Multi-app security analysis with fuse: Statically detecting android app collusion T Ravitch, ER Creswick, A Tomb, A Foltzer, T Elliott, L Casburn Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-10, 2014 | 73 | 2014 |
Constructing semantic models of programs with the software analysis workbench R Dockins, A Foltzer, J Hendrix, B Huffman, D McNamee, A Tomb Verified Software. Theories, Tools, and Experiments: 8th International …, 2016 | 71 | 2016 |
5gen: A framework for prototyping applications using multilinear maps and matrix branching programs K Lewi, AJ Malozemoff, D Apon, B Carmer, A Foltzer, D Wagner, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 39 | 2016 |
A formal approach to constructing secure air vehicle software D Cofer, A Gacek, J Backes, MW Whalen, L Pike, A Foltzer, M Podhradsky, ... Computer 51 (11), 14-23, 2018 | 38 | 2018 |
SAW: the software analysis workbench K Carter, A Foltzer, J Hendrix, B Huffman, A Tomb Proceedings of the 2013 ACM SIGAda annual conference on High integrity …, 2013 | 27 | 2013 |
A meta-scheduler for the par-monad: composable scheduling for the heterogeneous cloud A Foltzer, A Kulkarni, R Swords, S Sasidharan, E Jiang, R Newton Proceedings of the 17th ACM SIGPLAN international conference on Functional …, 2012 | 22 | 2012 |
The future of voting: end-to-end verifiable internet voting-specification and feasibility study S Dzieduszycka-Suinat, J Murray, J Kiniry, D Zimmerman, D Wagner, ... US Vote Foundation, 30-38, 2015 | 19 | 2015 |
Secure mathematically-assured composition of control models D Cofer, J Backes, A Gacek, D DaCosta, M Whalen, I Kuz, G Klein, ... Air Force Research Laboratory Information Directorate, 2017 | 15 | 2017 |
A meta-scheduler for the Par-monad A Foltzer, A Kulkarni, R Swords, S Sasidharan, E Jiang, RR Newton ICFP, 2012 | 1 | 2012 |
US VOTE FOUNDATION J MURRAY, JR KINIRY, DM ZIMMERMAN, D WAGNER, P ROBINSON, ... | | |