Search results

  • 2013

    Quantified data automata on skinny trees: An abstract domain for lists

    Garg, P., Madhusudan, P. & Parlato, G., 2013, Static Analysis - 20th International Symposium, SAS 2013, Proceedings. p. 172-193 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7935 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Reachability under contextual locking

    Bonnet, R., Chadha, R., Madhusudan, P. & Viswanathan, M., Sep 17 2013, In: Logical Methods in Computer Science. 9, 3, 21.

    Research output: Contribution to journalArticlepeer-review

  • Verifying security invariants in expressoS

    Mai, H., Pek, E., Xue, H., King, S. T. & Madhusudan, P., Apr 2013, In: ACM SIGPLAN Notices. 48, 4, p. 293-303 11 p.

    Research output: Contribution to journalArticlepeer-review

  • Verifying security invariants in expressOS

    Edgar, H. M., Xue, P. H., King, S. T. & Madhusudan, P., 2013, ASPLOS 2013 - 18th International Conference on Architectural Support for Programming Languages and Operating Systems. p. 293-303 11 p. (International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2012

    Analyzing temporal role based access control models

    Uzun, E., Atluri, V., Sural, S., Vaidya, J., Parlato, G., Ferrara, A. L. & Madhusudan, P., 2012, SACMAT'12 - Proceedings of the 17th ACM Symposium on Access Control Models and Technologies. p. 177-186 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Automated reasoning and natural proofs for programs manipulating data structures

    Madhusudan, P., 2012, 32nd International Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2012. p. 34-35 2 p. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 18).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Computer Aided Verification: 24th International Conference, CAV 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings

    Madhusudan, P. (Editor) & Seshia, S. A. (Editor), 2012, Springer. 789 p. (Lecture Notes in Computer Science; no. 7358)

    Research output: Book/Report/Conference proceedingBook

  • Predicting null-pointer dereferences in concurrent programs

    Farzan, A., Madhusudan, P., Razavi, N. & Sorrentino, F., Dec 24 2012, Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, FSE 2012. (Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, FSE 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Reachability under contextual locking

    Chadha, R., Madhusudan, P. & Viswanathan, M., 2012, Tools and Algorithms for the Construction and Analysis of Systems - 18th Int. Conf., TACAS 2012, Held as Part of the European Joint Conf. on Theory and Practice of Software, ETAPS 2012, Proceedings. p. 437-450 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7214 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Recursive proofs for inductive tree data-structures

    Madhusudan, P., Qiu, X. & Stefanescu, A., Jan 2012, In: ACM SIGPLAN Notices. 47, 1, p. 123-135 13 p.

    Research output: Contribution to journalArticlepeer-review

  • Recursive proofs for inductive tree data-structures

    Madhusudan, P., Qiu, X. & Stefanescu, A., 2012, POPL'12 - Proceedings of the 39th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. p. 123-135 13 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security analysis of role-based access control through program verification

    Ferrara, A. L., Madhusudan, P. & Parlato, G., 2012, Proceedings - 2012 IEEE 25th Computer Security Foundations Symposium, CSF 2012. p. 113-125 13 p. 6266155. (Proceedings of the Computer Security Foundations Workshop).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Sequentializing parameterized programs

    Torre, S. L., Madhusudan, P. & Parlato, G., Jul 15 2012, In: Electronic Proceedings in Theoretical Computer Science, EPTCS. 87, p. 48-55 8 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
  • 2011

    Compositionality entails sequentializability

    Garg, P. & Madhusudan, P., 2011, Tools and Algorithms for the Construction and Analysis of Systems - 17th Int. Conf., TACAS 2011, Held as Part of the Joint European Conf. on Theory and Practice of Software, ETAPS 2011, Proceedings. p. 26-40 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6605 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Decidable logics combining heap structures and data

    Madhusudan, P., Parlato, G. & Qiu, X., Jan 2011, In: ACM SIGPLAN Notices. 46, 1, p. 611-622 12 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Efficient decision procedures for heaps using strand

    Madhusudan, P. & Qiu, X., 2011, Static Analysis - 18th International Symposium, SAS 2011, Proceedings. p. 43-59 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6887 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Software model checking using languages of nested trees

    Alur, R., Chaudhuri, S. & Madhusudan, P., Nov 2011, In: ACM Transactions on Programming Languages and Systems. 33, 5, 15.

    Research output: Contribution to journalArticlepeer-review

  • Synthesizing reactive programs

    Madhusudan, P., 2011, Computer Science Logic 2011 - 25th International Workshop/20th Annual Conference of the EACSL, CSL 2011. p. 428-442 15 p. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The tree width of auxiliary storage

    Madhusudan, P. & Parlato, G., Jan 2011, In: ACM SIGPLAN Notices. 46, 1, p. 283-294 12 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Thread contracts for safe parallelism

    Karmani, R. K., Madhusudan, P. & Moore, B. M., Aug 2011, In: ACM SIGPLAN Notices. 46, 8, p. 125-134 10 p.

    Research output: Contribution to journalArticlepeer-review

  • Thread contracts for safe parallelism

    Karmani, R. K., Madhusudan, P. & Moore, B. M., 2011, PPoPP'11 - Proceedings of the 2011 ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming. p. 125-134 10 p. (Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, PPOPP).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Vetting browser extensions for security vulnerabilities with Vex

    Bandhakavi, S., Tiku, N., Pittman, W., King, S. T., Madhusudan, P. & Winslett, M., Sep 2011, In: Communications of the ACM. 54, 9, p. 91-99 9 p.

    Research output: Contribution to journalArticlepeer-review

  • 2010

    CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks

    Bisht, P., Madhusudan, P. & Venkatakrishnan, V. N., Feb 1 2010, In: ACM Transactions on Information and System Security. 13, 2, 14.

    Research output: Contribution to journalArticlepeer-review

  • Decidable logics combining heap structures and data

    Madhusudan, P., Parlato, G. & Qiu, X., 2010, POPL'11 - Proceedings of the 38th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. p. 611-622 12 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Model-checking parameterized concurrent programs using linear interfaces

    La Torre, S., Madhusudan, P. & Parlato, G., 2010, Computer Aided Verification - 22nd International Conference, CAV 2010, Proceedings. p. 629-644 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6174 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • PENELOPE: Weaving threads to expose atomicity violations

    Sorrentino, F., Farzan, A. & Madhusudan, P., 2010, Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE-18. p. 37-46 10 p. (Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The language theory of bounded context-switching

    La Torre, S., Madhusudan, P. & Parlato, G., 2010, LATIN 2010: Theoretical Informatics - 9th Latin American Symposium, Proceedings. p. 96-107 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6034 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • The tree width of auxiliary storage

    Madhusudan, P. & Parlato, G., 2010, POPL'11 - Proceedings of the 38th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. p. 283-294 12 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • VEX: Vetting browser extensions for security vulnerabilities

    Bandhakavi, S., King, S. T., Madhusudan, P. & Winslett, M., 2010, Proceedings of the 19th USENIX Security Symposium. USENIX Association, p. 339-354 16 p. (Proceedings of the 19th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2009

    Adding nesting structure to words

    Alur, R. & Madhusudan, P., May 1 2009, In: Journal of the ACM. 56, 3, 16.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Analyzing recursive programs using a fixed-point calculus

    La Torre, S., Madhusudan, P. & Parlato, G., 2009, PLDI'09 - Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation. p. 211-222 12 p. (Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Analyzing recursive programs using a fixed-point calculus

    La Torre, S., Madhusudan, P. & Parlato, G., Jun 2009, In: ACM SIGPLAN Notices. 44, 6, p. 211-222 12 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Meta-analysis for atomicity violations under nested locking

    Farzan, A., Madhusudan, P. & Sorrentino, F., 2009, Computer Aided Verification - 21st International Conference, CAV 2009, Proceedings. p. 248-262 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5643 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Query automata for nested words

