1. A New Doctrine for Hardware Security Hastings, Adam K.; Sethumadhavan, Simha 2020 Reports ComputersComputer securityComputers--Economic aspects
2. Enhanced Instruction Set Randomization Design Space Exploration Tarek, Mohammed Ibn Zaid; Sethumadhavan, Simha 2019 Reports Computer scienceComputer securityHeterogeneous computing
3. Introduction to Security for Computer Architecture Students Sethumadhavan, Simha; Hastings, Adam K.; Tarek, Mohammed Ibn Zaid 2019 Reports Computer scienceComputer architectureComputer security
4. Analysis of Super Fine-Grained Program Phases Bui, Van; Kim, Martha Allen 2017 Reports Computer sciencePhase detectorsParallel programming (Computer science)
5. Searching for Meaning in RNNs using Deep Neural Inspection Lin, Kevin; Wu, Eugene 2017 Reports Neural networks (Computer science)Computer scienceNeurons
6. Further Information on Miller's 1882 One-Time Pad Bellovin, Steven Michael 2016 Reports CryptographersData encryption (Computer science)CryptographyComputer science
7. Grandet: A Unified, Economical Object Store for Web Applications Tang, Yang; Hu, Gang; Yuan, Xinhao; Weng, Lingmei; Yang, Junfeng 2016 Reports Computer scienceCloud computingComputers--Economic aspectsWeb applications
8. Identifying Functionally Similar Code in Complex Codebases Su, Fang-Hsiang; Bell, Jonathan; Kaiser, Gail E.; Sethumadhavan, Simha 2016 Reports Software engineeringComputer softwareComputer software--DevelopmentComputer programmingComputer science
9. Software Engineering Methodologies and Life Lennon, Scott 2016 Reports Open source softwareAgile software developmentSoftware engineeringComputer scienceLinux
10. Understanding and Detecting Concurrency Attacks Gu, Rui; Gan, Bo; Ning, Yi; Cui, Heming; Yang, Junfeng 2016 Reports Computer scienceCyberterrorismSoftware engineering
11. User Study: Programming Understanding from Similar Code Sivasankar, Anush Ramsurat Ganapathi Agraharam 2016 Reports Computer programmingProgramming languages (Electronic computers)Programming languages (Electronic computers)--SemanticsComputer science--Study and teachingComputer science
12. Why Are We Permanently Stuck in an Elevator? A Software Engineering Perspective on Game Bugs Zhang, Iris 2016 Reports Video games--DesignSoftware engineeringComputer programs--DefectsVideo gamesComputer science
13. A Measurement Study of ARM Virtualization Performance Dall, Christoffer; Li, Shih-Wei; Lim, Jin Tack; Nieh, Jason 2015 Reports Computer architectureComputersComputer science
14. Anti-Virus in Silicon Tang, Beng Chiew; Demme, John David; Sethumadhavan, Simha; Stolfo, Salvatore 2015 Reports Virus inhibitorsComputer securityMalware (Computer software)Computer softwareCoupled problems (Complex systems)Computer science
15. Code Relatives: Detecting Similar Software Behavior Su, Fang-Hsiang; Harvey, Kenneth; Sethumadhavan, Simha; Kaiser, Gail E.; Jebara, Tony 2015 Reports Programming languages (Electronic computers)Software engineeringComputer science
16. Dynamic Inference of Likely Metamorphic Properties to Support Differential Testing Su, Fang-Hsiang; Bell, Jonathan Schaffer; Murphy, Christian; Kaiser, Gail E. 2015 Reports Computer programs--TestingDebugging in computer scienceComputer science
17. Dynamic Taint Tracking for Java with Phosphor (Demo) Bell, Jonathan Schaffer; Kaiser, Gail E. 2015 Reports Computer scienceComputer software--TestingJava (Computer program language)
18. Hardware in Haskell: Implementing Memories in a Stream-Based World Townsend, Richard Morse; Kim, Martha Allen; Edwards, Stephen A. 2015 Reports ComputersMemory--Computer programsHaskell (Computer program language)Computer science
19. Hardware Synthesis from a Recursive Functional Language Zhai, Kuangya; Townsend, Richard Morse; Lairmore, Lianne Elizabeth; Kim, Martha Allen; Edwards, Stephen A. 2015 Reports Computer science
20. Improving System Reliability for Cyber-Physical Systems Wu, Leon Li 2015 Reports Cooperating objects (Computer systems)Reliability (Engineering)--EvaluationComputer science
21. Parikshan: Live Debugging of Production Systems in Isolation Arora, Nipun; Ivancic, Franjo; Kaiser, Gail E. 2015 Reports Service-oriented architecture (Computer science)Computer softwareDebugging in computer science--Computer programsComputer science
22. Setting budgets for live debugging Arora, Nipun; Sharma, Abhishek; Kaiser, Gail E. 2015 Reports Queuing theory--Computer programsBudgetDebugging in computer scienceComputer science
23. Use of Fast Multipole to Accelerate Discrete Circulation-Preserving Vortex Sheets for Soap Films and Foams Da, Fang; Batty, Christopher; Wotjan, Chris; Grinspun, Eitan 2015 Reports Computer science
24. A Convergence Study of Multimaterial Mesh-based Surface Tracking Da, Fang; Batty, Christopher; Grinspun, Eitan 2014 Reports Computer science
25. A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification Waksman, Adam; Rajendran, Jeyavijayan; Suozzo, Matthew Robert; Sethumadhavan, Simha 2014 Reports Computer science
26. Detecting, Isolating and Enforcing Dependencies Between and Within Test Cases Bell, Jonathan Schaffer 2014 Reports Computer science
27. DisCo: Displays that Communicate Jo, Kensei; Gupta, Mohit; Nayar, Shree K. 2014 Reports Computer science
28. Energy Exchanges: Internal Power Oversight for Applications Kambadur, Melanie Rae; Kim, Martha Allen 2014 Reports Computer science
29. Enhancing Security by Diversifying Instruction Sets Kemerlis, Vasileios; Sinha, Kanad; Pappas, Vasileios; Sethumadhavan, Simha; Keromytis, Angelos D. 2014 Reports Computer science
30. Failure Analysis of the New York City Power Grid Wu, Leon; Anderson, Roger N.; Boulanger, Albert G.; Rudin, Cynthia; Kaiser, Gail E. 2014 Reports Smart power gridsComputer science
31. Kamino: Dynamic Approach to Semantic Code Clone Detection Neubauer, Lindsay Anne 2014 Reports Computer science
32. Making Lock-free Data Structures Verifiable with Artificial Transactions Yuan, Xinhao; Williams-King, David Christopher; Yang, Junfeng; Sethumadhavan, Simha 2014 Reports Computer science
33. Metamorphic Runtime Checking of Applications Without Test Oracles Bell, Jonathan Schaffer; Murphy, Christian; Kaiser, Gail E. 2014 Reports Computer science
34. Model Aggregation for Distributed Content Anomaly Detection Whalen, Sean; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2014 Reports Computer science
35. Mysterious Checks from Mauborgne to Fabyan Bellovin, Steven Michael 2014 Reports Computer science
36. Phasor Imaging: A Generalization of Correlation-Based Time-of-Flight Imaging Gupta, Mohit; Nayar, Shree K.; Hullin, Matthias B.; Martin, Jaime 2014 Reports Computer science
37. Phosphor: Illuminating Dynamic Data Flow in the JVM Bell, Jonathan Schaffer; Kaiser, Gail E. 2014 Reports Computer science
38. Prosodic Entrainment in Mandarin and English: A Cross-Linguistic Comparison Xia, Zhihua; Levitan, Rivka; Hirschberg, Julia Bell 2014 Reports Computer scienceLinguistics
39. Repeatable Reverse Engineering for the Greater Good with PANDA Dolan-Gavitt, Brendan F.; Hodosh, Josh; Hulin, Patrick; Leek, Tim; Whelan, Ryan 2014 Reports Computer science
40. Schur Complement Trick for Positive Semi-definite Energies Jacobson, Alec S. 2014 Reports Computer science
41. Teaching Microarchitecture through Metaphors Eum, Julianna; Sethumadhavan, Simha 2014 Reports Computer science
44. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Reports Computer science
45. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence Bellovin, Steven Michael 2014 Reports Computer science
46. Additional Remarks on Designing Category-Level Attributes for Discriminative Visual Recognition Yu, Xinnan; Cao, Liangliang; Feris, Rogerio S.; Smith, John R.; Chang, Shih-Fu 2013 Reports Computer science
48. A Gameful Approach to Teaching Software Design and Software Testing - Assignments and Quests Sheth, Swapneel; Bell, Jonathan Schaffer; Kaiser, Gail E. 2013 Reports Computer science
49. Altocumulus: Harvesting Computational Resources from Devices at the Edge of the Cloud Jung, YoungHoon; Szczodrak, Marcin K.; Neill, Richard W.; Carloni, Luca 2013 Reports Computer science
50. Approximating the Bethe partition function Weller, Adrian; Jebara, Tony 2013 Reports Computer science