Stephen Magill
Stephen Magill
Sonatype, Inc.
Verified email at
Cited by
Cited by
Automatic numeric abstractions for heap-manipulating programs
S Magill, MH Tsai, P Lee, YK Tsay
Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2010
An inductive synthesis framework for verifiable reinforcement learning
H Zhu, Z Xiong, S Magill, S Jagannathan
Proceedings of the 40th ACM SIGPLAN conference on programming language …, 2019
Arithmetic strengthening for shape analysis
S Magill, J Berdine, E Clarke, B Cook
Static Analysis: 14th International Symposium, SAS 2007, Kongens Lyngby …, 2007
A data-driven CHC solver
H Zhu, S Magill, S Jagannathan
ACM SIGPLAN Notices 53 (4), 707-721, 2018
Inferring invariants in separation logic for imperative list-processing programs
S Magill, A Nanevski, E Clarke, P Lee
SPACE 1 (1), 5-7, 2006
Specifying and verifying the correctness of dynamic software updates
CM Hayden, S Magill, M Hicks, N Foster, JS Foster
Verified Software: Theories, Tools, Experiments: 4th International …, 2012
Continuous formal verification of Amazon s2n
A Chudnov, N Collins, B Cook, J Dodds, B Huffman, C MacCárthaigh, ...
Computer Aided Verification: 30th International Conference, CAV 2018, Held …, 2018
THOR: A Tool for Reasoning about Shape and Arithmetic: Tool Paper
S Magill, MH Tsai, P Lee, YK Tsay
International Conference on Computer Aided Verification, 428-432, 2008
Dynamic enforcement of knowledge-based security policies
P Mardziel, S Magill, M Hicks, M Srivatsa
2011 IEEE 24th Computer Security Foundations Symposium, 114-128, 2011
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation
P Mardziel, S Magill, M Hicks, M Srivatsa
Journal of Computer Security 21 (4), 463-532, 2013
Finding heap-bounds for hardware synthesis
B Cook, A Gupta, S Magill, A Rybalchenko, J Simsa, S Singh, V Vafeiadis
2009 Formal Methods in Computer-Aided Design, 205-212, 2009
Automating object transformations for dynamic software updating
S Magill, M Hicks, S Subramanian, KS McKinley
ACM SIGPLAN Notices 47 (10), 265-280, 2012
The inverse method for the logic of bunched implications
K Donnelly, T Gibson, N Krishnaswami, S Magill, S Park
Logic for Programming, Artificial Intelligence, and Reasoning: 11th …, 2005
What’s the over/under? probabilistic bounds on information leakage
I Sweet, JMC Trilla, C Scherrer, M Hicks, S Magill
Principles of Security and Trust: 7th International Conference, POST 2018 …, 2018
Instrumentation analysis: an automated method for producing numeric abstractions of heap-manipulating programs
S Magill
Carnegie Mellon University, 2010
Making fast hardware with separation logic
B Cook, S Magill, M Raza, J Simsa, S Singh
Unpublished, http://cs. cmu. edu/~ smagill/papers/fast-hardware. pdf, 2010
Privacy technologies for controlled information sharing in coalition operations
K Myers, T Ellis, T Lepoint, RA Moore, D Archer, G Denker, S Lu, S Magill, ...
Proceedings of the Symposium on Knowledge System for Coalition Operations …, 2017
Tutorial: Continuous Verification of Critical Software
M Dodds, S Magill, A Tomb
2018 IEEE Cybersecurity Development (SecDev), 128-129, 2018
Salmonellosis as a differential diagnosis
S Magill, HC Koh, A Renwick, M Vella
Case Reports 2012, bcr2012007219, 2012
Specifying and verifying the correctness of dynamic software updates (extended version)
CM Hayden, S Magill, M Hicks, N Foster, JS Foster
Technical Report CS-TR-4997, Dept. of Computer Science, University of Maryland, 2011
The system can't perform the operation now. Try again later.
Articles 1–20