
Eunsuk Kang
Person information
- affiliation: University of California, Berkeley, Department of Electrical Engineering and Computer Sciences, CA, USA
- affiliation: Massachusetts Institute of Technology, Computer Science and Artificial Intelligence Laboratory, Cambridge, MA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c41]Nianyu Li, Mingyue Zhang, Eunsuk Kang, David Garlan:
Engineering Secure Self-Adaptive Systems with Bayesian Games. FASE 2021: 130-151 - [c40]Yutong Wu, Renzhi Tang, Eunsuk Kang, Zhihao Jiang:
Model-based clinical assist system for cardiac ablation. ICCPS 2021: 110-120 - 2020
- [j8]Rômulo Meira-Góes, Eunsuk Kang, Raymond H. Kwong, Stéphane Lafortune
:
Synthesis of sensor deception attacks at the supervisory layer of Cyber-Physical Systems. Autom. 121: 109172 (2020) - [j7]Hokeun Kim, Eunsuk Kang, David Broman, Edward A. Lee:
Resilient Authentication and Authorization for the Internet of Things (IoT) Using Edge Computing. ACM Trans. Internet Things 1(1): 4:1-4:27 (2020) - [j6]Muhammed O. Sayin
, Chung-Wei Lin
, Eunsuk Kang, Shinichi Shiraishi, Tamer Basar
:
Reliable Smart Road Signs. IEEE Trans. Intell. Transp. Syst. 21(12): 4995-5009 (2020) - [c39]Christian Kästner, Eunsuk Kang:
Teaching software engineering for AI-enabled systems. ICSE (SEET) 2020: 45-48 - [c38]Hamid Bagheri, Eunsuk Kang, Niloofar Mansoor:
Synthesis of assurance cases for software certification. ICSE (NIER) 2020: 61-64 - [c37]Nianyu Li, Sridhar Adepu, Eunsuk Kang, David Garlan:
Explanations for human-on-the-loop: a probabilistic model checking approach. SEAMS@ICSE 2020: 181-187 - [c36]Benjamin Gafford, Tobias Dürschmid, Gabriel A. Moreno, Eunsuk Kang:
Synthesis-Based Resolution of Feature Interactions in Cyber-Physical Systems. ASE 2020: 1090-1102 - [c35]Maryam Bagheri, Edward A. Lee, Eunsuk Kang, Marjan Sirjani, Ehsan Khamespanah, Ali Movaghar:
Lightweight Formal Method for Robust Routing in Track-based Traffic Control Systems. MEMOCODE 2020: 1-10 - [c34]Weichao Zhou, Ruihan Gao, BaekGyu Kim, Eunsuk Kang, Wenchao Li:
Runtime-Safety-Guided Policy Repair. RV 2020: 131-150 - [c33]Shih-Lun Wu, Ching-Yuan Bai, Kai-Chieh Chang, Yi-Ting Hsieh, Chao Huang
, Chung-Wei Lin
, Eunsuk Kang, Qi Zhu
:
Efficient System Verification with Multiple Weakly-Hard Constraints for Runtime Monitoring. RV 2020: 497-516 - [c32]Changjian Zhang, David Garlan, Eunsuk Kang:
A behavioral notion of robustness for software systems. ESEC/SIGSOFT FSE 2020: 1-12 - [i5]Christian Kästner, Eunsuk Kang:
Teaching Software Engineering for AI-Enabled Systems. CoRR abs/2001.06691 (2020) - [i4]Romulo Meira Goes, Eunsuk Kang, Raymond H. Kwong, Stéphane Lafortune:
Synthesis of Sensor Deception Attacks at the Supervisory Layer of Cyber-Physical Systems. CoRR abs/2008.01497 (2020) - [i3]Weichao Zhou, Ruihan Gao, BaekGyu Kim, Eunsuk Kang, Wenchao Li:
Runtime-Safety-Guided Policy Repair. CoRR abs/2008.07667 (2020)
2010 – 2019
- 2019
- [j5]Aleksandar Milicevic, Joseph P. Near, Eunsuk Kang, Daniel Jackson:
Alloy*: a general-purpose higher-order relational constraint solver. Formal Methods Syst. Des. 55(1): 1-32 (2019) - [c31]Eunsuk Kang, Stéphane Lafortune, Stavros Tripakis:
Automated Synthesis of Secure Platform Mappings. CAV (1) 2019: 219-237 - [c30]Chanwook Oh, Eunsuk Kang, Shinichi Shiraishi, Pierluigi Nuzzo:
Optimizing Assume-Guarantee Contracts for Cyber-Physical System Design. DATE 2019: 246-251 - [c29]Tobias Dürschmid
, Eunsuk Kang, David Garlan:
Trade-off-oriented development: making quality attribute trade-offs first-class. ICSE (NIER) 2019: 109-112 - [c28]Sridhar Adepu, Eunsuk Kang, Aditya P. Mathur:
Challenges in Secure Engineering of Critical Infrastructure Systems. ASE Workshops 2019: 61-64 - [c27]Huiye Liu, Chung-Wei Lin, Eunsuk Kang, Shinichi Shiraishi, Douglas M. Blough:
A Byzantine-Tolerant Distributed Consensus Algorithm for Connected Vehicles Using Proof-of-Eligibility. MSWiM 2019: 225-234 - [i2]Muhammed O. Sayin, Chung-Wei Lin, Eunsuk Kang, Shinichi Shiraishi, Tamer Basar:
A Game Theoretical Error-Correction Framework for Secure Traffic-Sign Classification. CoRR abs/1901.10622 (2019) - 2018
- [j4]Hamid Bagheri, Eunsuk Kang, Sam Malek, Daniel Jackson:
A formal approach for detection of security flaws in the android permission system. Formal Aspects Comput. 30(5): 525-544 (2018) - [j3]Jianye Hao
, Eunsuk Kang, Jun Sun, Zan Wang
, Zhaopeng Meng, Xiaohong Li
, Zhong Ming:
An Adaptive Markov Strategy for Defending Smart Grid False Data Injection From Malicious Attackers. IEEE Trans. Smart Grid 9(4): 2398-2408 (2018) - [c26]Kosuke Watanabe, Eunsuk Kang, Chung-Wei Lin, Shinichi Shiraishi:
Runtime monitoring for safety of intelligent vehicles. DAC 2018: 31:1-31:6 - [c25]Hengyi Liang, Matthew Jagielski, Bowen Zheng, Chung-Wei Lin, Eunsuk Kang, Shinichi Shiraishi, Cristina Nita-Rotaru, Qi Zhu:
Network and system level security in connected vehicle applications. ICCAD 2018: 94 - [c24]BaekGyu Kim, Chung-Wei Lin, Eunsuk Kang, Nobuyuki Tomatsu, Shinichi Shiraishi:
Platform-Independent QoS Parameters and Primitive APIs for Automotive Software. ITSC 2018: 98-104 - [c23]Íñigo Íncer Romeo, Alberto L. Sangiovanni-Vincentelli, Chung-Wei Lin, Eunsuk Kang:
Quotient for Assume-Guarantee Contracts. MEMOCODE 2018: 67-77 - [c22]Ximing Chen, Eunsuk Kang, Shinichi Shiraishi, Victor M. Preciado, Zhihao Jiang:
Digital Behavioral Twins for Safe Connected Cars. MoDELS 2018: 144-153 - [c21]Santhana Gopalan Raghavan, Kosuke Watanabe, Eunsuk Kang, Chung-Wei Lin, Zhihao Jiang, Shinichi Shiraishi:
Property-Driven Runtime Resolution of Feature Interactions. RV 2018: 316-333 - [c20]Thomas Chowdhury, Eric Lesiuta, Kerianne Rikley, Chung-Wei Lin, Eunsuk Kang, BaekGyu Kim, Shinichi Shiraishi, Mark Lawford, Alan Wassyng:
Safe and Secure Automotive Over-the-Air Updates. SAFECOMP 2018: 172-187 - 2017
- [j2]Tomás Bures, Danny Weyns, Bradley R. Schmerl, Eduardo Tovar, Eric Boden, Thomas Gabor, Ilias Gerostathopoulos, Pragya Gupta, Eunsuk Kang, Alessia Knauss, Pankesh Patel, Awais Rashid
, Ivan Ruchkin, Roykrong Sukkerd, Christos Tsigkanos:
Software Engineering for Smart Cyber-Physical Systems: Challenges and Promising Solutions. ACM SIGSOFT Softw. Eng. Notes 42(2): 19-24 (2017) - [c19]Romulo Meira Goes, Eunsuk Kang, Raymond H. Kwong, Stéphane Lafortune:
Stealthy deception attacks for cyber-physical systems. CDC 2017: 4224-4230 - [c18]Hokeun Kim, Eunsuk Kang, Edward A. Lee, David Broman:
A Toolkit for Construction of Authorization Service Infrastructure for the Internet of Things. IoTDI 2017: 147-158 - [c17]Hokeun Kim, Eunsuk Kang, David Broman, Edward A. Lee:
An Architectural Mechanism for Resilient IoT Services. SafeThings@SenSys 2017: 8-13 - [i1]Eunsuk Kang, Stéphane Lafortune, Stavros Tripakis:
Synthesis of Property-Preserving Mappings. CoRR abs/1705.03618 (2017) - 2016
- [b1]Eunsuk Kang:
Multi-representational security modeling and analysis. Massachusetts Institute of Technology, Cambridge, MA, USA, 2016 - [c16]Eunsuk Kang, Sridhar Adepu, Daniel Jackson, Aditya P. Mathur:
Model-based security analysis of a water treatment system. SEsCPS@ICSE 2016: 22-28 - [c15]Eunsuk Kang:
Design Space Exploration for Security. SecDev 2016: 30-36 - [c14]Jianye Hao, Eunsuk Kang, Jun Sun
, Daniel Jackson:
Designing minimal effective normative systems with the help of lightweight formal methods. SIGSOFT FSE 2016: 50-60 - [c13]Eunsuk Kang, Aleksandar Milicevic, Daniel Jackson:
Multi-representational security analysis. SIGSOFT FSE 2016: 181-192 - 2015
- [c12]Hamid Bagheri, Eunsuk Kang, Sam Malek, Daniel Jackson:
Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification. FM 2015: 73-89 - [c11]Aleksandar Milicevic, Joseph P. Near, Eunsuk Kang, Daniel Jackson:
Alloy*: A General-Purpose Higher-Order Relational Constraint Solver. ICSE (1) 2015: 609-619 - 2014
- [c10]Jianye Hao, Eunsuk Kang, Daniel Jackson, Jun Sun
:
Adaptive Defending Strategy for Smart Grid Attacks. SEGS@CCS 2014: 23-30 - 2011
- [c9]Joseph P. Near, Aleksandar Milicevic, Eunsuk Kang, Daniel Jackson:
A lightweight code analysis and its role in evaluation of a dependability case. ICSE 2011: 31-40 - 2010
- [c8]Daniel Jackson, Eunsuk Kang:
A Structure for Dependability Arguments. ASM 2010: 1 - [c7]Ethan K. Jackson, Eunsuk Kang, Markus Dahlweid, Dirk Seifert, Thomas Santen:
Components, platforms and possibilities: towards generic automation for MDA. EMSOFT 2010: 39-48 - [c6]Eunsuk Kang, Ethan K. Jackson, Wolfram Schulte:
An Approach for Effective Design Space Exploration. Monterey Workshop 2010: 33-54 - [c5]Eunsuk Kang, Daniel Jackson:
Patterns for building dependable systems with trusted bases. PLoP 2010: 19:1-19:14 - [c4]Eunsuk Kang, Daniel Jackson:
Dependability Arguments with Trusted Bases. RE 2010: 262-271 - [c3]Daniel Jackson, Eunsuk Kang:
Separation of concerns for dependable software design. FoSER 2010: 173-176
2000 – 2009
- 2009
- [j1]Eunsuk Kang, Daniel Jackson:
Designing and Analyzing a Flash File System with Alloy. Int. J. Softw. Informatics 3(2-3): 129-148 (2009) - 2008
- [c2]Eunsuk Kang, Daniel Jackson:
Formal Modeling and Analysis of a Flash Filesystem in Alloy. ABZ 2008: 294-308 - 2007
- [c1]Eunsuk Kang, Mark D. Aagaard:
Improving the Usability of HOL Through Controlled Automation Tactics. TPHOLs 2007: 157-172
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-04-13 22:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint