default search action
Michael Hicks 0001
Person information
- affiliation: Amazon Web Services, USA
- affiliation: University of Maryland, College Park, MD, USA
Other persons with the same name
- Michael Hicks 0002 — University of Hertfordshire, Hatfield, UK
- Michael Hicks 0003 — Curtin University of Techology, Perth, Australia
- Michael Hicks 0004 — Radboud University, Nijmegen, The Netherlands
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Joseph W. Cutler, Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael Hicks, Kesha Hietala, Eleftherios Ioannidis, John H. Kastner, Anwar Mamat, Darin McAdams, Matt McCutchen, Neha Rungta, Emina Torlak, Andrew Wells:
Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization. Proc. ACM Program. Lang. 8(OOPSLA1): 670-697 (2024) - [c105]Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael Hicks, Kesha Hietala, John H. Kastner, Anwar Mamat, Matt McCutchen, Neha Rungta, Bhakti Shah, Emina Torlak, Andrew Wells:
How We Built Cedar: A Verification-Guided Approach. SIGSOFT FSE Companion 2024: 351-357 - [i30]Joseph W. Cutler, Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael Hicks, Kesha Hietala, Eleftherios Ioannidis, John H. Kastner, Anwar Mamat, Darin McAdams, Matt McCutchen, Neha Rungta, Emina Torlak, Andrew Wells:
Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization (Extended Version). CoRR abs/2403.04651 (2024) - [i29]Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael Hicks, Kesha Hietala, John H. Kastner, Anwar Mamat, Matt McCutchen, Neha Rungta, Bhakti Shah, Emina Torlak, Andrew Wells:
How We Built Cedar: A Verification-Guided Approach. CoRR abs/2407.01688 (2024) - 2023
- [j38]Liyi Li, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn, Michael Hicks:
A formal model of Checked C. J. Comput. Secur. 31(5): 581-614 (2023) - [j37]Jie Zhou, John Criswell, Michael Hicks:
Fat Pointers for Temporal Memory Safety of C. Proc. ACM Program. Lang. 7(OOPSLA1): 316-347 (2023) - [j36]Finn Voichick, Liyi Li, Robert Rand, Michael Hicks:
Qunity: A Unified Language for Quantum and Classical Computing. Proc. ACM Program. Lang. 7(POPL): 921-951 (2023) - [j35]Ian Sweet, David Darais, David Heath, William Harris, Ryan Estes, Michael Hicks:
Symphony: Expressive Secure Multiparty Computation with Coordination. Art Sci. Eng. Program. 7(3) (2023) - [j34]Kesha Hietala, Robert Rand, Liyi Li, Shih-Han Hung, Xiaodi Wu, Michael Hicks:
A Verified Optimizer for Quantum Circuits. ACM Trans. Program. Lang. Syst. 45(3): 18:1-18:35 (2023) - [j33]Zenong Zhang, George Klees, Eric Wang, Michael Hicks, Shiyi Wei:
Fuzzing Configurations of Program Options. ACM Trans. Softw. Eng. Methodol. 32(2): 53:1-53:21 (2023) - [j32]Zenong Zhang, George Klees, Eric Wang, Michael Hicks, Shiyi Wei:
Fuzzing Configurations of Program Options - RCR Report. ACM Trans. Softw. Eng. Methodol. 32(2): 55:1-55:3 (2023) - [i28]Ian Sweet, David Darais, David Heath, William Harris, Ryan Estes, Michael Hicks:
Symphony: Expressive Secure Multiparty Computation with Coordination. CoRR abs/2302.10076 (2023) - 2022
- [j31]Aravind Machiry, John H. Kastner, Matt McCutchen, Aaron Eline, Kyle Headley, Michael Hicks:
C to checked C by 3c. Proc. ACM Program. Lang. 6(OOPSLA1): 1-29 (2022) - [j30]Liyi Li, Finn Voichick, Kesha Hietala, Yuxiang Peng, Xiaodi Wu, Michael Hicks:
Verified compilation of Quantum oracles. Proc. ACM Program. Lang. 6(OOPSLA2): 589-615 (2022) - [c104]Kelsey R. Fulton, Daniel Votipka, Desiree Abrokwa, Michelle L. Mazurek, Michael Hicks, James Parker:
Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition. CCS 2022: 1141-1155 - [c103]Liyi Li, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn, Michael Hicks:
A Formal Model of Checked C. CSF 2022: 49-63 - [c102]Michael Coblenz, Michelle L. Mazurek, Michael Hicks:
Garbage Collection Makes Rust Easier to Use: A Randomized Controlled Trial of the Bronze Garbage Collector. ICSE 2022: 1021-1032 - [c101]Zenong Zhang, Zach Patterson, Michael Hicks, Shiyi Wei:
FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing. USENIX Security Symposium 2022: 3699-3715 - [i27]Liyi Li, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn, Michael Hicks:
A Formal Model of Checked C. CoRR abs/2201.13394 (2022) - [i26]Aravind Machiry, John H. Kastner, Matt McCutchen, Aaron Eline, Kyle Headley, Michael Hicks:
C to Checked C by 3C. CoRR abs/2203.13445 (2022) - [i25]Yuxiang Peng, Kesha Hietala, Runzhou Tao, Liyi Li, Robert Rand, Michael Hicks, Xiaodi Wu:
A Formally Certified End-to-End Implementation of Shor's Factorization Algorithm. CoRR abs/2204.07112 (2022) - [i24]Finn Voichick, Robert Rand, Michael W. Hicks:
Qunity: A Unified Language for Quantum and Classical Computing. CoRR abs/2204.12384 (2022) - [i23]Jie Zhou, John Criswell, Michael Hicks:
Fat Pointers for Temporal Memory Safety of C. CoRR abs/2208.12900 (2022) - 2021
- [j29]Kesha Hietala, Robert Rand, Shih-Han Hung, Xiaodi Wu, Michael Hicks:
A verified optimizer for Quantum circuits. Proc. ACM Program. Lang. 5(POPL): 1-29 (2021) - [c100]Kesha Hietala, Robert Rand, Shih-Han Hung, Liyi Li, Michael Hicks:
Proving Quantum Programs Correct. ITP 2021: 21:1-21:19 - [c99]Jie Zhou, Michael Hicks, Yudi Yang, John Criswell:
Tutorial: Making C Programs Safer with Checked C. SecDev 2021: 13-14 - [c98]Souvik Bhattacherjee, Gang Liao, Michael Hicks, Daniel J. Abadi:
BullFrog: Online Schema Evolution via Lazy Evaluation. SIGMOD Conference 2021: 194-206 - [c97]Kelsey R. Fulton, Anna Chan, Daniel Votipka, Michael Hicks, Michelle L. Mazurek:
Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study. SOUPS @ USENIX Security Symposium 2021: 597-616 - [i22]Michael Coblenz, Michelle L. Mazurek, Michael Hicks:
Does the Bronze Garbage Collector Make Rust Easier to Use? A Controlled Experiment. CoRR abs/2110.01098 (2021) - [i21]Liyi Li, Finn Voichick, Kesha Hietala, Yuxiang Peng, Xiaodi Wu, Michael Hicks:
Verified Compilation of Quantum Oracles. CoRR abs/2112.06700 (2021) - 2020
- [j28]Benjamin C. Pierce, Michael Hicks, Cristina V. Lopes, Jens Palsberg:
Conferences in an era of expensive carbon. Commun. ACM 63(3): 35-37 (2020) - [j27]Yiyun Liu, James Parker, Patrick Redmond, Lindsey Kuper, Michael Hicks, Niki Vazou:
Verifying replicated data types with typeclass refinements in Liquid Haskell. Proc. ACM Program. Lang. 4(OOPSLA): 216:1-216:30 (2020) - [j26]David Darais, Ian Sweet, Chang Liu, Michael Hicks:
A language for probabilistically oblivious computation. Proc. ACM Program. Lang. 4(POPL): 50:1-50:31 (2020) - [j25]James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton:
Build It, Break It, Fix It: Contesting Secure Development. ACM Trans. Priv. Secur. 23(2): 10:1-10:36 (2020) - [j24]Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks:
Build It, Break It, Fix It Contests: Motivated Developers Still Make Security Mistakes. login Usenix Mag. 45(4) (2020) - [c96]Ian Sweet, David Darais, Michael Hicks:
Short Paper: Probabilistically Almost-Oblivious Computation. PLAS@CCS 2020: 9-12 - [c95]Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks:
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It. USENIX Security Symposium 2020: 109-126 - [i20]Kesha Hietala, Robert Rand, Shih-Han Hung, Liyi Li, Michael Hicks:
Proving Quantum Programs Correct. CoRR abs/2010.01240 (2020)
2010 – 2019
- 2019
- [j23]Leonidas Lampropoulos, Michael Hicks, Benjamin C. Pierce:
Coverage guided, property based testing. Proc. ACM Program. Lang. 3(OOPSLA): 181:1-181:29 (2019) - [j22]Shih-Han Hung, Kesha Hietala, Shaopeng Zhu, Mingsheng Ying, Michael Hicks, Xiaodi Wu:
Quantitative robustness analysis of quantum programs. Proc. ACM Program. Lang. 3(POPL): 31:1-31:29 (2019) - [j21]James Parker, Niki Vazou, Michael Hicks:
LWeb: information flow security for multi-tier web applications. Proc. ACM Program. Lang. 3(POPL): 75:1-75:30 (2019) - [c94]Luís Pina, Anastasios Andronidis, Michael Hicks, Cristian Cadar:
MVEDSUA: Higher Availability Dynamic Software Updates via Multi-Version Execution. ASPLOS 2019: 573-585 - [c93]Andrew Ruef, Leonidas Lampropoulos, Ian Sweet, David Tarditi, Michael Hicks:
Achieving Safety Incrementally with Checked C. POST 2019: 76-98 - [c92]Aseem Rastogi, Nikhil Swamy, Michael Hicks:
Wys*: A DSL for Verified Secure Multi-party Computations. POST 2019: 99-122 - [c91]Robert Rand, Kesha Hietala, Michael Hicks:
Formal Verification vs. Quantum Uncertainty. SNAPL 2019: 12:1-12:11 - [i19]James Parker, Niki Vazou, Michael Hicks:
LWeb: Information Flow Security for Multi-tier Web Applications. CoRR abs/1901.07665 (2019) - [i18]ThanhVu Nguyen, Timos Antonopoulos, Andrew Ruef, Michael Hicks:
A Counterexample-guided Approach to Finding Numerical Invariants. CoRR abs/1903.12113 (2019) - [i17]Kesha Hietala, Robert Rand, Shih-Han Hung, Xiaodi Wu, Michael Hicks:
Verified Optimization in a Quantum Intermediate Representation. CoRR abs/1904.06319 (2019) - [i16]James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton:
Build It, Break It, Fix It: Contesting Secure Development. CoRR abs/1907.01679 (2019) - [i15]Kesha Hietala, Robert Rand, Shih-Han Hung, Xiaodi Wu, Michael Hicks:
A Verified Optimizer for Quantum Circuits. CoRR abs/1912.02250 (2019) - 2018
- [c90]George Klees, Andrew Ruef, Benji Cooper, Shiyi Wei, Michael Hicks:
Evaluating Fuzz Testing. CCS 2018: 2123-2138 - [c89]Shiyi Wei, Piotr Mardziel, Andrew Ruef, Jeffrey S. Foster, Michael Hicks:
Evaluating Design Tradeoffs in Numeric Static Analysis for Java. ESOP 2018: 653-682 - [c88]Ian Sweet, José Manuel Calderón Trilla, Chad Scherrer, Michael Hicks, Stephen Magill:
What's the Over/Under? Probabilistic Bounds on Information Leakage. POST 2018: 3-27 - [c87]Archibald Samuel Elliott, Andrew Ruef, Michael Hicks, David Tarditi:
Checked C: Making C Safe by Extension. SecDev 2018: 53-60 - [i14]Ian Sweet, José Manuel Calderón Trilla, Chad Scherrer, Michael Hicks, Stephen Magill:
What's the Over/Under? Probabilistic Bounds on Information Leakage. CoRR abs/1802.08234 (2018) - [i13]Shiyi Wei, Piotr Mardziel, Andrew Ruef, Jeffrey S. Foster, Michael Hicks:
Evaluating Design Tradeoffs in Numeric Static Analysis for Java. CoRR abs/1802.08927 (2018) - [i12]George Klees, Andrew Ruef, Benji Cooper, Shiyi Wei, Michael Hicks:
Evaluating Fuzz Testing. CoRR abs/1808.09700 (2018) - [i11]Shih-Han Hung, Kesha Hietala, Shaopeng Zhu, Mingsheng Ying, Michael Hicks, Xiaodi Wu:
Quantitative Robustness Analysis of Quantum Programs (Extended Version). CoRR abs/1811.03585 (2018) - 2017
- [c86]Michael Hicks:
Languages for Oblivious Computation. PLAS@CCS 2017: 1 - [c85]Timos Antonopoulos, Paul Gazzillo, Michael Hicks, Eric Koskinen, Tachio Terauchi, Shiyi Wei:
Decomposition instead of self-composition for proving the absence of timing channels. PLDI 2017: 362-375 - [c84]Mário S. Alvim, Piotr Mardziel, Michael W. Hicks:
Quantifying Vulnerability of Secret Generation Using Hyper-Distributions. POST 2017: 26-48 - [c83]ThanhVu Nguyen, Timos Antonopoulos, Andrew Ruef, Michael Hicks:
Counterexample-guided approach to finding numerical invariants. ESEC/SIGSOFT FSE 2017: 605-615 - [i10]Mário S. Alvim, Piotr Mardziel, Michael W. Hicks:
Quantifying vulnerability of secret generation using hyper-distributions (extended version). CoRR abs/1701.04174 (2017) - [i9]Rock Stevens, Octavian Suciu, Andrew Ruef, Sanghyun Hong, Michael W. Hicks, Tudor Dumitras:
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning. CoRR abs/1701.04739 (2017) - [i8]Aseem Rastogi, Nikhil Swamy, Michael Hicks:
WYS*: A Verified Language Extension for Secure Multi-party Computations. CoRR abs/1711.06467 (2017) - [i7]David Darais, Chang Liu, Ian Sweet, Michael Hicks:
A Language for Probabilistically Oblivious Computation. CoRR abs/1711.09305 (2017) - 2016
- [j20]Robert K. Cunningham, Pamela Gupta, Ulf Lindqvist, Stelios Sidiroglou-Douskos, Michael Hicks:
IEEE SecDev 2016: Prioritizing Secure Development. IEEE Secur. Priv. 14(4): 82-84 (2016) - [j19]Karla Saur, Michael W. Hicks, Jeffrey S. Foster:
C-strider: type-aware heap traversal for C. Softw. Pract. Exp. 46(6): 767-788 (2016) - [c82]Andrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel:
Build It, Break It, Fix It: Contesting Secure Development. CCS 2016: 690-703 - [c81]Karla Saur, Tudor Dumitras, Michael W. Hicks:
Evolving NoSQL Databases without Downtime. ICSME 2016: 166-176 - [c80]Luís Pina, Michael Hicks:
Tedsuto: A General Framework for Testing Dynamic Software Updates. ICST 2016: 278-287 - [c79]Karla Saur, Joseph M. Collard, Nate Foster, Arjun Guha, Laurent Vanbever, Michael W. Hicks:
Safe and Flexible Controller Upgrades for SDNs. SOSR 2016: 8 - [i6]Andrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel:
Build It, Break It, Fix It: Contesting Secure Development. CoRR abs/1606.01881 (2016) - 2015
- [c78]Chang Liu, Austin Harris, Martin Maas, Michael W. Hicks, Mohit Tiwari, Elaine Shi:
GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation. ASPLOS 2015: 87-101 - [c77]Matthew A. Hammer, Jana Dunfield, Kyle Headley, Nicholas Labich, Jeffrey S. Foster, Michael W. Hicks, David Van Horn:
Incremental computation with names. OOPSLA 2015: 748-766 - [e3]Cédric Fournet, Michael W. Hicks, Luca Viganò:
IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7538-2 [contents] - [i5]Matthew A. Hammer, Jana Dunfield, Kyle Headley, Nicholas Labich, Jeffrey S. Foster, Michael Hicks, David Van Horn:
Incremental Computation with Names. CoRR abs/1503.07792 (2015) - [i4]Karla Saur, Tudor Dumitras, Michael W. Hicks:
Evolving NoSQL Databases Without Downtime. CoRR abs/1506.08800 (2015) - [i3]Karla Saur, Joseph M. Collard, Nate Foster, Arjun Guha, Laurent Vanbever, Michael W. Hicks:
Morpheus: Safe and Flexible Dynamic Updates for SDNs. CoRR abs/1509.03614 (2015) - [i2]Andrew Miller, Michael W. Hicks, Jonathan Katz, Elaine Shi:
How to Authenticate any Data Structure. Adv. Math. Commun. 3 (2015) - 2014
- [j18]Christopher M. Hayden, Karla Saur, Edward K. Smith, Michael W. Hicks, Jeffrey S. Foster:
Kitsune: Efficient, General-Purpose Dynamic Software Updating for C. ACM Trans. Program. Lang. Syst. 36(4): 13:1-13:38 (2014) - [c76]Luís Pina, Luís Veiga, Michael W. Hicks:
Rubah: DSU for Java on a stock JVM. OOPSLA 2014: 103-119 - [c75]Matthew A. Hammer, Yit Phang Khoo, Michael Hicks, Jeffrey S. Foster:
Adapton: composable, demand-driven incremental computation. PLDI 2014: 156-166 - [c74]Andrew Miller, Michael Hicks, Jonathan Katz, Elaine Shi:
Authenticated data structures, generically. POPL 2014: 411-424 - [c73]Piotr Mardziel, Mário S. Alvim, Michael W. Hicks, Michael R. Clarkson:
Quantifying Information Flow for Dynamic Secrets. IEEE Symposium on Security and Privacy 2014: 540-555 - [c72]Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, Michael W. Hicks:
Automating Efficient RAM-Model Secure Computation. IEEE Symposium on Security and Privacy 2014: 623-638 - [c71]Aseem Rastogi, Matthew A. Hammer, Michael Hicks:
Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations. IEEE Symposium on Security and Privacy 2014: 655-670 - [c70]Michael Hicks, Gavin M. Bierman, Nataliya Guts, Daan Leijen, Nikhil Swamy:
Polymonadic Programming. MSFP 2014: 79-99 - [i1]Gilles Barthe, Michael Hicks, Florian Kerschbaum, Dominique Unruh:
The Synergy Between Programming Languages and Cryptography (Dagstuhl Seminar 14492). Dagstuhl Reports 4(12): 29-47 (2014) - 2013
- [j17]Piotr Mardziel, Stephen Magill, Michael Hicks, Mudhakar Srivatsa:
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation. J. Comput. Secur. 21(4): 463-532 (2013) - [j16]Derek Dreyer, John Field, Roberto Giacobazzi, Michael Hicks, Suresh Jagannathan, Mooly Sagiv, Peter Sewell, Philip Wadler:
Principles of POPL. ACM SIGPLAN Notices 48(4S): 12-16 (2013) - [c69]Chang Liu, Michael Hicks, Elaine Shi:
Memory Trace Oblivious Program Execution. CSF 2013: 51-65 - [c68]Luís Pina, Michael Hicks:
Rubah: Efficient, General-purpose Dynamic Software Updating for Java. HotSWUp 2013 - [c67]Yit Phang Khoo, Jeffrey S. Foster, Michael Hicks:
Expositor: scriptable time-travel debugging with first-class traces. ICSE 2013: 352-361 - [c66]Aseem Rastogi, Piotr Mardziel, Michael Hicks, Matthew A. Hammer:
Knowledge inference for optimizing secure multi-party computation. PLAS 2013: 3-14 - 2012
- [j15]Michael Hicks:
POPL'12 program chair's report: (or, how to run a medium-sized conference). ACM SIGPLAN Notices 47(4a): 19-27 (2012) - [j14]Christopher M. Hayden, Edward K. Smith, Eric A. Hardisty, Michael Hicks, Jeffrey S. Foster:
Evaluating Dynamic Software Update Safety Using Systematic Testing. IEEE Trans. Software Eng. 38(6): 1340-1354 (2012) - [c65]Mudhakar Srivatsa, Michael Hicks:
Deanonymizing mobility traces: using social network as a side-channel. CCS 2012: 628-637 - [c64]Christopher M. Hayden, Karla Saur, Michael Hicks, Jeffrey S. Foster:
A study of dynamic software update quiescence for multithreaded programs. HotSWUp 2012: 6-10 - [c63]Edward K. Smith, Michael Hicks, Jeffrey S. Foster:
Towards standardized benchmarks for Dynamic Software Updating systems. HotSWUp 2012: 11-15 - [c62]Christopher M. Hayden, Edward K. Smith, Michail Denchev, Michael Hicks, Jeffrey S. Foster:
Kitsune: efficient, general-purpose dynamic software updating for C. OOPSLA 2012: 249-264 - [c61]Stephen Magill, Michael Hicks, Suriya Subramanian, Kathryn S. McKinley:
Automating object transformations for dynamic software updating. OOPSLA 2012: 265-280 - [c60]Piotr Mardziel, Michael Hicks, Jonathan Katz, Mudhakar Srivatsa:
Knowledge-oriented secure multiparty computation. PLAS 2012: 2 - [c59]Christopher M. Hayden, Stephen Magill, Michael Hicks, Nate Foster, Jeffrey S. Foster:
Specifying and Verifying the Correctness of Dynamic Software Updates. VSTTE 2012: 278-293 - [e2]John Field, Michael Hicks:
Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2012, Philadelphia, Pennsylvania, USA, January 22-28, 2012. ACM 2012, ISBN 978-1-4503-1083-3 [contents] - 2011
- [j13]Polyvios Pratikakis, Jeffrey S. Foster, Michael Hicks:
LOCKSMITH: Practical static race detection for C. ACM Trans. Program. Lang. Syst. 33(1): 3:1-3:55 (2011) - [c58]Piotr Mardziel, Stephen Magill, Michael Hicks, Mudhakar Srivatsa:
Dynamic Enforcement of Knowledge-Based Security Policies. CSF 2011: 114-128 - [c57]Michael Hicks, Rida A. Bazzi, Carlo Zaniolo:
Foreword. ICDE Workshops 2011: 132-133 - [c56]Christopher M. Hayden, Edward K. Smith, Michael Hicks, Jeffrey S. Foster:
State transfer for clear and efficient runtime updates. ICDE Workshops 2011: 179-184 - [c55]Nikhil Swamy, Nataliya Guts, Daan Leijen, Michael Hicks:
Lightweight monadic programming in ML. ICFP 2011: 15-27 - [c54]Jong-hoon (David) An, Avik Chaudhuri, Jeffrey S. Foster, Michael Hicks:
Dynamic inference of static types for ruby. POPL 2011: 459-472 - [c53]Kin-Keung Ma, Yit Phang Khoo, Jeffrey S. Foster, Michael Hicks:
Directed Symbolic Execution. SAS 2011: 95-111 - 2010
- [j12]Michael W. Hicks, Jeffrey S. Foster:
SCORE: agile research group management. Commun. ACM 53(10): 30-31 (2010) - [j11]Jeffrey A. Meister, Jeffrey S. Foster, Michael Hicks:
Serializing C intermediate representations for efficient and portable parsing. Softw. Pract. Exp. 40(3): 225-238 (2010) - [c52]Jean-Phillipe Martin, Michael Hicks, Manuel Costa, Periklis Akritidis, Miguel Castro:
Dynamically checking ownership policies in concurrent c/c++ programs. POPL 2010: 457-470
2000 – 2009
- 2009
- [c51]Yit Phang Khoo, Michael Hicks, Jeffrey S. Foster, Vibha Sazawal:
Directing JavaScript with arrows. DLS 2009: 49-58 - [c50]Michael Furr, Jong-hoon (David) An, Jeffrey S. Foster, Michael Hicks:
The ruby intermediate language. DLS 2009: 89-98 - [c49]Michael Furr, Jong-hoon (David) An, Jeffrey S. Foster, Michael Hicks:
Tests to the left of me, types to the right: how not to get stuck in the middle of a ruby execution. STOP@ECOOP 2009: 14-16 - [c48]Christopher M. Hayden, Eric A. Hardisty, Michael W. Hicks, Jeffrey S. Foster:
Efficient Systematic Testing for Dynamically Updatable Software. HotSWUp 2009 - [c47]Nikhil Swamy, Michael W. Hicks, Gavin M. Bierman:
A theory of typed coercions and its applications. ICFP 2009: 329-340 - [c46]Suriya Subramanian, Michael W. Hicks, Kathryn S. McKinley:
Dynamic software updates: a VM-centric approach. PLDI 2009: 1-12 - [c45]Iulian Neamtiu, Michael W. Hicks:
Safe and timely updates to multi-threaded programs. PLDI 2009: 13-24 - [c44]Michael Furr, Jong-hoon (David) An, Jeffrey S. Foster, Michael W. Hicks:
Static type inference for Ruby. SAC 2009: 1859-1866 - [c43]Pavlos Papageorge, Justin McCann, Michael Hicks:
Passive aggressive measurement with MGRP. SIGCOMM 2009: 279-290 - [c42]Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks:
Cross-tier, label-based security enforcement for web applications. SIGMOD Conference 2009: 269-282 - 2008
- [j10]Peter Sewell, Gareth Paul Stoyle, Michael Hicks, Gavin M. Bierman, Keith Wansbrough:
Dynamic rebinding for marshalling and update, via redex-time and destruct-time reduction. J. Funct. Program. 18(4): 437-502 (2008) - [j9]Nikhil Swamy, Michael Hicks:
Verified enforcement of stateful information release policies. ACM SIGPLAN Notices 43(12): 21-31 (2008) - [j8]Saurabh Srivastava, Michael Hicks, Jeffrey S. Foster, Patrick Jenkins:
Modular Information Hiding and Type-Safe Linking for C. IEEE Trans. Software Eng. 34(3): 357-376 (2008) - [c41]Dave King, Boniface Hicks, Michael Hicks, Trent Jaeger:
Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. ICISS 2008: 56-70 - [c40]Yit Phang Khoo, Jeffrey S. Foster, Michael Hicks, Vibha Sazawal:
Path projection for user-centered static analysis tools. PASTE 2008: 57-63 - [c39]Nikhil Swamy, Michael Hicks:
Verified enforcement of stateful information release policies. PLAS 2008: 21-32 - [c38]Iulian Neamtiu, Michael Hicks, Jeffrey S. Foster, Polyvios Pratikakis:
Contextual effects for version-consistent dynamic software updatingalland safe concurrent programming. POPL 2008: 37-49 - [c37]Nikhil Swamy, Brian J. Corcoran, Michael Hicks:
Fable: A Language for Enforcing User-defined Security Policies. SP 2008: 369-383 - [c36]Polyvios Pratikakis, Jeffrey S. Foster, Michael Hicks, Iulian Neamtiu:
Formalizing Soundness of Contextual Effects. TPHOLs 2008: 262-277 - 2007
- [j7]Gareth Paul Stoyle, Michael W. Hicks, Gavin M. Bierman, Peter Sewell, Iulian Neamtiu:
Mutatis Mutandis: Safe and predictable dynamic software updating. ACM Trans. Program. Lang. Syst. 29(4): 22 (2007) - [c35]Nick L. Petroni Jr., Michael W. Hicks:
Automated detection of persistent kernel control-flow attacks. CCS 2007: 103-115 - [c34]Jeffrey S. Foster, Michael W. Hicks, William W. Pugh:
Improving software quality with static analysis. PASTE 2007: 83-84 - [c33]Saurabh Srivastava, Michael Hicks, Jeffrey S. Foster:
Modular information hiding and type-safe linking for C. TLDI 2007: 3-14 - [c32]Trevor Jim, Nikhil Swamy, Michael Hicks:
Defeating script injection attacks with browser-enforced embedded policies. WWW 2007: 601-610 - [e1]Michael W. Hicks:
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, June 14, 2007. ACM 2007, ISBN 978-1-59593-711-7 [contents] - 2006
- [j6]Nikhil Swamy, Michael W. Hicks, Greg Morrisett, Dan Grossman, Trevor Jim:
Safe manual memory management in Cyclone. Sci. Comput. Program. 62(2): 122-144 (2006) - [c31]Nikhil Swamy, Michael Hicks, Stephen Tse, Steve Zdancewic:
Managing Policy Updates in Security-Typed Languages. CSFW 2006: 202-216 - [c30]Boniface Hicks, Dave King, Patrick D. McDaniel, Michael Hicks:
Trusted declassification: : high-level policy for a security-typed language. PLAS 2006: 65-74 - [c29]Iulian Neamtiu, Michael W. Hicks, Gareth Paul Stoyle, Manuel Oriol:
Practical dynamic software updating for C. PLDI 2006: 72-83 - [c28]Polyvios Pratikakis, Jeffrey S. Foster, Michael W. Hicks:
LOCKSMITH: context-sensitive correlation analysis for race detection. PLDI 2006: 320-331 - [c27]Polyvios Pratikakis, Jeffrey S. Foster, Michael Hicks:
Existential Label Flow Inference Via CFL Reachability. SAS 2006: 88-106 - 2005
- [j5]James Rose, Nikhil Swamy, Michael Hicks:
Dynamic inference of polymorphic lock types. Sci. Comput. Program. 58(3): 366-383 (2005) - [j4]Iulian Neamtiu, Jeffrey S. Foster, Michael Hicks:
Understanding source code evolution using abstract syntax tree matching. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-5 (2005) - [j3]Michael W. Hicks, Scott Nettles:
Dynamic software updating. ACM Trans. Program. Lang. Syst. 27(6): 1049-1096 (2005) - [c26]Manuel Oriol, Michael W. Hicks:
Tagged Sets: A Secure and Transparent Coordination Medium. COORDINATION 2005: 252-267 - [c25]Iulian Neamtiu, Jeffrey S. Foster, Michael W. Hicks:
Understanding source code evolution using abstract syntax tree matching. MSR 2005 - [c24]Pavlos Papageorgiou, Michael Hicks:
Merging Network Measurement with Data Transport. PAM 2005: 368-371 - [c23]Gareth Paul Stoyle, Michael W. Hicks, Gavin M. Bierman, Peter Sewell, Iulian Neamtiu:
Mutatis mutandis: safe and predictable dynamic software updating. POPL 2005: 183-194 - 2004
- [c22]Michael W. Hicks, J. Gregory Morrisett, Dan Grossman, Trevor Jim:
Experience with safe manual memory-management in cyclone. ISMM 2004: 73-84 - [c21]Polyvios Pratikakis, Jaime Spacco, Michael W. Hicks:
Transparent proxies for java futures. OOPSLA 2004: 206-223 - 2003
- [j2]Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith:
A secure PLAN. IEEE Trans. Syst. Man Cybern. Part C 33(3): 413-426 (2003) - [c20]Gavin M. Bierman, Michael W. Hicks, Peter Sewell, Gareth Paul Stoyle, Keith Wansbrough:
Dynamic rebinding for marshalling and update, with destruct-time? ICFP 2003: 99-110 - 2002
- [c19]Michael W. Hicks, Jonathan T. Moore, David Wetherall, Scott Nettles:
Experiences with Capsule-Based Active Networking. DANCE 2002: 16-24 - [c18]Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith:
A Secure PLAN. DANCE 2002: 224-237 - [c17]Seong-Kyu Song, Stephen Shannon, Michael W. Hicks, Scott Nettles:
Evolution in Action: Using Active Networking to Evolve Network Support for Mobility. IWAN 2002: 146-161 - [c16]Dan Grossman, J. Gregory Morrisett, Trevor Jim, Michael W. Hicks, Yanling Wang, James Cheney:
Region-Based Memory Management in Cyclone. PLDI 2002: 282-293 - [c15]Trevor Jim, J. Gregory Morrisett, Dan Grossman, Michael W. Hicks, James Cheney, Yanling Wang:
Cyclone: A Safe Dialect of C. USENIX ATC, General Track 2002: 275-288 - 2001
- [c14]Jonathan T. Moore, Michael W. Hicks, Scott Nettles:
Practical Programmable Packets. INFOCOM 2001: 41-50 - [c13]Michael W. Hicks, Jonathan T. Moore, Scott Nettles:
Compiling PLAN to SNAP. IWAN 2001: 134-151 - [c12]Michael W. Hicks, Jonathan T. Moore, Scott Nettles:
Dynamic Software Updating. PLDI 2001: 13-23 - 2000
- [c11]Michael W. Hicks, Scott Nettles:
Active Networking Means Evolution (or Enhanced Extensibility Required). IWAN 2000: 16-32 - [c10]Kostas G. Anagnostakis, Michael W. Hicks, Sotiris Ioannidis, Angelos D. Keromytis, Jonathan M. Smith:
Scalable Resource Control in Active Networks. IWAN 2000: 343-357 - [c9]Michael W. Hicks, Stephanie Weirich, Karl Crary:
Safe and Flexible Dynamic Linking of Native Code. Types in Compilation 2000: 147-176
1990 – 1999
- 1999
- [c8]Michael W. Hicks, Jonathan T. Moore, D. Scott Alexander, Carl A. Gunter, Scott Nettles:
PLANet: An Active Internetwork. INFOCOM 1999: 1124-1133 - [c7]Michael W. Hicks, Angelos D. Keromytis:
A Secure Plan. IWAN 1999: 307-314 - [c6]Michael W. Hicks, Suresh Jagannathan, Richard Kelsey, Jonathan T. Moore, Cristian Ungureanu:
Transparent Communication for Distributed Objects in Java. Java Grande 1999: 160-170 - [c5]Pankaj Kakkar, Michael W. Hicks, Jonathan T. Moore, Carl A. Gunter:
Specifying the PLAN Network Programming Langauge. HOOTS 1999: 87-104 - 1998
- [j1]D. Scott Alexander, William Arbaugh, Michael Hicks, Pankaj Kakkar, Angelos Dennis Keromytis, Jonathan T. Moore, Carl A. Gunter, Scott Nettles, Jonathan M. Smith:
The SwitchWare active network architecture. IEEE Netw. 12(3): 29-36 (1998) - [c4]Michael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, Scott Nettles:
Network Programming Using PLAN. ICCL Workshop: Internet Programming Languages 1998: 127-143 - [c3]Michael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, Scott Nettles:
PLAN: A Packet Language for Active Networks. ICFP 1998: 86-93 - [c2]Michael W. Hicks, Luke Hornof, Jonathan T. Moore, Scott Nettles:
A Study of Large Object Spaces. ISMM 1998: 138-145 - 1997
- [c1]Michael W. Hicks, Jonathan T. Moore, Scott Nettles:
The Measured Cost of Copying Garbage Collection Mechanisms. ICFP 1997: 292-305
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint