Publications

Formalizing Physical Security Properties

Catherine Meadows and D.Pavlovic Abstract Although the problems of physical security emerged more than 10,000 years before the problems of computer security, no formal methods have been developed for them, and the solutions have been evolving slowly, mostly through social procedures. But as the traffic on physical and social networks Read more…

By Subscriber, ago
Publications

Too Close for Comfort: a study of the effectiveness and acceptability of rich-media personalized advertising

Miguel Malheiros, Charlene Jennett, Snehalee Patel, Sacha Brostoff and Martina Angela Sasseā€ƒ Abstract Online display advertising is predicted to make $29.53 billion this year. Advertisers believe targeted and personalized ads to be more effective, but many users are concerned about their privacy. We conducted a study where 30 participants completed Read more…

By Subscriber, ago
Publications

Program Analysis Probably Counts

Alessandra Di Pierro, Chris Hankin and Herbert Wiklicky Abstract: Semantics-based program analysis uses an abstract semantics of programs/systems to statically determine run-time properties. Classic examples from compiler technology include analyses to support constant propagation and constant folding transformations and estimation of pointer values to prevent buffer overruns. More recent examples Read more…

By Subscriber, ago