dblp.uni-trier.dewww.uni-trier.de

Michael W. Hicks Vis

Michael Hicks

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
56EENikhil Swamy, Michael W. Hicks, Gavin M. Bierman: A theory of typed coercions and its applications. ICFP 2009: 329-340
55EESuriya Subramanian, Michael W. Hicks, Kathryn S. McKinley: Dynamic software updates: a VM-centric approach. PLDI 2009: 1-12
54EEIulian Neamtiu, Michael W. Hicks: Safe and timely updates to multi-threaded programs. PLDI 2009: 13-24
53EEMichael Furr, Jong-hoon (David) An, Jeffrey S. Foster, Michael W. Hicks: Static type inference for Ruby. SAC 2009: 1859-1866
52EEBrian J. Corcoran, Nikhil Swamy, Michael W. Hicks: Cross-tier, label-based security enforcement for web applications. SIGMOD Conference 2009: 269-282
2008
51EEDave King, Boniface Hicks, Michael Hicks, Trent Jaeger: Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. ICISS 2008: 56-70
50EENikhil Swamy, Brian J. Corcoran, Michael Hicks: Fable: A Language for Enforcing User-defined Security Policies. IEEE Symposium on Security and Privacy 2008: 369-383
49EEYit Phang Khoo, Jeffrey S. Foster, Michael Hicks, Vibha Sazawal: Path projection for user-centered static analysis tools. PASTE 2008: 57-63
48EENikhil Swamy, Michael Hicks: Verified enforcement of stateful information release policies. PLAS 2008: 21-32
47EEIulian Neamtiu, Michael Hicks, Jeffrey S. Foster, Polyvios Pratikakis: Contextual effects for version-consistent dynamic software updatingalland safe concurrent programming. POPL 2008: 37-49
46EEPolyvios Pratikakis, Jeffrey S. Foster, Michael Hicks, Iulian Neamtiu: Formalizing Soundness of Contextual Effects. TPHOLs 2008: 262-277
45EESaurabh Srivastava, Michael Hicks, Jeffrey S. Foster, Patrick Jenkins: Modular Information Hiding and Type-Safe Linking for C. IEEE Trans. Software Eng. 34(3): 357-376 (2008)
44EEPeter Sewell, Gareth Stoyle, Michael Hicks, Gavin M. Bierman, Keith Wansbrough: Dynamic rebinding for marshalling and update, via redex-time and destruct-time reduction. J. Funct. Program. 18(4): 437-502 (2008)
43EENikhil Swamy, Michael Hicks: Verified enforcement of stateful information release policies. SIGPLAN Notices 43(12): 21-31 (2008)
2007
42 Michael W. Hicks: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, June 14, 2007 ACM 2007
41EENick L. Petroni Jr., Michael W. Hicks: Automated detection of persistent kernel control-flow attacks. ACM Conference on Computer and Communications Security 2007: 103-115
40EEJeffrey S. Foster, Michael W. Hicks, William Pugh: Improving software quality with static analysis. PASTE 2007: 83-84
39EESaurabh Srivastava, Michael Hicks, Jeffrey S. Foster: Modular information hiding and type-safe linking for C. TLDI 2007: 3-14
38EETrevor Jim, Nikhil Swamy, Michael Hicks: Defeating script injection attacks with browser-enforced embedded policies. WWW 2007: 601-610
37EEGareth Stoyle, Michael W. Hicks, Gavin M. Bierman, Peter Sewell, Iulian Neamtiu: Mutatis Mutandis: Safe and predictable dynamic software updating. ACM Trans. Program. Lang. Syst. 29(4): (2007)
2006
36EENikhil Swamy, Michael Hicks, Stephen Tse, Steve Zdancewic: Managing Policy Updates in Security-Typed Languages. CSFW 2006: 202-216
35EEBoniface Hicks, Dave King, Patrick McDaniel, Michael Hicks: Trusted declassification: : high-level policy for a security-typed language. PLAS 2006: 65-74
34EEPolyvios Pratikakis, Jeffrey S. Foster, Michael W. Hicks: LOCKSMITH: context-sensitive correlation analysis for race detection. PLDI 2006: 320-331
33EEIulian Neamtiu, Michael W. Hicks, Gareth Stoyle, Manuel Oriol: Practical dynamic software updating for C. PLDI 2006: 72-83
32EEPolyvios Pratikakis, Jeffrey S. Foster, Michael Hicks: Existential Label Flow Inference Via CFL Reachability. SAS 2006: 88-106
31EENikhil Swamy, Michael W. Hicks, Greg Morrisett, Dan Grossman, Trevor Jim: Safe manual memory management in Cyclone. Sci. Comput. Program. 62(2): 122-144 (2006)
2005
30EEManuel Oriol, Michael W. Hicks: Tagged Sets: A Secure and Transparent Coordination Medium. COORDINATION 2005: 252-267
