Automatic numeric abstractions for heap-manipulating programs S Magill, MH Tsai, P Lee, YK Tsay Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2010 | 125 | 2010 |
An inductive synthesis framework for verifiable reinforcement learning H Zhu, Z Xiong, S Magill, S Jagannathan Proceedings of the 40th ACM SIGPLAN conference on programming language …, 2019 | 114 | 2019 |
Arithmetic strengthening for shape analysis S Magill, J Berdine, E Clarke, B Cook Static Analysis: 14th International Symposium, SAS 2007, Kongens Lyngby …, 2007 | 104 | 2007 |
A data-driven CHC solver H Zhu, S Magill, S Jagannathan ACM SIGPLAN Notices 53 (4), 707-721, 2018 | 97 | 2018 |
Inferring invariants in separation logic for imperative list-processing programs S Magill, A Nanevski, E Clarke, P Lee SPACE 1 (1), 5-7, 2006 | 86 | 2006 |
Specifying and verifying the correctness of dynamic software updates CM Hayden, S Magill, M Hicks, N Foster, JS Foster Verified Software: Theories, Tools, Experiments: 4th International …, 2012 | 81 | 2012 |
Continuous formal verification of Amazon s2n A Chudnov, N Collins, B Cook, J Dodds, B Huffman, C MacCárthaigh, ... Computer Aided Verification: 30th International Conference, CAV 2018, Held …, 2018 | 79 | 2018 |
THOR: A Tool for Reasoning about Shape and Arithmetic: Tool Paper S Magill, MH Tsai, P Lee, YK Tsay International Conference on Computer Aided Verification, 428-432, 2008 | 74 | 2008 |
Dynamic enforcement of knowledge-based security policies P Mardziel, S Magill, M Hicks, M Srivatsa 2011 IEEE 24th Computer Security Foundations Symposium, 114-128, 2011 | 51 | 2011 |
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation P Mardziel, S Magill, M Hicks, M Srivatsa Journal of Computer Security 21 (4), 463-532, 2013 | 45 | 2013 |
Finding heap-bounds for hardware synthesis B Cook, A Gupta, S Magill, A Rybalchenko, J Simsa, S Singh, V Vafeiadis 2009 Formal Methods in Computer-Aided Design, 205-212, 2009 | 42 | 2009 |
Automating object transformations for dynamic software updating S Magill, M Hicks, S Subramanian, KS McKinley ACM SIGPLAN Notices 47 (10), 265-280, 2012 | 39 | 2012 |
The inverse method for the logic of bunched implications K Donnelly, T Gibson, N Krishnaswami, S Magill, S Park Logic for Programming, Artificial Intelligence, and Reasoning: 11th …, 2005 | 24 | 2005 |
What’s the over/under? probabilistic bounds on information leakage I Sweet, JMC Trilla, C Scherrer, M Hicks, S Magill Principles of Security and Trust: 7th International Conference, POST 2018 …, 2018 | 12 | 2018 |
Instrumentation analysis: an automated method for producing numeric abstractions of heap-manipulating programs S Magill Carnegie Mellon University, 2010 | 9 | 2010 |
Making fast hardware with separation logic B Cook, S Magill, M Raza, J Simsa, S Singh Unpublished, http://cs. cmu. edu/~ smagill/papers/fast-hardware. pdf, 2010 | 6 | 2010 |
Privacy technologies for controlled information sharing in coalition operations K Myers, T Ellis, T Lepoint, RA Moore, D Archer, G Denker, S Lu, S Magill, ... Proceedings of the Symposium on Knowledge System for Coalition Operations …, 2017 | 5 | 2017 |
Tutorial: Continuous Verification of Critical Software M Dodds, S Magill, A Tomb 2018 IEEE Cybersecurity Development (SecDev), 128-129, 2018 | 2 | 2018 |
Refining existential properties in separation logic analyses M Botinčan, M Dodds, S Magill arXiv preprint arXiv:1504.08309, 2015 | 2 | 2015 |
Salmonellosis as a differential diagnosis S Magill, HC Koh, A Renwick, M Vella Case Reports 2012, bcr2012007219, 2012 | 2 | 2012 |