Filter
Conference contribution

Search results

  • 2018

    Calculation View: multiple-representation editing in spreadsheets

    Sarkar, A., Gordon, A. D., Jones, S. P. & Toronto, N., 25 Oct 2018, 2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). Lisbon, Portugal: Institute of Electrical and Electronics Engineers, p. 85-93 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2016

    Differentially Private Bayesian Programming

    Barthe, G., Farina, G. P., Gaboardi, M., Arias, E. J. G., Gordon, A., Hsu, J. & Strub, P-Y., 24 Oct 2016, 23rd ACM Conference on Computer and Communications Security CCS 2016. ACM, p. 68-79 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • A Lambda-Calculus Foundation for Universal Probabilistic Programming

    Borgstrom, J., Lago, U. D., Gordon, A. D. & Szymczak, M., 4 Sept 2016, Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming. Nara, Japan: ACM, p. 33-46 14 p. (ACM SIGPLAN Notices; vol. 51, no. 9).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • More Semantics More Robust: Improving Android Malware Classifiers

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 18 Jul 2016, 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Darmstadt, Germany: ACM, p. 147-158 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • On Robust Malware Classifiers by Verifying Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., Jun 2016, Integrated Formal Methods: 12th International Conference, IFM 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings. Springer, p. 326-341 15 p. (Lecture Notes in Computer Science; vol. 9681).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • A Text-Mining Approach to Explain Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 18 Apr 2016, EuroSec '16 Proceedings of the 9th European Workshop on System Security . ACM, 6 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Explaining Unwanted Behaviours in Context

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 6 Apr 2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). CEUR-WS.org, p. 38-45 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Fabular: regression formulas as probabilistic programming

    Borgström, J., Gordon, A. D., Ouyang, L., Russo, C. V., Scibior, A. & Szymczak, M., 11 Jan 2016, POPL 2016 Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. Bodik, R. & Majumdar, R. (eds.). ACM, p. 271-283 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Learning and Verifying Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 2016, 4th Workshop on Hot Issues in Security Principles and Trust (HotSpot 2016). p. 17-32 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2015

    Verifying Anti-Security Policies Learnt from Android Malware Families

    Chen, W., Sutton, C., Aspinall, D., Gordon, A., Shen, Q. & Muttik, I., 21 Oct 2015, Fourth International Seminar on Program Verification, Automated Debugging and Symbolic Computation. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Practical probabilistic programming with monads

    Scibior, A., Ghahramani, Z. & Gordon, A. D., 30 Aug 2015, Proceedings of the 8th ACM SIGPLAN Symposium on Haskell, Haskell 2015, Vancouver, BC, Canada, September 3-4, 2015. Lippmeier, B. (ed.). ACM, p. 165-176 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Compact Explanations of Why Malware is Bad

    Chen, W., Sutton, C., Gordon, A., Aspinall, D., Muttik, I. & Shen, Q., 10 Aug 2015, (Accepted/In press) AI4FM 2015. 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Bimodal Modelling of Source Code and Natural Language

    Allamanis, M., Tarlow, D., Gordon, A. D. & Wei, Y., 7 Jul 2015, Proceedings of the 32nd International Conference on Machine Learning. Bach, F. R. & Blei, D. M. (eds.). Lille, France: PMLR, p. 2123-2132 10 p. (Proceedings of Machine Learning Research; vol. 37).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Probabilistic Programs as Spreadsheet Queries

    Gordon, A. D., Russo, C. V., Szymczak, M., Borgström, J., Rolland, N., Graepel, T. & Tarlow, D., 2015, Programming Languages and Systems: 24th European Symposium on Programming, ESOP 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015. Proceedings. Springer, Vol. 9032. p. 1-25 25 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2014

    Tabular: A Schema-driven Probabilistic Programming Language

    Gordon, A. D., Graepel, T., Rolland, N., Russo, C., Borgstrom, J. & Guiver, J., 8 Jan 2014, Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. New York, NY, USA: ACM, p. 321-334 14 p. (ACM SIGPLAN Notices; vol. 49, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Probabilistic Programming

    Gordon, A. D., Henzinger, T. A., Nori, A. V. & Rajamani, S. K., 2014, Proceedings of the on Future of Software Engineering. New York, NY, USA: ACM, p. 167-181 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    File
  • 2013

    Constraint-based Autonomic Reconfiguration

    Hewson, J. A., Anderson, P. & Gordon, A. D., Sept 2013, Proceedings of 2013 Self-Adaptive and Self-Organizing systems conference (SASO). Institute of Electrical and Electronics Engineers, p. 101-110 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • A model-learner pattern for bayesian reasoning

    Gordon, A. D., Aizatulin, M., Borgstrom, J., Claret, G., Graepel, T., Nori, A. V., Rajamani, S. K. & Russo, C., 2013, Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. New York, NY, USA: ACM, p. 403-416 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Bayesian inference using data flow analysis

    Claret, G., Rajamani, S. K., Nori, A. V., Gordon, A. D. & Borgström, J., 2013, Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC/FSE'13, Saint Petersburg, Russian Federation, August 18-26, 2013. p. 92-102 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Deriving Probability Density Functions from Probabilistic Functional Programs

    Bhat, S., Borgström, J., Gordon, A. D. & Russo, C. V., 2013, Tools and Algorithms for the Construction and Analysis of Systems: 19th International Conference, TACAS 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Springer, Vol. 7795. p. 508-522 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2012

    A Declarative Approach to Automated Configuration

    Hewson, J. A., Anderson, P. & Gordon, A. D., 2012, Proceedings of the 2012 LISA Conference. USENIX Association

