My primary research interests are design, analysis, optimization, testing, and verification of software, with emphases on computer security and distributed systems.
I head the Reliable Systems Lab (New Computer Science 342).
Security Policy Mining is one of my current research topics.
Foundations and Trends in Programming Languages
Frontiers in Big Data (Associate Editor for Cybersecurity & Privacy)
International Journal on Software Tools for Technology Transfer
32nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2018)
18th International Conference on Runtime Verification (RV 2018)
23rd ACM Symposium on Access Control Models and Technologies (SACMAT 2018)
7th ACM Conference on Data and Application Security and Privacy (CODASPY 2018)
13th International Conference on Information Systems Security (ICISS 2017)
32nd IFIP TC-11 SEC 2017 International Information Security and Privacy Conference (IFIP SEC 2017)
17th International Conference on Runtime Verification (RV 2017)
31st Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2017)
22nd ACM Symposium on Access Control Models and Technologies (SACMAT 2017)
International SPIN Symposium on Model Checking of Software (SPIN 2017)
|Spring||2018||CSE 659: Computer Security Seminar|
|Fall||2017||CSE 535: Asynchronous Systems|
|Fall||2016||CSE 535: Asynchronous Systems|
|Spring||2016||CSE 659: Computer Security Seminar|
|Fall||2015||CSE 308 (Sections 1 and 2): Software Engineering|
|Fall||2015||CSE 659: Computer Security Seminar|
|Spring||2015||CSE 308 (Section 1): Software Engineering|
|Fall||2014||CSE 535: Asynchronous Systems|
To understand recursion, one must first understand recursion.
In theory, there's no difference between theory and practice.
In practice, there is.
- Yogi Berra