Multi-app security analysis with fuse: Statically detecting android app collusion T Ravitch, ER Creswick, A Tomb, A Foltzer, T Elliott, L Casburn Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-10, 2014 | 73 | 2014 |
Guilt free ivory T Elliott, L Pike, S Winwood, P Hickey, J Bielman, J Sharp, E Seidel, ... ACM SIGPLAN Notices 50 (12), 189-200, 2015 | 51 | 2015 |
Building embedded systems with embedded DSLs PC Hickey, L Pike, T Elliott, J Bielman, J Launchbury Proceedings of the 19th ACM SIGPLAN international conference on Functional …, 2014 | 44 | 2014 |
Network attack detection and prevention based on emulation of server response and virtual server cloning A Wick, T Elliott US Patent App. 13/648,868, 2014 | 31 | 2014 |
Trackos: A security-aware real-time operating system L Pike, P Hickey, T Elliott, E Mertens, A Tomb Runtime Verification: 16th International Conference, RV 2016, Madrid, Spain …, 2016 | 27 | 2016 |
Concurrent orchestration in Haskell J Launchbury, T Elliott Proceedings of the third ACM Haskell symposium on Haskell, 79-90, 2010 | 11 | 2010 |
Salty-a domain specific language for gr (1) specifications and designs T Elliott, M Alshiekh, LR Humphrey, L Pike, U Topcu 2019 International Conference on Robotics and Automation (ICRA), 4545-4551, 2019 | 10 | 2019 |
Programming languages for high-assurance autonomous vehicles L Pike, P Hickey, J Bielman, T Elliott, T DuBuisson, J Launchbury Proceedings of the ACM SIGPLAN 2014 Workshop on Programming Languages meets …, 2014 | 10 | 2014 |
In-band asymmetric protocol simulator AC Wick, CN Kawasaki, TS Elliott, N Collins, ER Creswick US Patent App. 15/613,001, 2017 | 5 | 2017 |
Secure historian access in SCADA systems D McNamee, T Elliott Galios, White Paper, 2011 | 3 | 2011 |
Building a High-Assurance Unpiloted Air Vehicle L Pike, P Hickey, J Bielman, T Elliott, E Hamberg, T Dubuisson MEM-OCODE13 Eleventh ACM-IEEE International Conference on Formal Methods and …, 2013 | 2 | 2013 |