Follow
Kristopher Micinski
Kristopher Micinski
Verified email at syr.edu - Homepage
Title
Cited by
Cited by
Year
Dr. android and mr. hide: fine-grained permissions in android applications
J Jeon, KK Micinski, JA Vaughan, A Fogel, N Reddy, JS Foster, T Millstein
Proceedings of the second ACM workshop on Security and privacy in …, 2012
392*2012
Temporal logics for hyperproperties
MR Clarkson, B Finkbeiner, M Koleini, KK Micinski, MN Rabe, C Sánchez
International Conference on Principles of Security and Trust, 265-284, 2014
2352014
Distributed Cooperative Caching In Social Wireless Networks
M Taghizadeh, K Micinski, S Biswas
IEEE Transactions on Mobile Computing, 2012
1132012
SymDroid: Symbolic execution for Dalvik bytecode
J Jeon, KK Micinski, JS Foster
752012
An Empirical Study of Location Truncation on Android
K Micinski, P Phelps, JS Foster
Mobile Security Technologies, 2013
492013
User Interactions and Permission Use on Android
K Micinski, D Votipka, R Stevens, N Kofinas, JS Foster, ML Mazurek
CHI 2017, 2017
462017
An Observational Investigation of Reverse Engineers’ Processes
D Votipka, S Rabin, K Micinski, JS Foster, ML Mazurek
29th USENIX Security Symposium (USENIX '20), 1875-1892, 2020
392020
Checking interaction-based declassification policies for android using symbolic execution
K Micinski, J Fetter-Degges, J Jeon, JS Foster, MR Clarkson
European Symposium on Research in Computer Security (ESORICS '15), 520-538, 2015
272015
User Comfort with Android Background Resource Accesses in Different Contexts
D Votipka, K Micinski, SM Rabin, T Gilray, MM Mazurek, JS Foster
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 2018
242018
Abstracting Faceted Execution
K Mikinski, D Darais, T Gilray
33rd IEEE Computer Security Foundations Symposium (CSF '20), 2020
62020
Racets: Faceted execution in racket
K Micinski, Z Wang, T Gilray
arXiv preprint arXiv:1807.09377, 2018
32018
Compiling data-parallel datalog
T Gilray, S Kumar, K Micinski
Proceedings of the 30th ACM SIGPLAN International Conference on Compiler …, 2021
22021
A temporal logic of security
M Koleini, MR Clarkson, KK Micinski
arXiv preprint arXiv:1306.5678, 2013
22013
Exploring MPI Collective I/O and File-per-process I/O for Checkpointing a Logical Inference Task
K Fan, K Micinski, T Gilray, S Kumar
2021 IEEE International Parallel and Distributed Processing Symposium …, 2021
12021
Visualizing Abstract Abstract Machines
K HEADLEY, C REN, K MICINSKI, T GILRAY
12018
Interaction-based security for mobile apps
K Micinski
University of Maryland, College Park, 2017
12017
Optimizing the Bruck Algorithm for Non-uniform All-to-all Communication
K Fan, T Gilray, V Pascucci, X Huang, K Micinski, S Kumar
Proceedings of the 31st International Symposium on High-Performance Parallel …, 2022
2022
Seamless deductive inference via macros
A Sahebolamri, T Gilray, K Micinski
Proceedings of the 31st ACM SIGPLAN International Conference on Compiler …, 2022
2022
So You Want to Analyze Scheme Programs With Datalog?
DR Silverman, Y Sun, K Micinski, T Gilray
arXiv preprint arXiv:2107.12909, 2021
2021
Declarative Demand-Driven Reverse Engineering
Y Sun, J Ching, K Micinski
arXiv preprint arXiv:2101.04718, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20