[1]
|
Formally Verified Cloud-Scale Authorization.
Aleks Chakarov, Jaco Geldenhuys, Matthew Heck, Michael Hicks, Sam
Huang, Georges-Axel Jaloyan, Anjali Joshi, K. Rustan M. Leino, Mikael Mayer,
Sean McLaughlin, Akhilesh Mritunjai, Clement Pit-Claudel, Sorawee
Porncharoenwase, Marianna Rapoport, Cody Roux, Neha Rungta, Robin Salkeld,
Matthias Schlaipfer, Daniel Schoepe, Johanna Schwartzentruber, Serdar
Tasiran, Aaron Tomb, Jean-Baptiste Tristan, Emina Torlak, Lucas Wagner,
Michael W. Whalen, Remy Willems, Tongtong Xiang, Tae Joon Byun, Joshua Cohen,
Ruijie Fang, Junyoung Jang, Jakob Rath, Hira Taqdees Syeda, Dominik Wagner,
and Yongwei Yuan.
In Proceedings of the International Conference on Software
Engineering (ICSE), April 2025.
|
[1]
|
How We Built Cedar: A Verification-Guided Approach.
Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael
Hicks, Kesha Hietala, John Kastner, Anwar Mamat, Matt McCutchen, Neha Rungta,
Bhakti Shah, Emina Torlak, and Andrew Wells.
In Proceedings of the European Software Engineering Conference
and the ACM SIGSOFT Symposium on the Foundations of Software Engineering
(ESEC/FSE), July 2024.
Industry papers track.
|
[2]
|
Cedar: A New Language for Expressive, Fast, Safe, and Analyzable
Authorization (Extended Version).
Joseph W. Cutler, Craig Disselkoen, Aaron Eline, Shaobo He, Kyle
Headley, Michael Hicks, Kesha Hietala, Eleftherios Ioannidis, John Kastner,
Anwar Mamat, Darin McAdams, Matt McCutchen, Neha Rungta, Emina Torlak, and
Andrew Wells.
In Proceedings of the ACM Conference on Object-Oriented
Programming Languages, Systems, and Applications (OOPSLA), April 2024.
|
[3]
|
Improving the Stability of Type Safety Proofs in Dafny.
Joseph W. Cutler, Michael Hicks, and Emina Torlak, January 2024.
Dafny Workshop talk.
|
[1]
|
A Verified Optimizer for Quantum Circuits.
Kesha Hietala, Robert Rand, Liyi Li, Shih-Han Hung, Xiaodi Wu, and
Michael Hicks.
ACM Transactions on Programming Languages and Systems
(TOPLAS), 45(3), September 2023.
Extends POPL'21 paper.
|
[2]
|
A Formally Certified End-to-End Implementation of Shor's Factorization
Algorithm.
Yuxiang Peng, Kesha Hietala, Runzhou Tao, Liyi Li, Robert Rand,
Michael Hicks, and Xiaodi Wu.
Proceedings of the National Academy of Sciences, 120(21), May
2023.
Preprint at https://arxiv.org/abs/2204.07112.
|
[3]
|
Fat Pointers for Temporal Memory Safety of C.
Jie Zhou, John Criswell, and Michael Hicks.
In Proceedings of the ACM Conference on Object-Oriented
Programming Languages, Systems, and Applications (OOPSLA), April 2023.
|
[4]
|
Automating NISQ Application Design with Meta Quantum Circuits with
Constraints (MQCC).
Haowei Deng, Yuxiang Peng, Michael Hicks, and Xiaodi Wu.
ACM Transactions on Quantum Computing (TQC), 4(3), April
2023.
|
[5]
|
Fuzzing Configurations of Program Options.
Zenong Zhang, George Klees, Eric Wang, Michael Hicks, and Shiyi Wei.
ACM Transactions on Software Engineering and Methodology
(TOSEM), 32(2), March 2023.
A shorter version appeared at the 2022 Fuzzing Workshop.
|
[6]
|
Symphony: Expressive Secure Multiparty Computation with Coordination.
Ian Sweet, David Darais, David Heath, Ryan Estes, Bill Harris, and
Michael Hicks.
<Programming>, 7(14), February 2023.
|
[7]
|
A Multimodal Study of Challenges Using Rust.
Michael Coblenz, April Porter, Varun Das, Teja Nallagorla, and
Michael Hicks.
In Proceedings of the Workshop on the Evaluation and Usability
of Programming Languages and Tools (PLATEAU), February 2023.
|
[8]
|
Qunity: A Unified Language for Quantum and Classical Computing.
Finn Voichick, Liyi Li, Robert Rand, and Michael Hicks.
In Proceedings of the ACM Conference on Principles of
Programming Languages (POPL), January 2023.
|
[1]
|
Verified Compilation of Quantum Oracles.
Liyi Li, Finnegan Voichick, Kesha Hietala, Yuxiang Peng, Xiaodi Wu,
and Michael Hicks.
In Proceedings of the ACM Conference on Object-Oriented
Programming Languages, Systems, and Applications (OOPSLA), December 2022.
|
[2]
|
C to Checked C by 3C.
Aravind Machiry, John Kastner, Matt McCutchen, Aaron Eline, Kyle
Headley, and Michael Hicks.
In Proceedings of the ACM Conference on Object-Oriented
Programming Languages, Systems, and Applications (OOPSLA), December 2022.
Distinguished Paper.
|
[3]
|
Understanding the how and the why: Exploring secure development practices
through a course competition.
Kelsey R. Fulton, Daniel Votipka, Desiree Abrokwa, Michelle L.
Mazurek, Michael Hicks, and James Parker.
In Proceedings of the ACM Conference on Computer and
Communications Security (CCS), October 2022.
|
[4]
|
A Formal Model of Checked C.
Liyi Li, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van
Horn, and Michael Hicks.
In Proceedings of the Computer Security Foundations Symposium
(CSF), August 2022.
|
[5]
|
FixReverter: A Realistic Bug Injection Methodology for Benchmarking Fuzz
Testing.
Zenong Zhang, Zach Patterson, Michael Hicks, and Shiyi Wei.
In Proceedings of the USENIX Security Symposium (USENIX SEC),
August 2022.
Distinguished Paper.
|
[6]
|
Does the Bronze Garbage Collector Make Rust Easier to Use? A Controlled
Experiment.
Michael Coblenz, Michelle Mazurek, and Michael Hicks.
In Proceedings of the International Conference on Software
Engineering (ICSE), May 2022.
Distinguished Paper Award Nominee.
|
[7]
|
Fuzzing Configurations of Program Options.
Zenong Zhang, George Klees, Eric Wang, Michael Hicks, and Shiyi Wei.
In Proceedings of the International Fuzzing Workshop, April
2022.
|
[1]
|
Benefits and Drawbacks of Adopting a Secure Programming Language: Rust
as a Case Study.
Kelsey Fulton, Anna Chan, Dan Votipka, Michael Hicks, and Michelle
Mazurek.
In Proceedings of the Symposium on Usable Privacy and Security
(SOUPS), August 2021.
|
[2]
|
Symphony: A Concise Language Model for MPC.
Ian Sweet, David Darais, David Heath, Ryan Estes, William Harris, and
Michael Hicks.
In Informal Proceedings of the Workshop on Foundations on
Computer Secuirty (FCS), June 2021.
|
[3]
|
Proving Quantum Programs Correct.
