Travelled to:
1 × Cyprus
3 × USA
Collaborated with:
T.Jaeger S.Jha S.A.Seshia V.Ganapathy S.Jha D.Muthukumaran D.Geist G.Biran T.Arons M.Slavkin Y.Nustov M.Farkas K.Holtz A.Long S.Barret
Talks about:
secur (2) methodolog (1) placement (1) concept (1) analysi (1) violat (1) system (1) sensit (1) mediat (1) legaci (1)
Person: Dave King
DBLP: King:Dave
Contributed to:
Wrote 4 papers:
- ESOP-2010-KingJMJJS #automation #security
- Automating Security Mediation Placement (DK, SJ, DM, TJ, SJ, SAS), pp. 327–344.
- FSE-2008-KingJJS #data flow #effectiveness
- Effective blame for information-flow violations (DK, TJ, SJ, SAS), pp. 250–260.
- ICSE-2007-GanapathyKJJ #concept analysis #legacy #mining #using
- Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis (VG, DK, TJ, SJ), pp. 458–467.
- DAC-1999-GeistBASNFHLKB #verification
- A Methodology for the Verification of a “System on Chip” (DG, GB, TA, MS, YN, MF, KH, AL, DK, SB), pp. 574–579.