


Остановите войну!
for scientists:


default search action
Michael Hicks 0001
Michael W. Hicks
Person information

- affiliation: University of Maryland, College Park, MD, USA
Other persons with the same name
- Michael Hicks 0002 — University of Hertfordshire, Hatfield, UK
- Michael Hicks 0003 — Curtin University of Techology, Perth, Australia
- Michael Hicks 0004 — Radboud University, Nijmegen, The Netherlands
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j36]Jie Zhou
, John Criswell
, Michael Hicks
:
Fat Pointers for Temporal Memory Safety of C. Proc. ACM Program. Lang. 7(OOPSLA1): 316-347 (2023) - [j35]Finn Voichick
, Liyi Li
, Robert Rand
, Michael Hicks
:
Qunity: A Unified Language for Quantum and Classical Computing. Proc. ACM Program. Lang. 7(POPL): 921-951 (2023) - [j34]Ian Sweet, David Darais, David Heath, William Harris, Ryan Estes, Michael Hicks:
Symphony: Expressive Secure Multiparty Computation with Coordination. Art Sci. Eng. Program. 7(3) (2023) - [j33]Zenong Zhang
, George Klees
, Eric Wang
, Michael Hicks
, Shiyi Wei
:
Fuzzing Configurations of Program Options. ACM Trans. Softw. Eng. Methodol. 32(2): 53:1-53:21 (2023) - [j32]Zenong Zhang
, George Klees
, Eric Wang
, Michael Hicks
, Shiyi Wei
:
Fuzzing Configurations of Program Options - RCR Report. ACM Trans. Softw. Eng. Methodol. 32(2): 55:1-55:3 (2023) - [i28]Ian Sweet, David Darais, David Heath, William Harris, Ryan Estes, Michael Hicks:
Symphony: Expressive Secure Multiparty Computation with Coordination. CoRR abs/2302.10076 (2023) - 2022
- [j31]Aravind Machiry
, John H. Kastner
, Matt McCutchen
, Aaron Eline
, Kyle Headley
, Michael Hicks
:
C to checked C by 3c. Proc. ACM Program. Lang. 6(OOPSLA1): 1-29 (2022) - [j30]Liyi Li
, Finn Voichick
, Kesha Hietala
, Yuxiang Peng
, Xiaodi Wu
, Michael Hicks
:
Verified compilation of Quantum oracles. Proc. ACM Program. Lang. 6(OOPSLA2): 589-615 (2022) - [c104]Kelsey R. Fulton, Daniel Votipka, Desiree Abrokwa, Michelle L. Mazurek, Michael Hicks, James Parker:
Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition. CCS 2022: 1141-1155 - [c103]Liyi Li, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn
, Michael Hicks:
A Formal Model of Checked C. CSF 2022: 49-63 - [c102]Michael Coblenz, Michelle L. Mazurek, Michael Hicks:
Garbage Collection Makes Rust Easier to Use: A Randomized Controlled Trial of the Bronze Garbage Collector. ICSE 2022: 1021-1032 - [c101]Zenong Zhang, Zach Patterson, Michael Hicks, Shiyi Wei:
FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing. USENIX Security Symposium 2022: 3699-3715 - [i27]Liyi Li, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn, Michael Hicks:
A Formal Model of Checked C. CoRR abs/2201.13394 (2022) - [i26]Aravind Machiry, John H. Kastner, Matt McCutchen, Aaron Eline, Kyle Headley, Michael Hicks:
C to Checked C by 3C. CoRR abs/2203.13445 (2022) - [i25]Yuxiang Peng, Kesha Hietala, Runzhou Tao, Liyi Li
, Robert Rand, Michael Hicks, Xiaodi Wu:
A Formally Certified End-to-End Implementation of Shor's Factorization Algorithm. CoRR abs/2204.07112 (2022) - [i24]Finn Voichick, Robert Rand
, Michael W. Hicks:
Qunity: A Unified Language for Quantum and Classical Computing. CoRR abs/2204.12384 (2022) - [i23]Jie Zhou, John Criswell, Michael Hicks:
Fat Pointers for Temporal Memory Safety of C. CoRR abs/2208.12900 (2022) - 2021
- [j29]Kesha Hietala
, Robert Rand
, Shih-Han Hung
, Xiaodi Wu, Michael Hicks
:
A verified optimizer for Quantum circuits. Proc. ACM Program. Lang. 5(POPL): 1-29 (2021) - [c100]Kesha Hietala, Robert Rand
, Shih-Han Hung, Liyi Li
, Michael Hicks:
Proving Quantum Programs Correct. ITP 2021: 21:1-21:19 - [c99]Jie Zhou, Michael Hicks, Yudi Yang, John Criswell:
Tutorial: Making C Programs Safer with Checked C. SecDev 2021: 13-14 - [c98]Souvik Bhattacherjee, Gang Liao, Michael Hicks, Daniel J. Abadi:
BullFrog: Online Schema Evolution via Lazy Evaluation. SIGMOD Conference 2021: 194-206 - [c97]Kelsey R. Fulton, Anna Chan, Daniel Votipka, Michael Hicks, Michelle L. Mazurek:
Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study. SOUPS @ USENIX Security Symposium 2021: 597-616 - [i22]Michael Coblenz, Michelle L. Mazurek, Michael Hicks:
Does the Bronze Garbage Collector Make Rust Easier to Use? A Controlled Experiment. CoRR abs/2110.01098 (2021) - [i21]Liyi Li, Finn Voichick, Kesha Hietala, Yuxiang Peng, Xiaodi Wu, Michael Hicks:
Verified Compilation of Quantum Oracles. CoRR abs/2112.06700 (2021) - 2020
- [j28]Benjamin C. Pierce, Michael Hicks, Cristina V. Lopes, Jens Palsberg:
Conferences in an era of expensive carbon. Commun. ACM 63(3): 35-37 (2020) - [j27]Yiyun Liu, James Parker, Patrick Redmond
, Lindsey Kuper
, Michael Hicks
, Niki Vazou
:
Verifying replicated data types with typeclass refinements in Liquid Haskell. Proc. ACM Program. Lang. 4(OOPSLA): 216:1-216:30 (2020) - [j26]David Darais, Ian Sweet, Chang Liu, Michael Hicks:
A language for probabilistically oblivious computation. Proc. ACM Program. Lang. 4(POPL): 50:1-50:31 (2020) - [j25]James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton:
Build It, Break It, Fix It: Contesting Secure Development. ACM Trans. Priv. Secur. 23(2): 10:1-10:36 (2020) - [j24]Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks:
Build It, Break It, Fix It Contests: Motivated Developers Still Make Security Mistakes. login Usenix Mag. 45(4) (2020) - [c96]Ian Sweet, David Darais, Michael Hicks:
Short Paper: Probabilistically Almost-Oblivious Computation. PLAS@CCS 2020: 9-12 - [c95]Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks:
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It. USENIX Security Symposium 2020: 109-126 - [i20]Kesha Hietala, Robert Rand, Shih-Han Hung, Liyi Li, Michael Hicks:
Proving Quantum Programs Correct. CoRR abs/2010.01240 (2020)
2010 – 2019
- 2019
- [j23]Leonidas Lampropoulos, Michael Hicks, Benjamin C. Pierce:
Coverage guided, property based testing. Proc. ACM Program. Lang. 3(OOPSLA): 181:1-181:29 (2019) - [j22]Shih-Han Hung, Kesha Hietala
, Shaopeng Zhu, Mingsheng Ying
, Michael Hicks, Xiaodi Wu:
Quantitative robustness analysis of quantum programs. Proc. ACM Program. Lang. 3(POPL): 31:1-31:29 (2019) - [j21]James Parker, Niki Vazou, Michael Hicks:
LWeb: information flow security for multi-tier web applications. Proc. ACM Program. Lang. 3(POPL): 75:1-75:30 (2019) - [c94]Luís Pina
, Anastasios Andronidis, Michael Hicks, Cristian Cadar
:
MVEDSUA: Higher Availability Dynamic Software Updates via Multi-Version Execution. ASPLOS 2019: 573-585 - [c93]Andrew Ruef, Leonidas Lampropoulos, Ian Sweet, David Tarditi, Michael Hicks:
Achieving Safety Incrementally with Checked C. POST 2019: 76-98 - [c92]Aseem Rastogi, Nikhil Swamy, Michael Hicks:
Wys*: A DSL for Verified Secure Multi-party Computations. POST 2019: 99-122 - [c91]Robert Rand
, Kesha Hietala
, Michael Hicks
:
Formal Verification vs. Quantum Uncertainty. SNAPL 2019: 12:1-12:11 - [i19]James Parker, Niki Vazou, Michael Hicks:
LWeb: Information Flow Security for Multi-tier Web Applications. CoRR abs/1901.07665 (2019) - [i18]ThanhVu Nguyen, Timos Antonopoulos, Andrew Ruef, Michael Hicks:
A Counterexample-guided Approach to Finding Numerical Invariants. CoRR abs/1903.12113 (2019) - [i17]Kesha Hietala, Robert Rand
, Shih-Han Hung, Xiaodi Wu, Michael Hicks:
Verified Optimization in a Quantum Intermediate Representation. CoRR abs/1904.06319 (2019) - [i16]James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton:
Build It, Break It, Fix It: Contesting Secure Development. CoRR abs/1907.01679 (2019) - [i15]Kesha Hietala, Robert Rand, Shih-Han Hung, Xiaodi Wu, Michael Hicks:
A Verified Optimizer for Quantum Circuits. CoRR abs/1912.02250 (2019) - 2018
- [c90]George Klees, Andrew Ruef, Benji Cooper, Shiyi Wei, Michael Hicks:
Evaluating Fuzz Testing. CCS 2018: 2123-2138 - [c89]Shiyi Wei, Piotr Mardziel, Andrew Ruef, Jeffrey S. Foster, Michael Hicks
:
Evaluating Design Tradeoffs in Numeric Static Analysis for Java. ESOP 2018: 653-682 - [c88]Ian Sweet, José Manuel Calderón Trilla, Chad Scherrer, Michael Hicks
, Stephen Magill:
What's the Over/Under? Probabilistic Bounds on Information Leakage. POST 2018: 3-27 - [c87]Archibald Samuel Elliott, Andrew Ruef, Michael Hicks, David Tarditi:
Checked C: Making C Safe by Extension. SecDev 2018: 53-60 - [i14]Ian Sweet, José Manuel Calderón Trilla, Chad Scherrer, Michael Hicks, Stephen Magill:
What's the Over/Under? Probabilistic Bounds on Information Leakage. CoRR abs/1802.08234 (2018) - [i13]Shiyi Wei, Piotr Mardziel, Andrew Ruef, Jeffrey S. Foster, Michael Hicks:
Evaluating Design Tradeoffs in Numeric Static Analysis for Java. CoRR abs/1802.08927 (2018) - [i12]George Klees, Andrew Ruef, Benji Cooper, Shiyi Wei, Michael Hicks:
Evaluating Fuzz Testing. CoRR abs/1808.09700 (2018) - [i11]Shih-Han Hung, Kesha Hietala, Shaopeng Zhu, Mingsheng Ying, Michael Hicks, Xiaodi Wu:
Quantitative Robustness Analysis of Quantum Programs (Extended Version). CoRR abs/1811.03585 (2018) - 2017
- [c86]Michael Hicks
:
Languages for Oblivious Computation. PLAS@CCS 2017: 1 - [c85]Timos Antonopoulos, Paul Gazzillo, Michael Hicks, Eric Koskinen, Tachio Terauchi
, Shiyi Wei:
Decomposition instead of self-composition for proving the absence of timing channels. PLDI 2017: 362-375 - [c84]Mário S. Alvim
, Piotr Mardziel, Michael W. Hicks
:
Quantifying Vulnerability of Secret Generation Using Hyper-Distributions. POST 2017: 26-48 - [c83]ThanhVu Nguyen, Timos Antonopoulos, Andrew Ruef, Michael Hicks:
Counterexample-guided approach to finding numerical invariants. ESEC/SIGSOFT FSE 2017: 605-615 - [i10]Mário S. Alvim, Piotr Mardziel, Michael W. Hicks:
Quantifying vulnerability of secret generation using hyper-distributions (extended version). CoRR abs/1701.04174 (2017) - [i9]Rock Stevens, Octavian Suciu, Andrew Ruef, Sanghyun Hong, Michael W. Hicks, Tudor Dumitras:
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning. CoRR abs/1701.04739 (2017) - [i8]Aseem Rastogi, Nikhil Swamy, Michael Hicks:
