The end of Moore's Law has ushered in a diversity of hardware not seen i...
Cyber-physical systems, such as self-driving cars or autonomous aircraft...
Real-world applications routinely make authorization decisions based on
...
Satisfiability modulo theories (SMT) solving has become a critical part ...
Differential privacy is a de facto standard in data privacy with applica...
In this paper, we summarize work-in-progress on expert system support to...
Context: Database-backed applications often run queries with more author...
This technical report describes two of the domain specific languages use...
In this technical report, we present the core calculi for two of the dom...
Datalog has become a popular language for writing static analyses. Becau...
Symbolic execution is a classical program analysis technique, widely use...
We present Clio, an information flow control (IFC) system that transpare...