Secure distributed programming with value-dependent types N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang ACM SIGPLAN Notices 46 (9), 266-278, 2011 | 284 | 2011 |
A language for automatically enforcing privacy policies J Yang, K Yessenov, A Solar-Lezama ACM SIGPLAN Notices 47 (1), 85-96, 2012 | 207 | 2012 |
Safe to the last instruction: automated verification of a type-safe operating system J Yang, C Hawblitzel Proceedings of the 31st ACM SIGPLAN Conference on Programming Language …, 2010 | 191 | 2010 |
Precise, Dynamic Information Flow for Database-Backed Applications J Yang, T Hance, TH Austin, A Solar-Lezama, C Flanagan, S Chong Proceedings of the 37th ACM SIGPLAN Conference on Programming Language …, 2016 | 91 | 2016 |
Faceted execution of policy-agnostic programs TH Austin, J Yang, C Flanagan, A Solar-Lezama Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and …, 2013 | 74 | 2013 |
Secure distributed programming with value-dependent types N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang Journal of Functional Programming 23 (4), 402-451, 2013 | 60 | 2013 |
Liquid information flow control N Polikarpova, D Stefan, J Yang, S Itzhaky, T Hance, A Solar-Lezama Proceedings of the ACM on Programming Languages 4 (ICFP), 1-30, 2020 | 30 | 2020 |
Counterfactual Resimulation for Causal Analysis of Rule-Based Models. J Laurent, J Yang, W Fontana IJCAI, 1882-1890, 2018 | 20 | 2018 |
Automated verification of a type-safe operating system C Hawblitzel, J Yang US Patent 8,341,602, 2012 | 20 | 2012 |
Safe to the last instruction: automated verification of a type-safe operating system J Yang, C Hawblitzel Communications of the ACM 54 (12), 123-131, 2011 | 20 | 2011 |
Type-directed program synthesis for restful apis Z Guo, D Cao, D Tjong, J Yang, C Schlesinger, N Polikarpova Proceedings of the 43rd ACM SIGPLAN International Conference on Programming …, 2022 | 19 | 2022 |
{STORM}: Refinement types for secure web applications N Lehmann, R Kunkel, J Brown, J Yang, N Vazou, N Polikarpova, ... 15th {USENIX} Symposium on Operating Systems Design and Implementation …, 2021 | 19 | 2021 |
Preventing information leaks with policy-agnostic programming J Yang Massachusetts Institute of Technology, 2015 | 14 | 2015 |
End-to-end policy-agnostic security for database-backed applications J Yang, T Hance, TH Austin, A Solar-Lezama, C Flanagan, S Chong CoRR, abs/1507.03513, 2015 | 13 | 2015 |
Type-driven repair for information flow security N Polikarpova, J Yang, S Itzhaky, A Solar-Lezama CoRR abs/1607.03445, 2016 | 12 | 2016 |
Security programming with refinement types and mobile proofs N Swamy, J Chen, C Fournet, K Bharagavan, J Yang Microsoft Research, Tech. Rep. MSR-TR-2010–149, 2010 | 10 | 2010 |
Enforcing information flow policies with type-targeted program synthesis N Polikarpova, J Yang, S Itzhaky, T Hance, A Solar-Lezama arXiv preprint arXiv:1607.03445, 2018 | 9 | 2018 |
Contextual and granular policy enforcement in database-backed applications A Bichhawat, M Fredrikson, J Yang, A Trehan Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 6* | 2020 |
A trace query language for rule-based models J Laurent, HF Medina-Abarca, P Boutillier, J Yang, W Fontana Computational Methods in Systems Biology: 16th International Conference …, 2018 | 3 | 2018 |
Specification-enhanced execution J Yang Massachusetts Institute of Technology, 2010 | 2 | 2010 |