WYS*: A Verified Language Extension for Secure Multi-party Computations. CoRR abs/1711.06467 (2017) - [i7]David Darais, Chang Liu, Ian Sweet, Michael Hicks:
A Language for Probabilistically Oblivious Computation. CoRR abs/1711.09305 (2017) - 2016
- [j20]Robert K. Cunningham, Pamela Gupta, Ulf Lindqvist, Stelios Sidiroglou-Douskos, Michael Hicks:
IEEE SecDev 2016: Prioritizing Secure Development. IEEE Secur. Priv. 14(4): 82-84 (2016) - [j19]Karla Saur, Michael W. Hicks
, Jeffrey S. Foster:
C-strider: type-aware heap traversal for C. Softw. Pract. Exp. 46(6): 767-788 (2016) - [c82]Andrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel:
Build It, Break It, Fix It: Contesting Secure Development. CCS 2016: 690-703 - [c81]Karla Saur, Tudor Dumitras, Michael W. Hicks
:
Evolving NoSQL Databases without Downtime. ICSME 2016: 166-176 - [c80]Luís Pina
, Michael Hicks
:
Tedsuto: A General Framework for Testing Dynamic Software Updates. ICST 2016: 278-287 - [c79]Karla Saur, Joseph M. Collard, Nate Foster, Arjun Guha, Laurent Vanbever, Michael W. Hicks
:
Safe and Flexible Controller Upgrades for SDNs. SOSR 2016: 8 - [i6]Andrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel:
Build It, Break It, Fix It: Contesting Secure Development. CoRR abs/1606.01881 (2016) - 2015
- [c78]Chang Liu, Austin Harris, Martin Maas, Michael W. Hicks
, Mohit Tiwari, Elaine Shi:
GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation. ASPLOS 2015: 87-101 - [c77]Matthew A. Hammer, Jana Dunfield, Kyle Headley, Nicholas Labich, Jeffrey S. Foster, Michael W. Hicks
, David Van Horn
:
Incremental computation with names. OOPSLA 2015: 748-766 - [e3]Cédric Fournet, Michael W. Hicks, Luca Viganò:
IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7538-2 [contents] - [i5]Matthew A. Hammer, Jana Dunfield, Kyle Headley, Nicholas Labich, Jeffrey S. Foster, Michael Hicks, David Van Horn:
Incremental Computation with Names. CoRR abs/1503.07792 (2015) - [i4]Karla Saur, Tudor Dumitras, Michael W. Hicks:
Evolving NoSQL Databases Without Downtime. CoRR abs/1506.08800 (2015) - [i3]Karla Saur, Joseph M. Collard, Nate Foster, Arjun Guha, Laurent Vanbever, Michael W. Hicks:
Morpheus: Safe and Flexible Dynamic Updates for SDNs. CoRR abs/1509.03614 (2015) - [i2]Andrew Miller, Michael W. Hicks, Jonathan Katz, Elaine Shi:
How to Authenticate any Data Structure. Tiny Trans. Comput. Sci. 3 (2015) - 2014
- [j18]Christopher M. Hayden, Karla Saur, Edward K. Smith, Michael W. Hicks, Jeffrey S. Foster:
Kitsune: Efficient, General-Purpose Dynamic Software Updating for C. ACM Trans. Program. Lang. Syst. 36(4): 13:1-13:38 (2014) - [c76]Luís Pina
, Luís Veiga
, Michael W. Hicks
:
Rubah: DSU for Java on a stock JVM. OOPSLA 2014: 103-119 - [c75]Matthew A. Hammer, Yit Phang Khoo, Michael Hicks
, Jeffrey S. Foster:
Adapton: composable, demand-driven incremental computation. PLDI 2014: 156-166 - [c74]Andrew Miller, Michael Hicks
, Jonathan Katz, Elaine Shi:
Authenticated data structures, generically. POPL 2014: 411-424 - [c73]Piotr Mardziel, Mário S. Alvim
, Michael W. Hicks
, Michael R. Clarkson:
Quantifying Information Flow for Dynamic Secrets. IEEE Symposium on Security and Privacy 2014: 540-555 - [c72]Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, Michael W. Hicks
:
Automating Efficient RAM-Model Secure Computation. IEEE Symposium on Security and Privacy 2014: 623-638 - [c71]Aseem Rastogi, Matthew A. Hammer, Michael Hicks
:
Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations. IEEE Symposium on Security and Privacy 2014: 655-670 - [c70]Michael Hicks, Gavin M. Bierman, Nataliya Guts, Daan Leijen, Nikhil Swamy:
Polymonadic Programming. MSFP 2014: 79-99 - [i1]Gilles Barthe
, Michael Hicks, Florian Kerschbaum, Dominique Unruh:
The Synergy Between Programming Languages and Cryptography (Dagstuhl Seminar 14492). Dagstuhl Reports 4(12): 29-47 (2014) - 2013
- [j17]Piotr Mardziel, Stephen Magill, Michael Hicks, Mudhakar Srivatsa:
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation. J. Comput. Secur. 21(4): 463-532 (2013) - [j16]Derek Dreyer, John Field, Roberto Giacobazzi, Michael Hicks, Suresh Jagannathan, Mooly Sagiv, Peter Sewell
, Philip Wadler:
Principles of POPL. ACM SIGPLAN Notices 48(4S): 12-16 (2013) - [c69]Chang Liu, Michael Hicks
, Elaine Shi:
Memory Trace Oblivious Program Execution. CSF 2013: 51-65 - [c68]Luís Pina, Michael Hicks:
Rubah: Efficient, General-purpose Dynamic Software Updating for Java. HotSWUp 2013 - [c67]Yit Phang Khoo, Jeffrey S. Foster, Michael Hicks
:
Expositor: scriptable time-travel debugging with first-class traces. ICSE 2013: 352-361 - [c66]Aseem Rastogi, Piotr Mardziel, Michael Hicks
, Matthew A. Hammer:
Knowledge inference for optimizing secure multi-party computation. PLAS 2013: 3-14 - 2012
- [j15]Michael Hicks:
POPL'12 program chair's report: (or, how to run a medium-sized conference). ACM SIGPLAN Notices 47(4a): 19-27 (2012) - [j14]Christopher M. Hayden, Edward K. Smith, Eric A. Hardisty, Michael Hicks, Jeffrey S. Foster:
Evaluating Dynamic Software Update Safety Using Systematic Testing. IEEE Trans. Software Eng. 38(6): 1340-1354 (2012) - [c65]Mudhakar Srivatsa, Michael Hicks:
Deanonymizing mobility traces: using social network as a side-channel. CCS 2012: 628-637 - [c64]Christopher M. Hayden, Karla Saur, Michael Hicks
, Jeffrey S. Foster:
A study of dynamic software update quiescence for multithreaded programs. HotSWUp 2012: 6-10 - [c63]Edward K. Smith, Michael Hicks
, Jeffrey S. Foster:
Towards standardized benchmarks for Dynamic Software Updating systems. HotSWUp 2012: 11-15 - [c62]Christopher M. Hayden, Edward K. Smith, Michail Denchev, Michael Hicks
, Jeffrey S. Foster:
Kitsune: efficient, general-purpose dynamic software updating for C. OOPSLA 2012: 249-264 - [c61]Stephen Magill, Michael Hicks
, Suriya Subramanian, Kathryn S. McKinley:
Automating object transformations for dynamic software updating. OOPSLA 2012: 265-280 - [c60]Piotr Mardziel, Michael Hicks, Jonathan Katz, Mudhakar Srivatsa:
Knowledge-oriented secure multiparty computation. PLAS 2012: 2 - [c59]Christopher M. Hayden, Stephen Magill, Michael Hicks
, Nate Foster, Jeffrey S. Foster:
Specifying and Verifying the Correctness of Dynamic Software Updates. VSTTE 2012: 278-293 - [e2]John Field, Michael Hicks:
Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2012, Philadelphia, Pennsylvania, USA, January 22-28, 2012. ACM 2012, ISBN 978-1-4503-1083-3 [contents] - 2011
- [j13]Polyvios Pratikakis, Jeffrey S. Foster, Michael Hicks:
LOCKSMITH: Practical static race detection for C. ACM Trans. Program. Lang. Syst. 33(1): 3:1-3:55 (2011) - [c58]Piotr Mardziel, Stephen Magill, Michael Hicks
, Mudhakar Srivatsa:
Dynamic Enforcement of Knowledge-Based Security Policies. CSF 2011: 114-128 - [c57]Michael Hicks
, Rida A. Bazzi, Carlo Zaniolo:
Foreword. ICDE Workshops 2011: 132-133 - [c56]Christopher M. Hayden, Edward K. Smith, Michael Hicks
, Jeffrey S. Foster:
State transfer for clear and efficient runtime updates. ICDE Workshops 2011: 179-184 - [c55]Nikhil Swamy, Nataliya Guts, Daan Leijen, Michael Hicks
:
Lightweight monadic programming in ML. ICFP 2011: 15-27 - [c54]Jong-hoon (David) An, Avik Chaudhuri, Jeffrey S. Foster, Michael Hicks:
Dynamic inference of static types for ruby. POPL 2011: 459-472 - [c53]Kin-Keung Ma, Yit Phang Khoo, Jeffrey S. Foster, Michael Hicks
:
Directed Symbolic Execution. SAS 2011: 95-111 - 2010
- [j12]Michael W. Hicks, Jeffrey S. Foster:
SCORE: agile research group management. Commun. ACM 53(10): 30-31 (2010) - [j11]Jeffrey A. Meister, Jeffrey S. Foster, Michael Hicks:
Serializing C intermediate representations for efficient and portable parsing. Softw. Pract. Exp. 40(3): 225-238 (2010) - [c52]Jean-Phillipe Martin, Michael Hicks, Manuel Costa, Periklis Akritidis, Miguel Castro:
Dynamically checking ownership policies in concurrent c/c++ programs. POPL 2010: 457-470
2000 – 2009
- 2009
- [c51]Yit Phang Khoo, Michael Hicks
, Jeffrey S. Foster, Vibha Sazawal:
Directing JavaScript with arrows. DLS 2009: 49-58 - [c50]Michael Furr, Jong-hoon (David) An, Jeffrey S. Foster, Michael Hicks
:
The ruby intermediate language. DLS 2009: 89-98 - [c49]Michael Furr, Jong-hoon (David) An, Jeffrey S. Foster, Michael Hicks
:
Tests to the left of me, types to the right: how not to get stuck in the middle of a ruby execution. STOP@ECOOP 2009: 14-16 - [c48]Christopher M. Hayden, Eric A. Hardisty, Michael W. Hicks, Jeffrey S. Foster:
Efficient Systematic Testing for Dynamically Updatable Software. HotSWUp 2009 - [c47]Nikhil Swamy, Michael W. Hicks, Gavin M. Bierman:
A theory of typed coercions and its applications. ICFP 2009: 329-340 - [c46]Suriya Subramanian, Michael W. Hicks, Kathryn S. McKinley:
Dynamic software updates: a VM-centric approach. PLDI 2009: 1-12 - [c45]Iulian Neamtiu, Michael W. Hicks
:
Safe and timely updates to multi-threaded programs. PLDI 2009: 13-24 - [c44]Michael Furr, Jong-hoon (David) An, Jeffrey S. Foster, Michael W. Hicks
:
Static type inference for Ruby. SAC 2009: 1859-1866 - [c43]Pavlos Papageorge, Justin McCann, Michael Hicks
:
Passive aggressive measurement with MGRP. SIGCOMM 2009: 279-290 - [c42]Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
:
Cross-tier, label-based security enforcement for web applications. SIGMOD Conference 2009: 269-282 - 2008
- [j10]Peter Sewell
, Gareth Paul Stoyle, Michael Hicks, Gavin M. Bierman, Keith Wansbrough:
Dynamic rebinding for marshalling and update, via redex-time and destruct-time reduction. J. Funct. Program. 18(4): 437-502 (2008) - [j9]Nikhil Swamy, Michael Hicks:
Verified enforcement of stateful information release policies. ACM SIGPLAN Notices 43(12): 21-31 (2008) - [j8]Saurabh Srivastava, Michael Hicks, Jeffrey S. Foster, Patrick Jenkins:
Modular Information Hiding and Type-Safe Linking for C. IEEE Trans. Software Eng. 34(3): 357-376 (2008) - [c41]