Michael Hicks
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
52 | EE | Michael Furr, Jong-hoon (David) An, Jeffrey S. Foster, Michael W. Hicks: Static type inference for Ruby. SAC 2009: 1859-1866 |
2008 | ||
51 | EE | Dave King, Boniface Hicks, Michael Hicks, Trent Jaeger: Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. ICISS 2008: 56-70 |
50 | EE | Nikhil Swamy, Brian J. Corcoran, Michael Hicks: Fable: A Language for Enforcing User-defined Security Policies. IEEE Symposium on Security and Privacy 2008: 369-383 |
49 | EE | Yit Phang Khoo, Jeffrey S. Foster, Michael Hicks, Vibha Sazawal: Path projection for user-centered static analysis tools. PASTE 2008: 57-63 |
48 | EE | Nikhil Swamy, Michael Hicks: Verified enforcement of stateful information release policies. PLAS 2008: 21-32 |
47 | EE | Iulian Neamtiu, Michael Hicks, Jeffrey S. Foster, Polyvios Pratikakis: Contextual effects for version-consistent dynamic software updatingalland safe concurrent programming. POPL 2008: 37-49 |
46 | EE | Polyvios Pratikakis, Jeffrey S. Foster, Michael Hicks, Iulian Neamtiu: Formalizing Soundness of Contextual Effects. TPHOLs 2008: 262-277 |
45 | EE | Saurabh Srivastava, Michael Hicks, Jeffrey S. Foster, Patrick Jenkins: Modular Information Hiding and Type-Safe Linking for C. IEEE Trans. Software Eng. 34(3): 357-376 (2008) |
44 | EE | Peter Sewell, Gareth Stoyle, Michael Hicks, Gavin M. Bierman, Keith Wansbrough: Dynamic rebinding for marshalling and update, via redex-time and destruct-time reduction. J. Funct. Program. 18(4): 437-502 (2008) |
43 | EE | Nikhil Swamy, Michael Hicks: Verified enforcement of stateful information release policies. SIGPLAN Notices 43(12): 21-31 (2008) |
2007 | ||
42 | Michael W. Hicks: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, June 14, 2007 ACM 2007 | |
41 | EE | Nick L. Petroni Jr., Michael W. Hicks: Automated detection of persistent kernel control-flow attacks. ACM Conference on Computer and Communications Security 2007: 103-115 |
40 | EE | Jeffrey S. Foster, Michael W. Hicks, William Pugh: Improving software quality with static analysis. PASTE 2007: 83-84 |
39 | EE | Saurabh Srivastava, Michael Hicks, Jeffrey S. Foster: Modular information hiding and type-safe linking for C. TLDI 2007: 3-14 |
38 | EE | Trevor Jim, Nikhil Swamy, Michael Hicks: Defeating script injection attacks with browser-enforced embedded policies. WWW 2007: 601-610 |
37 | EE | Gareth Stoyle, Michael W. Hicks, Gavin M. Bierman, Peter Sewell, Iulian Neamtiu: Mutatis Mutandis: Safe and predictable dynamic software updating. ACM Trans. Program. Lang. Syst. 29(4): (2007) |
2006 | ||
36 | EE | Nikhil Swamy, Michael Hicks, Stephen Tse, Steve Zdancewic: Managing Policy Updates in Security-Typed Languages. CSFW 2006: 202-216 |
35 | EE | Boniface Hicks, Dave King, Patrick McDaniel, Michael Hicks: Trusted declassification: : high-level policy for a security-typed language. PLAS 2006: 65-74 |
34 | EE | Polyvios Pratikakis, Jeffrey S. Foster, Michael W. Hicks: LOCKSMITH: context-sensitive correlation analysis for race detection. PLDI 2006: 320-331 |
33 | EE | Iulian Neamtiu, Michael W. Hicks, Gareth Stoyle, Manuel Oriol: Practical dynamic software updating for C. PLDI 2006: 72-83 |
32 | EE | Polyvios Pratikakis, Jeffrey S. Foster, Michael Hicks: Existential Label Flow Inference Via CFL Reachability. SAS 2006: 88-106 |
31 | EE | Nikhil Swamy, Michael W. Hicks, Greg Morrisett, Dan Grossman, Trevor Jim: Safe manual memory management in Cyclone. Sci. Comput. Program. 62(2): 122-144 (2006) |
2005 | ||
30 | EE | Manuel Oriol, Michael W. Hicks: Tagged Sets: A Secure and Transparent Coordination Medium. COORDINATION 2005: 252-267 |
29 | EE | Iulian Neamtiu, Jeffrey S. Foster, Michael W. Hicks: Understanding source code evolution using abstract syntax tree matching. MSR 2005 |
28 | EE | Pavlos Papageorgiou, Michael Hicks: Merging Network Measurement with Data Transport. PAM 2005: 368-371 |
27 | EE | Gareth Stoyle, Michael W. Hicks, Gavin M. Bierman, Peter Sewell, Iulian Neamtiu: Mutatis mutandis: safe and predictable dynamic software updating. POPL 2005: 183-194 |
26 | EE | Iulian Neamtiu, Jeffrey S. Foster, Michael Hicks: Understanding source code evolution using abstract syntax tree matching. ACM SIGSOFT Software Engineering Notes 30(4): 1-5 (2005) |
25 | EE | Michael W. Hicks, Scott Nettles: Dynamic software updating. ACM Trans. Program. Lang. Syst. 27(6): 1049-1096 (2005) |
24 | EE | James Rose, Nikhil Swamy, Michael Hicks: Dynamic inference of polymorphic lock types. Sci. Comput. Program. 58(3): 366-383 (2005) |
2004 | ||
23 | EE | Michael W. Hicks, J. Gregory Morrisett, Dan Grossman, Trevor Jim: Experience with safe manual memory-management in cyclone. ISMM 2004: 73-84 |
22 | EE | Polyvios Pratikakis, Jaime Spacco, Michael W. Hicks: Transparent proxies for java futures. OOPSLA 2004: 206-223 |
2003 | ||
21 | EE | Gavin M. Bierman, Michael W. Hicks, Peter Sewell, Gareth Stoyle, Keith Wansbrough: Dynamic rebinding for marshalling and update, with destruct-time? ICFP 2003: 99-110 |
20 | Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith: A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C 33(3): 413-426 (2003) | |
2002 | ||
19 | EE | Michael W. Hicks, Jonathan T. Moore, David Wetherall, Scott Nettles: Experiences with Capsule-Based Active Networking. DANCE 2002: 16-24 |
18 | EE | Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith: A Secure PLAN. DANCE 2002: 224-237 |
17 | EE | Seong-Kyu Song, Stephen Shannon, Michael W. Hicks, Scott Nettles: Evolution in Action: Using Active Networking to Evolve Network Support for Mobility. IWAN 2002: 146-161 |
16 | EE | Dan Grossman, J. Gregory Morrisett, Trevor Jim, Michael W. Hicks, Yanling Wang, James Cheney: Region-Based Memory Management in Cyclone. PLDI 2002: 282-293 |
15 | EE | Trevor Jim, J. Gregory Morrisett, Dan Grossman, Michael W. Hicks, James Cheney, Yanling Wang: Cyclone: A Safe Dialect of C. USENIX Annual Technical Conference, General Track 2002: 275-288 |
2001 | ||
14 | EE | Jonathan T. Moore, Michael W. Hicks, Scott Nettles: Practical Programmable Packets. INFOCOM 2001: 41-50 |
13 | EE | Michael W. Hicks, Jonathan T. Moore, Scott Nettles: Compiling PLAN to SNAP. IWAN 2001: 134-151 |
12 | Michael W. Hicks, Jonathan T. Moore, Scott Nettles: Dynamic Software Updating. PLDI 2001: 13-23 | |
2000 | ||
11 | EE | Michael W. Hicks, Scott Nettles: Active Networking Means Evolution (or Enhanced Extensibility Required). IWAN 2000: 16-32 |
10 | EE | Kostas G. Anagnostakis, Michael W. Hicks, Sotiris Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Scalable Resource Control in Active Networks. IWAN 2000: 343-357 |
9 | EE | Michael W. Hicks, Stephanie Weirich, Karl Crary: Safe and Flexible Dynamic Linking of Native Code. Types in Compilation 2000: 147-176 |
1999 | ||
8 | Michael W. Hicks, Jonathan T. Moore, D. Scott Alexander, Carl A. Gunter, Scott Nettles: PLANet: An Active Internetwork. INFOCOM 1999: 1124-1133 | |
7 | Michael W. Hicks, Angelos D. Keromytis: A Secure Plan. IWAN 1999: 307-314 | |
6 | EE | Michael W. Hicks, Suresh Jagannathan, Richard Kelsey, Jonathan T. Moore, Cristian Ungureanu: Transparent Communication for Distributed Objects in Java. Java Grande 1999: 160-170 |
5 | EE | Pankaj Kakkar, Michael W. Hicks, Jonathan T. Moore, Carl A. Gunter: Specifying the PLAN Network Programming Langauge. Electr. Notes Theor. Comput. Sci. 26: (1999) |
1998 | ||
4 | EE | Michael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, Scott Nettles: Network Programming Using PLAN. ICCL Workshop: Internet Programming Languages 1998: 127-143 |
3 | EE | Michael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, Scott Nettles: PLAN: A Packet Language for Active Networks. ICFP 1998: 86-93 |
2 | EE | Michael W. Hicks, Luke Hornof, Jonathan T. Moore, Scott Nettles: A Study of Large Object Spaces. ISMM 1998: 138-145 |
1997 | ||
1 | Michael W. Hicks, Jonathan T. Moore, Scott Nettles: The Measured Cost of Copying Garbage Collection Mechanisms. ICFP 1997: 292-305 |