29EEIulian Neamtiu, Jeffrey S. Foster, Michael W. Hicks: Understanding source code evolution using abstract syntax tree matching. MSR 2005
28EEPavlos Papageorgiou, Michael Hicks: Merging Network Measurement with Data Transport. PAM 2005: 368-371
27EEGareth Stoyle, Michael W. Hicks, Gavin M. Bierman, Peter Sewell, Iulian Neamtiu: Mutatis mutandis: safe and predictable dynamic software updating. POPL 2005: 183-194
26EEIulian Neamtiu, Jeffrey S. Foster, Michael Hicks: Understanding source code evolution using abstract syntax tree matching. ACM SIGSOFT Software Engineering Notes 30(4): 1-5 (2005)
25EEMichael W. Hicks, Scott Nettles: Dynamic software updating. ACM Trans. Program. Lang. Syst. 27(6): 1049-1096 (2005)
24EEJames Rose, Nikhil Swamy, Michael Hicks: Dynamic inference of polymorphic lock types. Sci. Comput. Program. 58(3): 366-383 (2005)
2004
23EEMichael W. Hicks, J. Gregory Morrisett, Dan Grossman, Trevor Jim: Experience with safe manual memory-management in cyclone. ISMM 2004: 73-84
22EEPolyvios Pratikakis, Jaime Spacco, Michael W. Hicks: Transparent proxies for java futures. OOPSLA 2004: 206-223
2003
21EEGavin M. Bierman, Michael W. Hicks, Peter Sewell, Gareth Stoyle, Keith Wansbrough: Dynamic rebinding for marshalling and update, with destruct-time? ICFP 2003: 99-110
20 Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith: A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C 33(3): 413-426 (2003)
2002
19EEMichael W. Hicks, Jonathan T. Moore, David Wetherall, Scott Nettles: Experiences with Capsule-Based Active Networking. DANCE 2002: 16-24
18EEMichael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith: A Secure PLAN. DANCE 2002: 224-237
17EESeong-Kyu Song, Stephen Shannon, Michael W. Hicks, Scott Nettles: Evolution in Action: Using Active Networking to Evolve Network Support for Mobility. IWAN 2002: 146-161
16EEDan Grossman, J. Gregory Morrisett, Trevor Jim, Michael W. Hicks, Yanling Wang, James Cheney: Region-Based Memory Management in Cyclone. PLDI 2002: 282-293
15EETrevor Jim, J. Gregory Morrisett, Dan Grossman, Michael W. Hicks, James Cheney, Yanling Wang: Cyclone: A Safe Dialect of C. USENIX Annual Technical Conference, General Track 2002: 275-288
2001
14EEJonathan T. Moore, Michael W. Hicks, Scott Nettles: Practical Programmable Packets. INFOCOM 2001: 41-50
13EEMichael W. Hicks, Jonathan T. Moore, Scott Nettles: Compiling PLAN to SNAP. IWAN 2001: 134-151
12 Michael W. Hicks, Jonathan T. Moore, Scott Nettles: Dynamic Software Updating. PLDI 2001: 13-23
2000
11EEMichael W. Hicks, Scott Nettles: Active Networking Means Evolution (or Enhanced Extensibility Required). IWAN 2000: 16-32
10EEKostas G. Anagnostakis, Michael W. Hicks, Sotiris Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Scalable Resource Control in Active Networks. IWAN 2000: 343-357
9EEMichael W. Hicks, Stephanie Weirich, Karl Crary: Safe and Flexible Dynamic Linking of Native Code. Types in Compilation 2000: 147-176
1999
8 Michael W. Hicks, Jonathan T. Moore, D. Scott Alexander, Carl A. Gunter, Scott Nettles: PLANet: An Active Internetwork. INFOCOM 1999: 1124-1133
7 Michael W. Hicks, Angelos D. Keromytis: A Secure Plan. IWAN 1999: 307-314
6EEMichael W. Hicks, Suresh Jagannathan, Richard Kelsey, Jonathan T. Moore, Cristian Ungureanu: Transparent Communication for Distributed Objects in Java. Java Grande 1999: 160-170
5EEPankaj Kakkar, Michael W. Hicks, Jonathan T. Moore, Carl A. Gunter: Specifying the PLAN Network Programming Langauge. Electr. Notes Theor. Comput. Sci. 26: (1999)
1998
4EEMichael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, Scott Nettles: Network Programming Using PLAN. ICCL Workshop: Internet Programming Languages 1998: 127-143
3EEMichael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, Scott Nettles: PLAN: A Packet Language for Active Networks. ICFP 1998: 86-93
2EEMichael W. Hicks, Luke Hornof, Jonathan T. Moore, Scott Nettles: A Study of Large Object Spaces. ISMM 1998: 138-145
1997
1 Michael W. Hicks, Jonathan T. Moore, Scott Nettles: The Measured Cost of Copying Garbage Collection Mechanisms. ICFP 1997: 292-305