Kesha Hietala, Robert Rand, Shih-Han Hung, Liyi Li, and Michael
Hicks.
In Proceedings of the Conference on Interative Theorem Proving
(ITP), June 2021.
|
[4]
|
BullFrog: Online Schema Evolution via Lazy Evaluation.
Souvik Bhattacherjee, Gang Liao, Michael Hicks, and Daniel J. Abadi.
In Proceedings of the ACM SIGMOD International Conference on
Management of Data (SIGMOD), June 2021.
|
[5]
|
Toward A Quantum Programming Language for Higher-Level Formal
Verification.
Finn Voichick and Michael Hicks.
In Informal Proceedings of the Workshop on Programming Languages
and Quantum Computing (PLanQC), June 2021.
|
[6]
|
Applying and Expanding the VOQC Toolkit.
Kesha Hietala, Liyi Li, Akshaj Gaur, Aaron Green, Robert Rand, Xiaodi
Wu, and Michael Hicks.
In Informal Proceedings of the Workshop on Programming Languages
and Quantum Computing (PLanQC), June 2021.
|
[7]
|
A Verified Optimizer for Quantum Circuits.
Kesha Hietala, Robert Rand, Shih-Han Hung, Xiaodi Wu, and Michael
Hicks.
In Proceedings of the ACM Conference on Principles of
Programming Languages (POPL), January 2021.
Distinguished Paper.
|
[1]
|
Probabilistic Abstract Interpretation: Sound Inference and Application to
Privacy.
Jose Manuel Calderón Trilla, Michael Hicks, Stephen Magill, Piotr
Mardziel, and Ian Sweet.
In Gilles Barthe, Joost-Pieter Katoen, and Alexandra Silva, editors,
Foundations of Probabilistic Programming, chapter 11, pages 361--389.
Cambridge University Press, November 2020.
|
[2]
|
Short Paper: Probabilistically Almost-Oblivious Computation.
Ian Sweet, David Darais, and Michael Hicks.
In Proceedings of the ACM SIGPLAN Workshop on Programming
Languages and Analysis for Security (PLAS), November 2020.
|
[3]
|
Verifying Replicated Data Types with Typeclass Refinements in Liquid
Haskell.
Yiyun Liu, James Parker, Patrick Redmond, Lindsey Kuper, Michael
Hicks, and Niki Vazou.
In Proceedings of the ACM Conference on Object-Oriented
Programming Languages, Systems, and Applications (OOPSLA), October 2020.
|
[4]
|
Understanding security mistakes developers make: Qualitative analysis from
Build It, Break It, Fix It.
Daniel Votipka, Kelsey Fulton, James Parker, Matthew Hou, Michelle L.
Mazurek, and Michael Hicks.
In Proceedings of the USENIX Security Symposium (USENIX SEC),
August 2020.
Distinguished Paper.
|
[5]
|
Build It, Break It, Fix It: Contesting Secure Development.
James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave
Levin, Daniel Votipka, Piotr Mardziel, and Kelsey R. Fulton.
ACM Transactions on Privacy and Security (TOPS), 23(2), April
2020.
|
[6]
|
Conferences in an Era of Expensive Carbon.
Benjamin Pierce, Michael Hicks, Crista Lopes, and Jens Palsberg.
Communications of the ACM, March 2020.
Preprint at https://www.cs.umd.edu/~mwh/papers/co2acm.pdf.
|
[7]
|
A Language for Probabilistically Oblivious Computation.
David Darais, Ian Sweet, Chang Liu, and Michael Hicks.
In Proceedings of the ACM Conference on Principles of
Programming Languages (POPL), January 2020.
|
[8]
|
Build It, Break It, Fix It Contests: Motivated Developers Still Make
Security Mistakes.
Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou,
Michelle L. Mazurek, and Michael Hicks.
;login;, 45(4), winter 2020.
|
[1]
|
Coverage Guided, Property Based Testing.
Leonidas Lampropoulos, Michael Hicks, and Benjamin C. Pierce.
In Proceedings of the ACM Conference on Object-Oriented
Programming Languages, Systems, and Applications (OOPSLA), October 2019.
|
[2]
|
Verified Optimization in a Quantum Intermediate Representation.
Kesha Hietala, Robert Rand, Shih-Han Hung, Xiaodi Wu, and Michael
Hicks, June 2019.
Extended abstract appeared at QPL 2019.
|
[3]
|
Formal Verification vs. Quantum Uncertainty.
Robert Rand, Kesha Hietala, and Michael Hicks.
In Benjamin S. Lerner, Rastislav Bodík, and Shriram
Krishnamurthi, editors, 3rd Summit on Advances in Programming Languages
(SNAPL 2019), volume 136 of Leibniz International Proceedings in
Informatics (LIPIcs), pages 12:1--12:11, Dagstuhl, Germany, May 2019.
Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik.
|
[4]
|
MVEDSUa: Higher Availability Dynamic Software Updates via Multi-Version
Execution.
Luis Pina, Anastasios Andronidis, Michael Hicks, and Cristian Cadar.
In Proceedings of the International Conference on Architectural
Support for Programming Languages and Operating Systems (ASPLOS), April
2019.
|
[5]
|
Achieving Safety Incrementally with Checked C.
Andrew Ruef, Leonidas Lampropoulos, Ian Sweet, David Tarditi, and
Michael Hicks.
In Proceedings of the Symposium on Principles of Security and
Trust (POST), April 2019.
|
[6]
|
Wys*: A DSL for Verified Secure Multi-party Computations.
Aseem Rastogi, Nikhil Swamy, and Michael Hicks.
In Proceedings of the Symposium on Principles of Security and
Trust (POST), April 2019.
|
[7]
|
LWeb: Information Flow Security for Multi-Tier Web Applications.
James Parker, Niki Vazou, and Michael Hicks.
In Proceedings of the ACM Conference on Principles of
Programming Languages (POPL), January 2019.
|
[8]
|
Quantitative Robustness Analysis of Quantum Programs.
Shih-Han Hung, Kesha Hietala, Shaopeng Zhu, Mingsheng Ying, Michael
Hicks, and Xiaodi Wu.
In Proceedings of the ACM Conference on Principles of
Programming Languages (POPL), January 2019.
|
[1]
|
Evaluating Fuzz Testing.
George T. Klees, Andrew Ruef, Benjamin Cooper, Shiyi Wei, and Michael
Hicks.
In Proceedings of the ACM Conference on Computer and
Communications Security (CCS), October 2018.
Winner of the 7th NSA Best Scientific Cybersecurity Paper
competition.
|
[2]
|
Checked C: Making C Safe by Extension.
Archibald Samuel Elliott, Andrew Ruef, Michael Hicks, and David
Tarditi.
In Proceedings of the IEEE Conference on Secure Development
(SecDev), September 2018.
|
[3]
|
Evaluating Design Tradeoffs in Numeric Static Analysis for Java.
Shiyi Wei, Piotr Mardziel, Andrew Ruef, Jeffrey S. Foster, and
Michael Hicks.
In Proceedings of the European Symposium on Programming (ESOP),
April 2018.
|
[4]
|
What's the Over/Under? Probabilistic Bounds on Information Leakage.
Ian Sweet, José Manuel Calderón Trilla, Chad Scherrer, Michael
Hicks, and Stephen Magill.
