According to our database1, Stephen Magill authored at least 15 papers between 2000 and 2018.
Legend:Book In proceedings Article PhD thesis Other
Tutorial: Continuous Verification of Critical Software.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018
What's the Over/Under? Probabilistic Bounds on Information Leakage.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018
A data-driven CHC solver.
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2018
Continuous Formal Verification of Amazon s2n.
Proceedings of the Computer Aided Verification - 30th International Conference, 2018
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation.
Journal of Computer Security, 2013
Specifying and Verifying the Correctness of Dynamic Software Updates.
Proceedings of the Verified Software: Theories, Tools, Experiments, 2012
Automating object transformations for dynamic software updating.
Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2012
Dynamic Enforcement of Knowledge-Based Security Policies.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
Automatic numeric abstractions for heap-manipulating programs.
Proceedings of the 37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2010
Finding heap-bounds for hardware synthesis.
Proceedings of 9th International Conference on Formal Methods in Computer-Aided Design, 2009
THOR: A Tool for Reasoning about Shape and Arithmetic.
Proceedings of the Computer Aided Verification, 20th International Conference, 2008
Arithmetic Strengthening for Shape Analysis.
Proceedings of the Static Analysis, 14th International Symposium, 2007
The Inverse Method for the Logic of Bunched Implications.
Proceedings of the Logic for Programming, 2004
Implementation and Verification of Programmable Security.
Proceedings of the Research Directions in Data and Applications Security, 2002
Simulation and Analysis of Cryptographic Protocols.
Proceedings of the Data and Application Security, 2000