal Methods in Computer-Aided Design, 2009

2008
THOR: A Tool for Reasoning about Shape and Arithmetic.
Proceedings of the Computer Aided Verification, 20th International Conference, 2008

2007
Arithmetic Strengthening for Shape Analysis.
Proceedings of the Static Analysis, 14th International Symposium, 2007

2004
The Inverse Method for the Logic of Bunched Implications.
Proceedings of the Logic for Programming, 2004

2002
Implementation and Verification of Programmable Security.
Proceedings of the Research Directions in Data and Applications Security, 2002

2000
Simulation and Analysis of Cryptographic Protocols.
Proceedings of the Data and Application Security, 2000


  Loading...