In Proceedings of the Symposium on Principles of Security and
Trust (POST), April 2018.
|
[1]
|
Languages for Oblivious Computation.
Michael Hicks.
In Proceedings of the ACM SIGPLAN Workshop on Programming
Languages and Analysis for Security (PLAS), October 2017.
|
[2]
|
A Counterexample-guided Approach to Finding Numerical Invariants.
ThanhVu Nguyen, Timos Antopoulos, Andrew Ruef, and Michael Hicks.
In Proceedings of the European Software Engineering Conference
and the ACM SIGSOFT Symposium on the Foundations of Software Engineering
(ESEC/FSE), September 2017.
|
[3]
|
Decomposition Instead of Self-Composition for Proving the Absence of
Timing Channels.
Timos Antonopoulos, Paul Gazzillo, Michael Hicks, Eric Koskinen,
Tachio Terauchi, and Shiyi Wei.
In Proceedings of the ACM Conference on Programming Language
Design and Implementation (PLDI), June 2017.
|
[4]
|
Quantifying vulnerability of secret generation using hyper-distributions.
Mário S. Alvim, Piotr Mardziel, and Michael Hicks.
In Proceedings of the Symposium on Principles of Security and
Trust (POST), April 2017.
Extended version of short paper that appeared at FCS 2016:
http://www.cs.umd.edu/~mwh/papers/stratquant.pdf.
|
[1]
|
Evolving NoSQL Databases Without Downtime.
Karla Saur, Tudor Dumitraş, and Michael Hicks.
In Proceedings of the International Conference on Software
Maintenance and Evolution (ICSME), October 2016.
|
[2]
|
Build It, Break It, Fix It: Contesting Secure Development.
Andrew Ruef, Michael Hicks, James Parker, Dave Levin, Michelle L.
Mazurek, and Piotr Mardziel.
In Proceedings of the ACM Conference on Computer and
Communications Security (CCS), October 2016.
|
[3]
|
Tedsuto: A General Framework for Testing Dynamic Software Updates.
Luis Pina and Michael Hicks.
In Proceedings of the International Conference on Software
Testing (ICST), April 2016.
|
[4]
|
Safe and Flexible Controller Upgrades for SDNs.
Karla Saur, Joseph Collard, Nate Foster, Arjun Guha, Laurent
Vanbever, and Michael Hicks.
In Proceedings of the Symposium on SDN Research (SOSR), March
2016.
|
[1]
|
Incremental Computation with Names.
Matthew Hammer, Kyle Headley, Nicholas Labich, Jeffrey S. Foster,
Michael Hicks, David Van Horn, and Jana Dunfield.
In Proceedings of the ACM Conference on Object-Oriented
Programming Languages, Systems, and Applications (OOPSLA), October 2015.
|
[2]
|
Build It Break It: Measuring and Comparing Development Security.
Andrew Ruef, Michael Hicks, James Parker, Dave Levin, Atif Memon,
Jandelyn Plane, and Piotr Mardziel.
In Proceedings of the USENIX Workshop on Cyber Security
Instrumentation and Test (CSET), August 2015.
|
[3]
|
C-Strider: Type-Aware Heap Traversal for C.
Karla Saur, Michael Hicks, and Jeffrey S. Foster.
Software, Practice, and Experience, May 2015.
|
[4]
|
GhostRider: A Hardware-Software System for Memory Trace Oblivious
Computation.
Chang Liu, Austin Harris, Martin Maas, Michael Hicks, Mohit Tiwari,
and Elaine Shi.
In Proceedings of the International Conference on Architectural
Support for Programming Languages and Operating Systems (ASPLOS), March
2015.
Winner of Best Paper Award.
|
[5]
|
The Synergy Between Programming Languages and Cryptography (Dagstuhl
Seminar 14492).
Gilles Barthe, Michael Hicks, Florian Kerschbaum, and Dominique
Unruh.
Dagstuhl Reports, 4(12):29--47, 2015.
|
[6]
|
Build it, break it, fix it: Competing to build secure systems.
Andrew Ruef and Michael Hicks.
The Next Wave, 21(1):19--23, 2015.
|
[1]
|
Efficient, General-purpose Dynamic Software Updating for C.
Christopher M. Hayden, Karla Saur, Edward K. Smith, Michael Hicks,
and Jeffrey S. Foster.
ACM Transactions on Programming Languages and Systems
(TOPLAS), 36(4):13, October 2014.
|
[2]
|
Rubah: DSU for Java on a stock JVM.
Luís Pina, Luís Veiga, and Michael Hicks.
In Proceedings of the ACM Conference on Object-Oriented
Programming Languages, Systems, and Applications (OOPSLA), October 2014.
|
[3]
|
Adversary Gain vs. Defender Loss in Quantified Information Flow.
Piotr Mardziel, Mário S. Alvim, and Michael Hicks.
In (Unofficial) Proceedings of the International Workshop on
Foundations of Computer Security (FCS), July 2014.
|
[4]
|
Adapton: Composable, Demand-Driven Incremental Computation.
Matthew Hammer, Yit Phang Khoo, Michael Hicks, and Jeffrey S. Foster.
In Proceedings of the ACM Conference on Programming Language
Design and Implementation (PLDI), June 2014.
|
[5]
|
Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty
Computations.
Aseem Rastogi, Matthew A. Hammer, and Michael Hicks.
In Proceedings of the IEEE Symposium on Security and Privacy
(Oakland), May 2014.
|
[6]
|
Quantifying Information Flow for Dynamic Secrets.
Piotr Mardziel, Mario Alvim, Michael Hicks, and Michael Clarkson.
In Proceedings of the IEEE Symposium on Security and Privacy
(Oakland), May 2014.
|
[7]
|
Automating Efficient RAM-Model Secure Computation.
Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, and Michael Hicks.
In Proceedings of the IEEE Symposium on Security and Privacy
(Oakland), May 2014.
|
[8]
|
Polymonadic Programming.
Michael Hicks, Gavin Bierman, Nataliya Guts, Daan Leijen, and Nikhil
Swamy.
In Proceedings of the Fifth Workshop on Mathematically
Structured Functional Programming (MSFP), April 2014.
|
[9]
|
Authenticated Data Structures, Generically.
Andrew Miller, Michael Hicks, Jonathan Katz, and Elaine Shi.
In Proceedings of the ACM Conference on Principles of
Programming Languages (POPL), January 2014.
|
[1]
|
Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty
Computations (extended version).
Aseem Rastogi, Matthew A. Hammer, and Michael Hicks.
Technical Report CS-TR-5034, Department of Computer Science, the
University of Maryland, College Park, May 2014.
|
[2]
|
Quantifying Information Flow for Dynamic Secrets (extended version).
Piotr Mardziel, Mario Alvim, Michael Hicks, and Michael Clarkson.
Technical Report CS-TR-5035, Department of Computer Science, the
University of Maryland, College Park, May 2014.
|
[1]
|
Expositor: Scriptable Time-Travel Debugging with First Class Traces (Full
version).
Yit Phang Khoo, Jeffrey S. Foster, and Michael Hicks, December 2013.
Extended version of ICSE'13 paper.
|
[2]
|
Dynamic Enforcement of Knowledge-based Security Policies using
Probabilistic Abstract Interpretation.
Piotr Mardziel, Stephen Magill, Michael Hicks, and Mudhakar Srivatsa.
Journal of Computer Security, 21:463--532, October 2013.
|
[3]
|
Knowledge inference for optimizing and enforcing secure computations.
Piotr Mardziel, Michael Hicks, Jonathan Katz, Matthew Hammer, Aseem
Rastogi, and Mudhakar Srivatsa.
In Proceedings of the Annual Meeting of the US/UK International
Technology Alliance, September 2013.
This short paper consists of coherent excerpts from several prior
papers.
|
[4]
|
Knowledge Inference for Optimizing Secure Multi-party Computation.
Aseem Rastogi, Piotr Mardziel, Matthew Hammer, and Michael Hicks.
In Proceedings of the ACM SIGPLAN Workshop on Programming
Languages and Analysis for Security (PLAS), June 2013.
|
[5]
|
Memory Trace Oblivious Program Execution.
Chang Liu, Michael Hicks, and Elaine Shi.
In Proceedings of the Computer Security Foundations Symposium
(CSF), June 2013.
Winner of the 2nd NSA Best Scientific Cybersecurity Paper
competition.
|
[6]
|
Rubah: Efficient, General-purpose Dynamic Software Updating for Java.
Luis Pina and Michael Hicks.
In Proceedings of the Workshop on Hot Topics in Software
Upgrades (HotSWUp), June 2013.
|
[7]
|
Expositor: Scriptable Time-Travel Debugging with First Class Traces.
Yit Phang Khoo, Jeffrey S. Foster, and Michael Hicks.
In Proceedings of the International Conference on Software
Engineering (ICSE), May 2013.
|
[1]
|
Adapton: Composable, Demand-Driven Incremental Computation.
Matthew Hammer, Yit Phang Khoo, Michael Hicks, and Jeffrey S. Foster.
Technical Report CS-TR-5027, Department of Computer Science, the
University of Maryland, College Park, July 2013.
|
[2]
|
Expositor: Scriptable Time-Travel Debugging with First-Class Traces.
Yit Phang Khoo, Jeffrey S. Foster, and Michael Hicks.
Technical Report CS-TR-5021, Department of Computer Science,
University of Maryland, College Park, February 2013.
|
[1]
|
Evaluating Dynamic Software Update Safety Using Efficient Systematic
Testing.
Christopher M. Hayden, Edward K. Smith, Eric A. Hardisty, Michael
Hicks, and Jeffrey S. Foster.
IEEE Transactions on Software Engineering, 38(6):1340--1354,
December 2012.
Accepted September 2011.
|
[2]
|
Automating Object Transformations for Dynamic Software Updating.
Stephen Magill, Michael Hicks, Suriya Subramanian, and Kathryn S.
McKinley.
In Proceedings of the ACM Conference on Object-Oriented
Programming Languages, Systems, and Applications (OOPSLA), October 2012.
|
[3]
|
Kitsune: Efficient, General-purpose Dynamic Software Updating for C.
Christopher M. Hayden, Edward K. Smith, Michail Denchev, Michael
Hicks, and Jeffrey S. Foster.
In Proceedings of the ACM Conference on Object-Oriented
Programming Languages, Systems, and Applications (OOPSLA), October 2012.
|
[4]
|
Deanonymizing Mobility Traces: Using a Social Network as a Side-Channel.
Mudhakar Srivatsa and Michael Hicks.
In Proceedings of the ACM Conference on Computer and
Communications Security (CCS), October 2012.
|
[5]
|
Towards Standardized Benchmarks for Dynamic Software Updating Systems.
Edward K. Smith, Michael Hicks, and Jeffrey S. Foster.
In Proceedings of the Workshop on Hot Topics in Software
Upgrades (HotSWUp), pages 11--15, June 2012.
|
[6]
|
A Study of Dynamic Software Update Quiescence for Multithreaded Programs.
Christopher M. Hayden, Karla Saur, Michael Hicks, and Jeffrey S.
Foster.
In Proceedings of the Workshop on Hot Topics in Software
Upgrades (HotSWUp), pages 6--10, June 2012.
|
[7]
|
Knowledge-Oriented Secure Multiparty Computation.
Piotr Mardziel, Michael Hicks, Jonathan Katz, and Mudhakar Srivatsa.
In Proceedings of the ACM SIGPLAN Workshop on Programming
Languages and Analysis for Security (PLAS), June 2012.
|
[8]
|
POPL'12 Program Chair's Report (or, how to run a medium-sized
conference).
Michael Hicks.
SIGPLAN Notices, 47(4), April 2012.
|
[9]
|
Specifying and Verifying the Correctness of Dynamic Software Updates.
Christopher M. Hayden, Stephen Magill, Michael Hicks, Nate Foster,
and Jeffrey S. Foster.
In Proceedings of the International Conference on Verified
Software: Theories, Tools, and Experiments (VSTTE), pages 278--293,
January 2012.
|
[1]
|
Lightweight Monadic Programming in ML.
Nikhil Swamy, Nataliya Guts, Daan Leijen, and Michael Hicks.
In Proceedings of the ACM International Conference on
Functional Programming (ICFP), pages 15--27, September 2011.
|
[2]
|
Directed Symbolic Execution.
Kin-Keung Ma, Yit Phang Khoo, Jeffrey S. Foster, and Michael Hicks.
In Eran Yahav, editor, Proceedings of the Static Analysis
Symposium (SAS), volume 6887 of Lecture Notes in Computer Science,
pages 95--111. Springer, September 2011.
|
[3]
|
A demo of Coco: a compiler for monadic coercions in ML.
Nataliya Guts, Michael Hicks, Nikhil Swamy, and Daan Leijen.
In Informal proceedings of the ML Workshop, September 2011.
|
[4]
|
Dynamic Enforcement of Knowledge-based Security Policies.
Piotr Mardziel, Stephen Magill, Michael Hicks, and Mudhakar Srivatsa.
In Proceedings of the Computer Security Foundations Symposium
(CSF), pages 114--128, June 2011.
|
[5]
|
State Transfer for Clear and Efficient Runtime Upgrades.
Christopher M. Hayden, Edward K. Smith, Michael Hicks, and Jeffrey S.
Foster.
In Proceedings of the Workshop on Hot Topics in Software
Upgrades (HotSWUp), pages 179--184, April 2011.
|
[6]
|
Locksmith: Practical Static Race Detection for C.
Polyvios Pratikakis, Jeffrey S. Foster, and Michael Hicks.
ACM Transactions on Programming Languages and Systems
(TOPLAS), 33(1):Article 3, January 2011.
|
[7]
|
Dynamic Inference of Static Types for Ruby.
Jong hoon (David) An, Avik Chaudhuri, Jeffrey S. Foster, and Michael
Hicks.
In Proceedings of the ACM Conference on Principles of
Programming Languages (POPL), pages 459--472, January 2011.
|
[8]
|
Position Paper: Dynamically Inferred Types for Dynamic Languages.
Jong hoon (David) An, Avik Chaudhuri, Jeffrey S. Foster, and Michael
Hicks.
In Proceedings of the Workshop on Scripts to Programs (STOP),
January 2011.
|
[1]
|
Specifying and Verifying the Correctness of Dynamic Software Updates.
Christopher M. Hayden, Stephen Magill, Michael Hicks, Nate Foster,
and Jeffrey S. Foster.
Technical Report CS-TR-4997, University of Maryland Department of
Computer Science, November 2011.
