My primary research interests are design, analysis, optimization, testing, and verification of software, with emphases on computer security and distributed systems.
Security Policy Mining is one of my current research topics.
Foundations and Trends in Programming Languages
International Journal on Software Tools for Technology Transfer
13th International Conference on Information Systems Security (ICISS 2017)
7th ACM Conference on Data and Application Security and Privacy (CODASPY 2018)
32nd IFIP TC-11 SEC 2017 International Information Security and Privacy Conference (IFIP SEC 2017)
17th International Conference on Runtime Verification (RV 2017)
31st Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2017)
22nd ACM Symposium on Access Control Models and Technologies (SACMAT 2017)
International SPIN Symposium on Model Checking of Software (SPIN 2017)
2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016)
12th International Conference on Information Systems Security (ICISS 2016)
30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016)
16th International Conference on Runtime Verification (RV 2016)
|Fall||2017||CSE 535: Asynchronous Systems|
|Fall||2016||CSE 535: Asynchronous Systems|
|Spring||2016||CSE 659: Computer Security Seminar|
|Fall||2015||CSE 308 (Sections 1 and 2): Software Engineering|
|Fall||2015||CSE 659: Computer Security Seminar|
|Spring||2015||CSE 308 (Section 1): Software Engineering|
|Fall||2014||CSE 535: Asynchronous Systems|
To understand recursion, one must first understand recursion.
In theory, there's no difference between theory and practice.
In practice, there is.
- Yogi Berra