My primary research interests are design, analysis, optimization, testing, and verification of software, with focuses on computer security, concurrency, and incremental computation.
Security Policy Mining is one of my current research topics.
Foundations and Trends in Programming Languages, Member of Editorial Board
International Journal on Software Tools for Technology Transfer, Member of Editorial Board
29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2015)
Multicore Software Engineering, Performance, Applications, and Tools (MUSEPAT) track of the 30th ACM/SIGAPP Symposium on Applied Computing (SAC 2015)
20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015)
6th International Conference on Runtime Verification (RV 2015)
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
10th International Conference on Information Systems Security (ICISS 2014)
International Conference on Multicore Software Engineering, Performance, and Tools (MUSEPAT 2014)
International SPIN Symposium on Model Checking of Software (SPIN 2014)
19th ACM Symposium on Access Control Models and Technologies (SACMAT 2014)
5th International Conference on Runtime Verification (RV 2014)
|Spring||2015||CSE 308 (Section 1): Software Engineering|
|Fall||2014||CSE 535: Asynchronous Systems|
|Fall||2013||CSE 308 (Sections 1 and 2): Software Engineering|
|Fall||2012||CSE 594: Distributed Systems|
All software developed by my research group is available here or by request.
Mining ABAC Policies From Logs: an implementation of the policy mining algorithms described in our paper CoRR 1403.5715. Updated 4 April 2014.
Mining ABAC Policies: an implementation of the policy mining algorithms described in our paper CoRR 1306.2401. Updated 16 August 2014.
Mining Meaningful Roles: an implementation of the role mining algorithms described in our SACMAT 2012 paper. Updated 17 April 2012.
Abductive Analysis of Administrative Policies in Rule-Based Access Control: an implementation of the policy analysis algorithms described in our 2014 IEEE TDSC paper. Updated 14 January 2014.
Nachos-dfs: Nachos-3.4 plus Distributed File System Project. Version 2.1, released December 1999. It runs under Linux and Solaris.
To understand recursion, one must first understand recursion.
In theory, there's no difference between theory and practice.
In practice, there is.
- Yogi Berra