Coauthor Index

1D. Scott Alexander [8]
2Jong-hoon (David) An [53]
3Kostas G. Anagnostakis [10]
4Gavin M. Bierman [21] [27] [37] [44] [56]
5James Cheney [15] [16]
6Brian J. Corcoran [50] [52]
7Karl Crary [9]
8Jeffrey S. Foster [26] [29] [32] [34] [39] [40] [45] [46] [47] [49] [53]
9Michael Furr [53]
10Dan Grossman [15] [16] [23] [31]
11Carl A. Gunter [3] [4] [5] [8]
12Boniface Hicks [35] [51]
13Luke Hornof [2]
14Sotiris Ioannidis [10]
15Trent Jaeger [51]
16Suresh Jagannathan [6]
17Patrick Jenkins [45]
18Trevor Jim [15] [16] [23] [31] [38]
19Pankaj Kakkar [3] [4] [5]
20Richard Kelsey [6]
21Angelos D. Keromytis [7] [10] [18] [20]
22Yit Phang Khoo [49]
23Dave King [35] [51]
24Patrick Drew McDaniel (Patrick McDaniel) [35]
25Kathryn S. McKinley [55]
26Jonathan T. Moore [1] [2] [3] [4] [5] [6] [8] [12] [13] [14] [19]
27J. Gregory Morrisett (Greg Morrisett) [15] [16] [23] [31]
28Iulian Neamtiu [26] [27] [29] [33] [37] [46] [47] [54]
29Scott Nettles [1] [2] [3] [4] [8] [11] [12] [13] [14] [17] [19] [25]
30Manuel Oriol [30] [33]
31Pavlos Papageorgiou [28]
32Nick L. Petroni Jr. [41]
33Polyvios Pratikakis [22] [32] [34] [46] [47]
34William Pugh [40]
35James Rose [24]
36Vibha Sazawal [49]
37Peter Sewell [21] [27] [37] [44]
38Stephen Shannon [17]
39Jonathan M. Smith [10] [18] [20]
40Seong-Kyu Song [17]
41Jaime Spacco [22]
42Saurabh Srivastava [39] [45]
43Gareth Stoyle [21] [27] [33] [37] [44]
44Suriya Subramanian [55]
45Nikhil Swamy [24] [31] [36] [38] [43] [48] [50] [52] [56]
46Stephen Tse [36]
47Cristian Ungureanu [6]
48Yanling Wang [15] [16]
49Keith Wansbrough [21] [44]
50Stephanie Weirich [9]
51David Wetherall [19]
52Steve Zdancewic [36]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)