Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS 22)
ANOSY: Approximated Knowledge Synthesis with Refinement Types for Declassification
Proceedings of the 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation (PLDI 2022)
Balboa: Bobbing and Weaving around Network Censorship
Proceedings of the 30th USENIX Security Symposium (USENIX 2021)
Verifying replicated data types with typeclass refinements in Liquid Haskell
Proceedings of the ACM on Programming Languages, Volume 4 (OOPSLA 2020)
Build it, break it, fix it: Contesting secure development
ACM Transactions on Privacy and Security (TOPS 2020)
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
Proceedings of the 29th USENIX Security Symposium (USENIX 2020)
LWeb: Information flow security for multi-tier web applications
Proceedings of the ACM on Programming Languages, Volume 3 (POPL 2019)
Build It, Break It, Fix It: Contesting Secure Development
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS 16)
Build It Break It: Measuring and Comparing Development Security
8th Workshop on Cyber Security Experimentation and Test (CSET 15)
LMonad: Information Flow Control for Haskell Web Applications
University of Maryland, Master's Thesis 2014
4D, N = 1 Supergravity Genomics
Journal of High Energy Physics 2013 (10), 1-52
4D, N = 1 Supersymmetry Genomics (II)
Journal of High Energy Physics 2012 (6), 1-34
An Extended Detailed Investigation of First and Second Order Supersymmetries for Off-Shell N = 2 and N = 4 Supermultiplets
Symmetry 7 (2), 1080-1121
4D, N = 1 Supersymmetry Genomics (I)
Journal of High Energy Physics 2009 (12), 008