Extended version of VSTTE'12 paper with proofs of theorems and
additional discussion.
|
[2]
|
Evaluating Dynamic Software Update Safety Using Efficient Systematic
Testing.
Christopher M. Hayden, Edward K. Smith, Eric A. Hardisty, Michael
Hicks, and Jeffrey S. Foster.
Technical Report CS-TR-4993, University of Maryland, Department of
Computer Science, September 2011.
|
[3]
|
MultiOtter: Multiprocess Symbolic Execution.
Jonathan Turpie, Elnatan Reisner, Jeffrey S. Foster, and Michael
Hicks.
Technical Report CS-TR-4982, University of Maryland Department of
Computer Science, August 2011.
|
[4]
|
Dynamic Enforcement of Knowledge-based Security Policies.
Piotr Mardziel, Stephen Magill, Michael Hicks, and Mudhakar Srivatsa.
Technical Report CS-TR-4978, University of Maryland Department of
Computer Science, July 2011.
Extended version with proofs and additional benchmarks.
|
[5]
|
Lightweight Monadic Programming in ML.
Nikhil Swamy, Nataliya Guts, Daan Leijen, and Michael Hicks.
Technical Report MSR-TR-2011-039, Microsoft Research, May 2011.
|
[6]
|
Directed Symbolic Execution.
Kin-Keung Ma, Yit Phang Khoo, Jeffrey S. Foster, and Michael Hicks.
Technical Report CS-TR-4979, University of Maryland Department of
Computer Science, April 2011.
Extended version contains refinements and further experimental
analysis.
|
[1]
|
Score: Agile Research Group Management.
Michael Hicks and Jeffrey S. Foster.
Communications of the ACM, 53(10):30--31, October 2010.
|
[2]
|
Secure sharing in distributed information management applications:
problems and directions.
Piotr Mardziel, Adam Bender, Michael Hicks, Dave Levin, Mudhakar
Srivatsa, and Jonathan Katz.
In Proceedings of the Annual Conference of the International
Technology Alliance (ACITA), September 2010.
|
[3]
|
Serializing C intermediate representations for efficient and portable
parsing.
Jeffrey A. Meister, Jeffrey S. Foster, and Michael Hicks.
Software, Practice, and Experience, 40(3):225--238, February
2010.
|
[4]
|
Dynamically Checking Ownership Policies in Concurrent C/C++ Programs.
Jean-Philippe Martin, Michael Hicks, Manuel Costa, Periklis
Akritidis, and Miguel Castro.
In Proceedings of the ACM Conference on Principles of
Programming Languages (POPL), pages 457--470, January 2010.
Full version.
|
[1]
|
Directing JavaScript with Arrows.
Yit Phang Khoo, Michael Hicks, Jeffrey S. Foster, and Vibha Sazawal.
In Proceedings of the ACM SIGPLAN Dynamic Languages
Symposium (DLS), pages 49--58, October 2009.
|
[2]
|
The Ruby Intermediate Language.
Michael Furr, Jong hoon (David) An, Jeffrey S. Foster, and Michael
Hicks.
In Proceedings of the ACM SIGPLAN Dynamic Languages
Symposium (DLS), pages 89--98, October 2009.
|
[3]
|
Triaging Checklists: a Substitute for a PhD in Static Analysis.
Yit Phang Khoo, Jeffrey S. Foster, Michael Hicks, and Vibha Sazawal.
In Proceedings of the Workshop on the Evaluation and Usability
of Programming Languages and Tools (PLATEAU), October 2009.
|
[4]
|
Efficient Systematic Testing for Dynamically Updatable Software.
Christopher M. Hayden, Eric A. Hardisty, Michael Hicks, and
Jeffrey S. Foster.
In Proceedings of the Workshop on Hot Topics in Software
Upgrades (HotSWUp), October 2009.
Invited article.
|
[5]
|
Passive Aggressive Measurement with MGRP.
Pavlos Papageorge, Justin McCann, and Michael Hicks.
In Proceedings of the ACM SIGCOMM Conference on
Applications, Technologies, Architectures, and Protocols for Computer
Communications (SIGCOMM), pages 279--290, August 2009.
|
[6]
|
A Theory of Typed Coercions and its Applications.
Nikhil Swamy, Michael Hicks, and Gavin S. Bierman.
In Proceedings of the ACM International Conference on
Functional Programming (ICFP), pages 329--340, August 2009.
|
[7]
|
Tests to the Left of Me, Types to the Right: How Not to Get Stuck in the
Middle of a Ruby Execution (A Demo of Diamondback Ruby).
Michael Furr, Jong hoon (David) An, Jeffrey S. Foster, and Michael
Hicks.
In Proceedings of the Workshop on Scripts to Programs (STOP),
July 2009.
|
[8]
|
Cross-tier, Label-based Security Enforcement for Web Applications.
Brian J. Corcoran, Nikhil Swamy, and Michael Hicks.
In Proceedings of the ACM SIGMOD International Conference on
Management of Data (SIGMOD), pages 269--282, June 2009.
|
[9]
|
Dynamic Software Updates: A VM-Centric Approach.
Suriya Subramanian, Michael Hicks, and Kathryn S. McKinley.
In Proceedings of the ACM Conference on Programming Language
Design and Implementation (PLDI), pages 1--12, June 2009.
|
[10]
|
Safe and Timely Dynamic Updates for Multi-threaded Programs.
Iulian Neamtiu and Michael Hicks.
In Proceedings of the ACM Conference on Programming Language
Design and Implementation (PLDI), pages 13--24, June 2009.
|
[11]
|
Static Type Inference for Ruby.
Michael Furr, Jong hoon (David) An, Jeffrey S. Foster, and Michael
Hicks.
In Proceedings of the ACM Symposium on Applied Computing,
Object-oriented Programming Languages and Systems Track (OOPS), pages
1859--1866, March 2009.
|
[1]
|
Implicit Flows: Can't live with 'em, can't live without 'em.
Dave King, Boniface Hicks, Michael Hicks, and Trent Jaeger.
In R. Sekar and Arun K. Pujari, editors, Proceedings of the
International Conference on Information Systems Security (ICISS), volume
5352 of Lecture Notes in Computer Science, pages 56--70. Springer,
December 2008.
|
[2]
|
Path Projection for User-Centered Static Analysis Tools.
Yit Phang Khoo, Jeffrey S. Foster, Michael Hicks, and Vibha Sazawal.
In Proceedings of the ACM Workshop on Program Analysis for
Software Tools and Engineering (PASTE), pages 57--63, November 2008.
|
[3]
|
Directing JavaScript with Arrows (poster summary).
Yit Phang Khoo, Michael Hicks, Jeffrey S. Foster, and Vibha Sazawal.
In Poster Proceedings of the ACM International Conference on
Functional Programming (ICFP), September 2008.
|
[4]
|
Formalizing Soundness of Contextual Effects.
Polyvios Pratikakis, Jeffrey S. Foster, Michael Hicks, and Iulian
Neamtiu.
In Otmane Aït Mohamed, César Mun̄oz, and Sofiène Tahar,
editors, Proceedings of the International Conference on Theorem Proving
in Higher Order Logics (TPHOLs), volume 5170 of Lecture Notes in
Computer Science, pages 262--277. Springer, August 2008.
|
[5]
|
Dynamic Rebinding for Marshalling and Update, via Redex-time and
Destruct-time Reduction.
Peter Sewell, Gareth Stoyle, Michael Hicks, Gavin Bierman, and Keith
Wansbrough.
Journal of Functional Programming (JFP), 18(4):437--502, July
2008.
Appeared on-line October, 2007. Supercedes ICFP 2003 and USE 2003
papers.
|
[6]
|
Verified Enforcement of Stateful Information Release Policies.
Nikhil Swamy and Michael Hicks.
In Proceedings of the ACM SIGPLAN Workshop on Programming
Languages and Analysis for Security (PLAS), pages 21--32, June 2008.
|
[7]
|
Modular Information Hiding and Type Safe Linking for C.
Saurabh Srivastava, Michael Hicks, Jeffrey S. Foster, and Patrick
Jenkins.
IEEE Transactions on Software Engineering, 34(3):1--20, May
2008.
Full version of TLDI 07 paper.
|
[8]
|
Fable: A Language for Enforcing User-defined Security Policies.
Nikhil Swamy, Brian Corcoran, and Michael Hicks.
In Proceedings of the IEEE Symposium on Security and Privacy
(Oakland), pages 369--383, May 2008.
|
[9]
|
Contextual Effects for Version-Consistent Dynamic Software Updating and
Safe Concurrent Programming.
Iulian Neamtiu, Michael Hicks, Jeffrey S. Foster, and Polyvios
Pratikakis.
In Proceedings of the ACM Conference on Principles of
Programming Languages (POPL), pages 37--50, January 2008.
|
[1]
|
Path Projection for User-Centered Static Analysis Tools (long version).
Yit Phang Khoo, Jeffrey S. Foster, Michael Hicks, and Vibha Sazawal.
Technical Report CS-TR-4919, University of Maryland, Department of
Computer Science, August 2008.
|
[2]
|
Directing JavaScript with Arrows (Functional Pearl).
Yit Phang Khoo, Michael Hicks, Jeffrey S. Foster, and Vibha Sazawal.
Technical Report CS-TR-4923, University of Maryland, Department of
Computer Science, August 2008.
Extended version of ICFP 2008 poster.
|
[3]
|
Verified Enforcement of Automaton-based Information Release Policies.
Nikhil Swamy and Michael Hicks.
Technical Report CS-TR-4906, University of Maryland, Department of
Computer Science, 2008.
Full version of PLAS 08 paper.
|
[1]
|
Combining Provenance and Security Policies in a Web-based Document
Management System.
Brian Corcoran, Nikhil Swamy, and Michael Hicks.
In On-line Proceedings of the Workshop on Principles of
Provenance (PrOPr), November 2007.
http://homepages.inf.ed.ac.uk/jcheney/propr/.
|
[2]
|
Automated Detection of Persistent Kernel Control-Flow Attacks.
Nick L. Petroni, Jr. and Michael Hicks.
In Proceedings of the ACM Conference on Computer and
Communications Security (CCS), pages 103--115, October 2007.
|
[3]
|
Verified Enforcement of Security Policies for Cross-Domain Information
Flows.
Nikhil Swamy, Michael Hicks, and Simon Tsang.
In Proceedings of the 2007 Military Communications Conference
(MILCOM), October 2007.
|
[4]
|
Mutatis Mutandis: Safe and Flexible Dynamic Software Updating (full
version).
Gareth Stoyle, Michael Hicks, Gavin Bierman, Peter Sewell, and Iulian
Neamtiu.
ACM Transactions on Programming Languages and Systems
(TOPLAS), 29(4), August 2007.
Full version of POPL 05 paper.
|
[5]
|
Improving Software Quality with Static Analysis.
Jeffrey S. Foster, Michael W. Hicks, and William Pugh.
In Proceedings of the ACM Workshop on Program Analysis for
Software Tools and Engineering (PASTE), pages 83--84, June 2007.
|
[6]
|
Defeating Scripting Attacks with Browser-Enforced Embedded Policies.
Trevor Jim, Nikhil Swamy, and Michael Hicks.
In Proceedings of the International World Wide Web Conference
(WWW), pages 601--610, May 2007.
|
[7]
|
Modular Information Hiding and Type Safety for C.
Saurabh Srivastava, Michael Hicks, and Jeffrey S. Foster.
In Proceedings of the ACM Workshop on Types in Language Design
and Implementation (TLDI), pages 3--14, January 2007.
|
[1]
|
Fable: A Language for Enforcing User-defined Security Policies.
Nikhil Swamy, Brian J. Corcoran, and Michael Hicks.
Technical Report CS-TR-4895, University of Maryland, Department of
Computer Science, November 2007.
Full version of Oakland 08 paper.
|
[2]
|
Automated Detection of Persistent Kernel Control-Flow Attacks.
Nick L. Petroni, Jr. and Michael Hicks.
Technical Report CS-TR-4880, Department of Computer Science,
University of Maryland, October 2007.
Extends the CCS 2007 paper with more thorough performance results.
|
[3]
|
Contextual Effects for Version-Consistent Dynamic Software Updating and
Safe Concurrent Programming (extended version).
Iulian Neamtiu, Michael Hicks, Jeffrey S. Foster, and Polyvios
Pratikakis.
Technical Report CS-TR-4875, University of Maryland, Department of
Computer Science, July 2007.
|
[4]
|
Appendix to CMod: Modular Information Hiding and Type-Safe Linking for
C.
Saurabh Srivastava, Michael Hicks, and Jeffrey S. Foster.
Technical Report CS-TR-4874, Department of Computer Science,
University of Maryland, June 2007.
|
[5]
|
Toward Specifying and Validating Cross-Domain Policies.
Michael Hicks, Nikhil Swamy, and Simon Tsang.
Technical Report CS-TR-4870, Department of Computer Science,
University of Maryland, April 2007.
|
[1]
|
Safe Manual Memory Management in Cyclone.
Nikhil Swamy, Michael Hicks, Greg Morrisett, Dan Grossman, and Trevor
Jim.
Science of Computer Programming (SCP), 62(2):122--144, October
2006.
Special issue on memory management. Expands ISMM conference paper of
the same name.
|
[2]
|
Existential Label Flow Inference via CFL Reachability.
Polyvios Pratikakis, Jeffrey S. Foster, and Michael Hicks.
In Kwangkeun Yi, editor, Proceedings of the Static Analysis
Symposium (SAS), volume 4134 of Lecture Notes in Computer Science,
pages 88--106. Springer-Verlag, August 2006.
|
[3]
|
Managing Policy Updates in Security-Typed Languages.
Nikhil Swamy, Michael Hicks, Stephen Tse, and Steve Zdancewic.
In Proceedings of the Computer Security Foundations Workshop
(CSFW), pages 202--216, July 2006.
|
[4]
|
Practical Dynamic Software Updating for C.
Iulian Neamtiu, Michael Hicks, Gareth Stoyle, and Manuel Oriol.
In Proceedings of the ACM Conference on Programming Language
Design and Implementation (PLDI), pages 72--83, June 2006.
|
[5]
|
Context-sensitive Correlation Analysis for Detecting Races.
Polyvios Pratikakis, Jeffrey S. Foster, and Michael Hicks.
In Proceedings of the ACM Conference on Programming Language
Design and Implementation (PLDI), pages 320--331, June 2006.
|
[6]
|
Inferring Locking for Atomic Sections.
Michael Hicks, Jeffrey S. Foster, and Polyvios Pratikakis.
In On-line Proceedings of the ACM SIGPLAN Workshop on Languages,
Compilers, and Hardware Support for Transactional Computing (TRANSACT), June
2006.
http://www.cs.purdue.edu/homes/jv/events/TRANSACT/transact-06.tgz.
|
[7]
|
Trusted Declassification: high-level policy for a security-typed
language.
Boniface Hicks, Dave King, Patrick McDaniel, and Michael Hicks.
In Proceedings of the ACM SIGPLAN Workshop on Programming
Languages and Analysis for Security (PLAS), pages 65--74, June 2006.
|
[8]
|
PLAN: A Packet Language for Active Networks (Extended version).
Michael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter,
and Scott M. Nettles.
Unpublished manuscript. Consolidates ICFP 98, IPL 98, Allterton 99
papers, May 2006.
|
[1]
|
Managing Policy Updates in Security-Typed Languages (Extended version).
Nikhil Swamy, Michael Hicks, Stephen Tse, and Steve Zdancewic.
Technical Report CS-TR-4793, Department of Computer Science,
University of Maryland, August 2006.
Extends CSFW version to include full proofs and additional discussion
about metapolicies.
|
[2]
|
Defining and Enforcing C's Module System.
Saurabh Srivastava, Michael Hicks, Jeffrey S. Foster, and Bhargav
Kanagal.
Technical Report CS-4816, Department of Computer Science, University
of Maryland, July 2006.
|
[3]
|
Context-sensitive Correlation Analysis for Detecting Races (Extended
version).
Polyvios Pratikakis, Jeffrey S. Foster, and Michael Hicks.
Technical Report CS-TR-4789, Department of Computer Science,
University of Maryland, June 2006.
Extends PLDI 2006 paper with full formal development.
|
[4]
|
Trusted Declassification: high-level policy for a security-typed language
(Extended version).
Boniface Hicks, Dave King, Patrick McDaniel, and Michael Hicks.
Technical Report NAS-TR-033-2006, Department of Computer Science and
Engineering, the Pennsylvania State University, June 2006.
Extended version of the PLAS 2006 paper with full formal development.
|
[5]
|
Practical Dynamic Software Updating for C (Extended version).
Iulian Neamtiu, Michael Hicks, Gareth Stoyle, and Manuel Oriol.
Technical Report CS-TR-4790, Department of Computer Science,
University of Maryland, March 2006.
Extended version of PLDI 06 paper.
|
[1]
|
Dynamic Inference of Polymorphic Lock Types.
James Rose, Nikhil Swamy, and Michael Hicks.
Science of Computer Programming (SCP), 58(3):366--383, December
2005.
Special Issue on Concurrency and Synchronization in Java programs.
Supercedes 2004 CSJP paper of the same name.
|
[2]
|
Dynamic Software Updating.
Michael Hicks and Scott M. Nettles.
ACM Transactions on Programming Languages and Systems
(TOPLAS), 27(6):1049--1096, November 2005.
|
[3]
|
Toward On-line Schema Evolution for Non-stop Systems.
Amol Deshpande and Michael Hicks.
Presented at the 11th High Performance Transaction Systems Workshop,
September 2005.
|
[4]
|
Dynamic Updating of Information-Flow Policies.
Michael Hicks, Stephen Tse, Boniface Hicks, and Steve Zdancewic.
In Proceedings of the International Workshop on Foundations of
Computer Security (FCS), pages 7--18, June 2005.
|
[5]
|
Understanding Source Code Evolution Using Abstract Syntax Tree Matching.
Iulian Neamtiu, Jeffrey S. Foster, and Michael Hicks.
In Proceedings of the International Workshop on Mining Software
Repositories (MSR), pages 1--5, May 2005.
|
[6]
|
Tagged Sets: a Secure and Transparent Coordination Medium.
Manuel Oriol and Michael Hicks.
In Jean-Marie Jacquet and Gian Pietro Picco, editors,
Proceedings of the International Conference on Coordination Models and
Languages (COORDINATION), volume 3454 of Lecture Notes in Computer
Science, pages 252--267. Springer-Verlag, April 2005.
|
[7]
|
Merging Network Measurement with Data Transport (Extended Abstract).
Pavlos Papageorgiou and Michael Hicks.
In Proceedings of the IEEE Passive/Active Measurement Workshop
(PAM), volume 3431, pages 368--371. Springer-Verlag, March 2005.
|
[8]
|
Mutatis Mutandis: Safe and Flexible Dynamic Software Updating.
Gareth Stoyle, Michael Hicks, Gavin Bierman, Peter Sewell, and Iulian
Neamtiu.
In Proceedings of the ACM Conference on Principles of
Programming Languages (POPL), pages 183--194, January 2005.
|
[9]
|
Cyclone: a Type-safe Dialect of C.
Dan Grossman, Michael Hicks, Trevor Jim, and Greg Morrisett.
C/C++ Users Journal, 23(1), January 2005.
|
[1]
|
Experience with Safe Manual Memory Management in Cyclone.
Michael Hicks, Greg Morrisett, Dan Grossman, and Trevor Jim.
In Proceedings of the ACM International Symposium on Memory
Management (ISMM), pages 73--84, October 2004.
An abstract of this paper appeared in SPACE `04,
http://www.diku.dk/topps/space2004/space_final/hicks-grossman-jim.pdf.
|
[2]
|
Transparent Proxies for Java Futures.
Polyvios Pratikakis, Jaime Spacco, and Michael Hicks.
In Proceedings of the ACM Conference on Object-Oriented
Programming Languages, Systems, and Applications (OOPSLA), pages 206--223,
October 2004.
|
[3]
|
Dynamic Inference of Polymorphic Lock Types.
James Rose, Nikhil Swamy, and Michael Hicks.
In Proceedings of the ACM Conference on Principles of
Distributed Computing (PODC) Workshop on Concurrency and Synchronization in
Java Programs (CSJP), pages 18--25, July 2004.
|
[1]
|
Dynamic Rebinding for Marshalling and Update with Destruct-time
λ.
Gavin Bierman, Michael Hicks, Peter Sewell, Gareth Stoyle, and Keith
Wansbrough.
In Proceedings of the ACM International Conference on
Functional Programming (ICFP), pages 99--110, August 2003.
|
[2]
|
A Secure PLAN.
Michael Hicks, Angelos D. Keromytis, and Jonathan M. Smith.
IEEE Transactions on Systems, Man, and Cybernetics, Part C,
33(3):413--426, August 2003.
Special Issue on Technologies Promoting Computational Intelligence,
Openness and Programmability in Networks and Internet Services, Part I.
|
[3]
|
Formalizing Dynamic Software Updating.
Gavin Bierman, Michael Hicks, Peter Sewell, and Gareth Stoyle.
In On-line Proceedings of the Second International Workshop on
Unanticipated Software Evolution (USE), April 2003.
http://www.informatik.uni-bonn.de/~gk/use/2003/Papers/papers.html.
|
[4]
|
User-Specified Adaptive Scheduling in a Streaming Media Network.
Michael Hicks, Adithya Nagarajan, and Robbert van Renesse.
In Proceedings of the IEEE Conference on Open Architectures
(OPENARCH), pages 87--96, April 2003.
|
[1]
|
Evolution in Action: Using Active Networking to Evolve Network Support for
Mobility.
