Stephen Magill

According to our database1, Stephen Magill authored at least 16 papers between 2000 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
What's the Over/Under? Probabilistic Bounds on Information Leakage.
CoRR, 2018

What's the Over/Under? Probabilistic Bounds on Information Leakage.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

A data-driven CHC solver.
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2018

Continuous Formal Verification of Amazon s2n.
Proceedings of the Computer Aided Verification - 30th International Conference, 2018

2015
Refining Existential Properties in Separation Logic Analyses.
CoRR, 2015

2013
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation.
Journal of Computer Security, 2013

2012
Specifying and Verifying the Correctness of Dynamic Software Updates.
Proceedings of the Verified Software: Theories, Tools, Experiments, 2012

Automating object transformations for dynamic software updating.
Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2012

2011
Dynamic Enforcement of Knowledge-Based Security Policies.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

2010
Automatic numeric abstractions for heap-manipulating programs.
Proceedings of the 37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2010

2009
Finding heap-bounds for hardware synthesis.
Proceedings of 9th International Conference on Formal Methods in Computer-Aided Design, 2009

2008
THOR: A Tool for Reasoning about Shape and Arithmetic.
Proceedings of the Computer Aided Verification, 20th International Conference, 2008

2007
Arithmetic Strengthening for Shape Analysis.
Proceedings of the Static Analysis, 14th International Symposium, 2007

2004
The Inverse Method for the Logic of Bunched Implications.
Proceedings of the Logic for Programming, 2004

2002
Implementation and Verification of Programmable Security.
Proceedings of the Research Directions in Data and Applications Security, 2002

2000
Simulation and Analysis of Cryptographic Protocols.
Proceedings of the Data and Application Security, 2000


  Loading...