Trevor Elliott
Trevor Elliott
Verified email at - Homepage
Cited by
Cited by
Multi-app security analysis with fuse: Statically detecting android app collusion
T Ravitch, ER Creswick, A Tomb, A Foltzer, T Elliott, L Casburn
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-10, 2014
Guilt free ivory
T Elliott, L Pike, S Winwood, P Hickey, J Bielman, J Sharp, E Seidel, ...
ACM SIGPLAN Notices 50 (12), 189-200, 2015
Building embedded systems with embedded DSLs
PC Hickey, L Pike, T Elliott, J Bielman, J Launchbury
Proceedings of the 19th ACM SIGPLAN international conference on Functional …, 2014
Network attack detection and prevention based on emulation of server response and virtual server cloning
A Wick, T Elliott
US Patent App. 13/648,868, 2014
Trackos: A security-aware real-time operating system
L Pike, P Hickey, T Elliott, E Mertens, A Tomb
Runtime Verification: 16th International Conference, RV 2016, Madrid, Spain …, 2016
Concurrent orchestration in Haskell
J Launchbury, T Elliott
Proceedings of the third ACM Haskell symposium on Haskell, 79-90, 2010
Salty-a domain specific language for gr (1) specifications and designs
T Elliott, M Alshiekh, LR Humphrey, L Pike, U Topcu
2019 International Conference on Robotics and Automation (ICRA), 4545-4551, 2019
Programming languages for high-assurance autonomous vehicles
L Pike, P Hickey, J Bielman, T Elliott, T DuBuisson, J Launchbury
Proceedings of the ACM SIGPLAN 2014 Workshop on Programming Languages meets …, 2014
In-band asymmetric protocol simulator
AC Wick, CN Kawasaki, TS Elliott, N Collins, ER Creswick
US Patent App. 15/613,001, 2017
Secure Historian Access in SCADA Systems
D McNamee, T Elliott
Galios, White Paper, 2011
Building a High-Assurance Unpiloted Air Vehicle
L Pike, P Hickey, J Bielman, T Elliott, E Hamberg, T Dubuisson
MEM-OCODE'13 Eleventh ACM-IEEE International Conference on Formal Methods …, 2013
The system can't perform the operation now. Try again later.
Articles 1–11