Seo-Kyu Song, Stephen Shannon, Michael Hicks, and Scott Nettles.
In James Sterbenz, Osamu Takada, Christian Tschudin, and Bernhard
Plattner, editors, Proceedings of the Fourth International Working
Conference on Active Networks (IWAN), volume 2546 of Lecture Notes in
Computer Science, pages 146--161. Springer-Verlag, December 2002.
|
[2]
|
Cyclone: A Safe Dialect of C.
Trevor Jim, Greg Morrisett, Dan Grossman, Michael Hicks, James
Cheney, and Yanling Wang.
In Proceedings of the USENIX Annual Technical Conference,
pages 275--288. USENIX, June 2002.
|
[3]
|
Region-based Memory Management in Cyclone.
Dan Grossman, Greg Morrisett, Trevor Jim, Michael Hicks, Yanling
Wang, and James Cheney.
In Proceedings of the ACM Conference on Programming Language
Design and Implementation (PLDI), pages 282--293. ACM, June 2002.
|
[4]
|
Experiences with Capsule-based Active Networking.
Michael Hicks, Jonathan T. Moore, David Wetherall, and Scott Nettles.
In Proceedings of the DARPA Active Networks Conference and
Exposition (DANCE), pages 16--24. IEEE, May 2002.
|
[1]
|
Compiling PLAN to SNAP.
Michael Hicks, Jonathan T. Moore, and Scott Nettles.
In Ian W. Marshall, Scott Nettles, and Naoki Wakamiya, editors,
Proceedings of the Third International Working Conference on Active Networks
(IWAN), volume 2207 of Lecture Notes in Computer Science, pages
134--151. Springer-Verlag, October 2001.
|
[2]
|
Dynamic Software Updating.
Michael Hicks.
PhD thesis, Department of Computer and Information Science,
University of Pennsylvania, August 2001.
Winner of the 2002 ACM SIGPLAN Doctoral Dissertation award.
|
[3]
|
Dynamic Software Updating.
Michael Hicks, Jonathan T. Moore, and Scott Nettles.
In Proceedings of the ACM Conference on Programming Language
Design and Implementation (PLDI), pages 13--23. ACM, June 2001.
|
[4]
|
Practical Programmable Packets.
Jonathan T. Moore, Michael Hicks, and Scott Nettles.
In Proceedings of the Twentieth IEEE Computer and
Communication Society INFOCOM Conference, pages 41--50. IEEE, April
2001.
|
[1]
|
Scalable Resource Control in Active Networks.
Kostas G. Anagnostakis, Michael W. Hicks, Sotiris Ioannidis,
Angelos D. Keromytis, and Jonathan M. Smith.
In Hiroshi Yashuda, editor, Proceedings of the Second
International Working Conference on Active Networks (IWAN), volume 1942 of
Lecture Notes in Computer Science, pages 343--358. Springer-Verlag,
October 2000.
|
[2]
|
Active Networking means Evolution (or Enhanced Extensibility Required).
Michael Hicks and Scott Nettles.
In Hiroshi Yashuda, editor, Proceedings of the Second
International Working Conference on Active Networks (IWAN), volume 1942 of
Lecture Notes in Computer Science, pages 16--32. Springer-Verlag,
October 2000.
|
[3]
|
Safe and Flexible Dynamic Linking of Native Code.
Michael Hicks, Stephanie Weirich, and Karl Crary.
In Robert Harper, editor, Proceedings of the ACM SIGPLAN
Workshop on Types in Compilation (TIC), volume 2071 of Lecture Notes in
Computer Science. Springer-Verlag, September 2000.
|
[1]
|
Chunks in PLAN: Language Support for Programs as Packets.
Jonathan T. Moore, Michael Hicks, and Scott M. Nettles.
In Proceedings of the 37th Annual Allerton Conference on
Communication, Control, and Computing, September 1999.
|
[2]
|
Specifying the PLAN Network Programming Language.
Pankaj Kakkar, Michael Hicks, Jonathan T. Moore, and Carl A. Gunter.
In Higher Order Operational Techniques in Semantics (HOOTS),
volume 26 of Electronic Notes in Theoretical Computer Science, pages
87--104. Elsevier, September 1999.
|
[3]
|
Transparent Communication for Distributed Objects in Java.
Michael Hicks, Suresh Jagannathan, Richard Kelsey, Jonathan T. Moore,
and Cristian Ungureanu.
In Proceedings of the ACM SIGPLAN Java Grande Conference,
pages 160--170. ACM, June 1999.
|
[4]
|
A Secure PLAN.
Michael Hicks and Angelos D. Keromytis.
In Stefan Covaci, editor, Proceedings of the First International
Working Conference on Active Networks (IWAN), volume 1653 of Lecture
Notes in Computer Science, pages 307--314. Springer-Verlag, June 1999.
Reprinted with extensions in DARPA Active Networks Conference and
Exposition (DANCE) and IEEE Transactions on Systems, Man, and Cybernetics,
Part C.
|
[5]
|
PLANet: An Active Internetwork.
Michael Hicks, Jonathan T. Moore, D. Scott Alexander, Carl A. Gunter,
and Scott Nettles.
In Proceedings of the Eighteenth IEEE Computer and
Communication Society INFOCOM Conference, pages 1124--1133. IEEE, March
1999.
|
[1]
|
A Study of Large Object Spaces.
Michael Hicks, Luke Hornof, Jonathan T. Moore, and Scott Nettles.
In Proceedings of the ACM International Symposium on Memory
Management (ISMM), pages 138--145. ACM, October 1998.
|
[2]
|
The SwitchWare Active Network Implementation.
D. Scott Alexander, Michael W. Hicks, Pankaj Kakkar, Angelos D.
Keromytis, Marianne Shaw, Jonathan T. Moore, Carl A. Gunter, Trevor Jim,
Scott M. Nettles, and Jonathan M. Smith.
In Notes of the ACM SIGPLAN Workshop on ML, pages 67--76,
September 1998.
|
[3]
|
PLAN: A Packet Language for Active Networks.
Michael Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, and
Scott Nettles.
In Proceedings of the Third ACM SIGPLAN International
Conference on Functional Programming Languages (ICFP), pages 86--93. ACM,
September 1998.
|
[4]
|
Network Programming Using PLAN.
Michael Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, and
Scott Nettles.
In Luca Cardelli, editor, Proceedings of the IEEE Workshop on
Internet Programming Languages, volume 1686 of Lecture Notes in
Computer Science, pages 127--143. Springer-Verlag, May 1998.
|
[5]
|
The SwitchWare Active Network Architecture.
D. Scott Alexander, William A. Arbaugh, Michael Hicks, Pankaj Kakkar,
Angelos Keromytis, Jonathan T. Moore, Carl A. Gunter, Scott M. Nettles, and
Jonathan M. Smith.
IEEE Network Magazine, 12(3):29--36, 1998.
Special issue on Active and Controllable Networks.
|
All works on this page are copyrighted. Permission to make digital or hard copies of all or part of these works for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that all copies bear this notice and the full citation on the first page. For some of these works, such license may be prohibited by the copyright owners. To copy otherwise, to republish, to post on servers or to redistribute, requires specific written permission and a fee.
Some of this work was supported by the National Science Foundation; any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.