My primary research interests are design, analysis, optimization, testing, and verification of software, with focuses on computer security, concurrency, and incremental computation.
Security Policy Mining is one of my current research topics.
Foundations and Trends in Programming Languages
International Journal on Software Tools for Technology Transfer
16th International Conference on Runtime Verification (RV 2016)
11th International Conference on Information Systems Security (ICISS 2015)
29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2015)
Multicore Software Engineering, Performance, Applications, and Tools (MUSEPAT) track of the 30th ACM/SIGAPP Symposium on Applied Computing (SAC 2015)
20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015)
15th International Conference on Runtime Verification (RV 2015)
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
|Fall||2015||CSE 308 (Sections 1 and 2): Software Engineering|
|Spring||2015||CSE 308 (Section 1): Software Engineering|
|Fall||2014||CSE 535: Asynchronous Systems|
To understand recursion, one must first understand recursion.
In theory, there's no difference between theory and practice.
In practice, there is.
- Yogi Berra