    Madhusudan, P. & Viswanathan, M., 2009, Mathematical Foundations of Computer Science 2009 - 34th International Symposium, MFCS 2009, Proceedings. p. 561-573 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5734 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Reducing context-bounded concurrent reachability to sequential reachability

    La Torre, S., Madhusudan, P. & Parlato, G., 2009, Computer Aided Verification - 21st International Conference, CAV 2009, Proceedings. p. 477-492 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5643 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The complexity of predicting atomicity violations

    Farzan, A. & Madhusudan, P., 2009, Tools and Algorithms for the Construction and Analysis of Systems - 15th International Conference, TACAS 2009 - Part of the Joint European Conf. on Theory and Practice of Software, ETAPS 2009, Proc.. p. 155-169 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5505 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2008

    A formal framework for reflective database access control policies

    Olson, L. E., Gunter, C. A. & Madhusudan, P., 2008, Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08. p. 289-298 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An infinite automaton characterization of double exponential time

    La Torre, S., Madhusudan, P. & Parlato, G., 2008, Computer Science Logic - 22nd International Workshop, CSL 2008 - 17th Annual Conference of the EACSL, Proceedings. p. 33-48 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5213 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Automatic symbolic compositional verification by learning assumptions

    Nam, W., Madhusudan, P. & Alur, R., Jun 2008, In: Formal Methods in System Design. 32, 3, p. 207-234 28 p.

    Research output: Contribution to journalArticlepeer-review

  • Context-bounded analysis of concurrent queue systems

    La Torre, S., Madhusudan, P. & Parlato, G., 2008, Tools and Algorithms for the Construction and Analysis of Systems - 14th Int. Conf., TACAS 2008 - Held as Part of the Joint European Conf. Theory and Practice of Software, ETAPS 2008 Proceedings. p. 299-314 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4963 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Monitoring atomicity in concurrent programs

    Farzan, A. & Madhusudan, P., 2008, Computer Aided Verification - 20th International Conference, CAV 2008, Proceedings. p. 52-65 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5123 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2007

    A robust class of context-sensitive languages

    La Torre, S., Madhusudan, P. & Parlato, G., 2007, Proceedings - 22nd Annual IEEE Symposiumon Logic in Computer Science, LICS 2007. p. 161-170 10 p. 4276561. (Proceedings - Symposium on Logic in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • CANDID: Preventing SQL injection attacks using dynamic candidate evaluations

    Bandhakavi, S., Bisht, P., Madhusudan, P. & Venkatakrishnan, V. N., 2007, CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. p. 12-24 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Causal dataflow analysis for concurrent programs

    Farzan, A. & Madhusudan, P., 2007, Tools and Algorithms for the Construction and Analysis of Systems - 13th International Conference, TACAS 2007. Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2007. Grumberg, O. & Huth, M. (eds.). Springer, p. 102-116 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4424 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Learning algorithms and formal verification

    Madhusudan, P., 2007, Verification, Model Checking, and Abstract Interpretation, - 8th International Conference, VMCAI 2007, Proceedings. p. 214 1 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4349 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Visibly pushdown automata for streaming XML

    Kumar, V., Madhusudan, P. & Viswanathan, M., 2007, 16th International World Wide Web Conference, WWW2007. p. 1053-1062 10 p. (16th International World Wide Web Conference, WWW2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2006

    Adding nesting structure to words

    Alur, R. & Madhusudan, P., 2006, Developments in Language Theory - 10th International Conference, DLT 2006, Proceedings. Springer, p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4036 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • A fixpoint calculus for local and global program flows

    Alur, R., Chaudhuri, S. & Madhusudan, P., 2006, Conference Record of POPL 2006: 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. Association for Computing Machinery, p. 153-165 13 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • A fixpoint calculus for local and global program flows

    Alur, R., Chaudhuri, S. & Madhusudan, P., 2006, In: ACM SIGPLAN Notices. 41, 1, p. 153-165 13 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Causal atomicity

    Farzan, A. & Madhusudan, P., 2006, Computer Aided Verification - 18th International Conference, CAV 2006, Proceedings. Springer, p. 315-328 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4144 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access