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Computational verification of C protocol implementations by symbolic execution

    Aizatulin, M., Gordon, A. D. & Jürjens, J., 2012, the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012. p. 712-723 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    Cryptographic Verification by Typing for a Sample Protocol Implementation

    Fournet, C., Bhargavan, K. & Gordon, A. D., 2011, Foundations of Security Analysis and Design VI: FOSAD Tutorial Lectures. Springer, Vol. 6858. p. 66-100 35 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Extracting and verifying cryptographic models from C protocol code by symbolic execution

    Aizatulin, M., Gordon, A. D. & Jürjens, J., 2011, Proceedings of the 18th ACM conference on Computer and communications security. New York, NY, USA: ACM, p. 331-340 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols

    Dupressoir, F., Gordon, A. D., Jürjens, J. & Naumann, D. A., 2011, Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011. Institute of Electrical and Electronics Engineers, p. 3-17 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Maintaining Database Integrity with Refinement Types

    Baltopoulos, I. G., Borgström, J. & Gordon, A. D., 2011, ECOOP 2011 - Object-Oriented Programming: 25th European Conference, Lancaster, UK, July 25-29, 2011 Proceedings. Springer, Vol. 6813. p. 484-509 26 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Measure Transformer Semantics for Bayesian Machine Learning

    Borgstrom, J., Gordon, A. D., Greenberg, M., Margetson, J. & Van Gael, J., 2011, Programming Languages and Systems: 20th European Symposium on Programming, ESOP 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26–April 3, 2011. Proceedings. Barthe, G. (ed.). Springer, p. 77-96 20 p. (Lecture Notes in Computer Science; vol. 6602).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Verifying Cryptographic Code in C: Some Experience and the Csec Challenge

    Aizatulin, M., Dupressoir, F., Gordon, A. D. & Jürjens, J., 2011, Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Springer, Vol. 7140. p. 1-20 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2010

    Modular verification of security protocol code by typing

    Bhargavan, K., Fournet, C. & Gordon, A. D., 2010, Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. New York, NY, USA: ACM, p. 445-456 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Semantic subtyping with an SMT solver

    Bierman, G. M., Gordon, A. D., Hritcu, C. & Langworthy, D. E., 2010, Proceeding of the 15th ACM SIGPLAN international conference on Functional programming, ICFP 2010, Baltimore, Maryland, USA, September 27-29, 2010. ACM, p. 105-116 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2009

    A compositional theory for STM Haskell

    Borgström, J., Bhargavan, K. & Gordon, A. D., 2009, Proceedings of the 2nd ACM SIGPLAN Symposium on Haskell, Haskell 2009, Edinburgh, Scotland, UK, 3 September 2009. ACM, p. 69-80 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure compilation of a multi-tier web language

    Baltopoulos, I. G. & Gordon, A. D., 2009, Proceedings of TLDI'09: 2009 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation, Savannah, GA, USA, January 24, 2009. p. 27-38 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards a Verified Reference Implementation of a Trusted Platform Module

    Mukhamedov, A., Gordon, A. D. & Ryan, M., 2009, Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers. Springer, Vol. 7028. p. 69-81 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2008

    Refinement Types for Secure Implementations

    Bengtson, J., Bhargavan, K., Fournet, C., Gordon, A. D. & Maffeis, S., Jun 2008, Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, 23-25 June 2008. Institute of Electrical and Electronics Engineers, p. 17-32 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Code-Carrying Authorization

    Maffeis, S., Abadi, M., Fournet, C. & Gordon, A. D., 2008, Computer Security - ESORICS 2008: 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings. Springer, Vol. 5283. p. 563-579 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Service Combinators for Farming Virtual Machines

    Bhargavan, K., Gordon, A. D. & Narasamdya, I., 2008, Coordination Models and Languages: 10th International Conference, COORDINATION 2008, Oslo, Norway, June 4-6, 2008. Proceedings. Springer, Vol. 5052. p. 33-49 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Verified implementations of the information card federated identity-management protocol

    Bhargavan, K., Fournet, C., Gordon, A. D. & Swamy, N., 2008, Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008. p. 123-135 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2007

    Design and Semantics of a Decentralized Authorization Language

    Becker, M. Y., Fournet, C. & Gordon, A. D., Jul 2007, 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy. Institute of Electrical and Electronics Engineers, p. 3-15 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A Type Discipline for Authorization in Distributed Systems

    Fournet, C., Gordon, A. & Maffeis, S., 2007, 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy. Institute of Electrical and Electronics Engineers, p. 31-48 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Service Combinators for Farming Virtual Machines

    Bhargavan, K., Gordon, A. D. & Narasamdya, I., 2007, Trustworthy Global Computing: Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers. Springer, Vol. 4912. p. 22 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2006

    Provable Implementations of Security Protocols

    Gordon, A. D., 2006, 21th IEEE Symposium on Logic in Computer Science (LICS 2006), 12-15 August 2006, Seattle, WA, USA, Proceedings. Institute of Electrical and Electronics Engineers, p. 345-346 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Verified Interoperable Implementations of Security Protocols

    Bhargavan, K., Fournet, C., Gordon, A. D. & Tse, S., 2006, 19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy. Institute of Electrical and Electronics Engineers, p. 139-152 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Verified Reference Implementations of WS-Security Protocols

    Bhargavan, K., Fournet, C. & Gordon, A. D., 2006, Web Services and Formal Methods: Third International Workshop, WS-FM 2006 Vienna, Austria, September 8-9, 2006, Proceedings. Springer, Vol. 4184. p. 88-106 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution