| Verification of Hyperproperties |
|
| Trustworthy and Composable Software Systems with Contracts |
|
| Empirical Models for Vulnerabilities and Attacks |
|
| Human Behavior and Cyber Vulnerabilities |
|
| Does the Presence of Honest Users Affect Intruder Behavior? |
|
| User-Centered Design for Security |
|
| Understanding Developers' Reasoning about Privacy and Security |
|
| Trust, Recommendation Systems, and Collaboration |
|
| Reasoning about Protocols with Human Participants |
|
| Lablet Summaries UMD.pdf |
|