The Taint Rabbit: Optimizing Generic Taint Analysis with Dynamic Fast Path Generation.John Galea and Daniel Kroening. ASIA CCS ’20: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, October 2020, 622–636. 2020
Modular Relaxed Dependencies in Weak Memory Concurrency.Marco Paviotti, Simon Cooksey, Anouk Paradis, Daniel Wright, Scott Owens, and Mark Batty. In: Müller, P. (eds) Programming Languages and Systems. ESOP 2020. Lecture Notes in Computer Science, vol 12075. 2020
Learning Weighted Automata over Principal Ideal Domains. FoSSaCS 2020. Lecture Notes in Computer Science, vol 12077.Gerco van Heerdt, Clemens Kupke, Jurriaan Rot, and Alexandra Silva. In: Goubault-Larrecq, J., König, B. (eds) Foundations of Software Science and Computation Structures. 2020
Static Race Detection and Mutex Safety and Liveness for Go Programs.Julia Gabet and Nobuko Yoshida. 34th European Conference on Object-Oriented Programming, ECOOP 2020. 2020
Featherweight go.Robert Griesemer, Raymond Hu, Wen Kokke, Julien Lange, Ian Lance Taylor, Bernardo Toninho, Philip Wadler, and Nobuko Yoshida. Proceedings of the ACM on Programming Languages, Volume 4, Issue OOPSLA, 2020, Article No.: 149, 1–29. 2020
Type checking beyond type checkers, via slice & run.Justus Adam and Stephen Kell. TAPAS 2020: Proceedings of the 11th ACM SIGPLAN International Workshop on Tools for Automatic Program Analysis, November 2020, 23–29. 2020
Statically verified refinements for multiparty protocols.Fangyi Zhou, Francisco Ferreira, Raymond Hu, Rumyana Neykova, and Nobuko Yoshida. Proceedings of the ACM on Programming Languages, Volume 4, Issue OOPSLA 2020, Article No.: 148, 1–30. 2020
Implementing Multiparty Session Types in Rust.Nicolas Lagaillardie, Rumyana Neykova, and Nobuko Yoshida. In: Bliudze, S., Bocchi, L. (eds) Coordination Models and Languages. COORDINATION 2020. Lecture Notes in Computer Science, vol 12134. 2020
Connecting software build with maintaining consistency between models: towards sound, optimal, and flexible building from megamodels.Perdita Stevens. Softw Syst Model 19, 935–958, 2020. 2020
Neural Networks, Secure by Construction.Wen Kokke, Ekaterina Komendantskaya, Daniel Kienitz, Robert Atkey, and David Aspinall. In: Oliveira, B.C.d.S. (eds) Programming Languages and Systems. APLAS 2020, vol 12470. 2020
Program Verification in the Presence of I/O.Hugo Férée, Johannes Å. Pohjola, Ramana Kumar, Scott Owens, Magnus O. Myreen, and Son Ho. In: Piskac, R., Rümmer, P. (eds) Verified Software. Theories, Tools, and Experiments. VSTTE 2018. Lecture Notes in Computer Science, vol 11294. 2018
Checking cryptographic API usage with composable annotations (short paper).Duncan Mitchell, L. Thomas van Binsbergen, Blake Loring, and Johannes Kinder. PEPM ’18: Proceedings of the ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, December 2017, 53–59. 2018