BibTeX records: Peter Goodman

download as .bib file

@inproceedings{DBLP:conf/sp/KellasCGY23,
  author       = {Andreas D. Kellas and
                  Alan Cao and
                  Peter Goodman and
                  Junfeng Yang},
  title        = {Divergent Representations: When Compiler Optimizations Enable Exploitation},
  booktitle    = {2023 {IEEE} Security and Privacy Workshops (SPW), San Francisco, CA,
                  USA, May 25, 2023},
  pages        = {337--348},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SPW59333.2023.00035},
  doi          = {10.1109/SPW59333.2023.00035},
  timestamp    = {Thu, 21 Sep 2023 16:11:09 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KellasCGY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-06295,
  author       = {Henrich Lauko and
                  Luk{\'{a}}s Korencik and
                  Peter Goodman},
  title        = {On the Optimization of Equivalent Concurrent Computations},
  journal      = {CoRR},
  volume       = {abs/2208.06295},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.06295},
  doi          = {10.48550/ARXIV.2208.06295},
  eprinttype    = {arXiv},
  eprint       = {2208.06295},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-06295.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GoodmanD18,
  author       = {Peter Goodman and
                  Artem Dinaburg},
  title        = {The Past, Present, and Future of Cyberdyne},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {61--69},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870859},
  doi          = {10.1109/MSP.2018.1870859},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GoodmanD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/GoodmanGG18,
  author       = {Peter Goodman and
                  Gustavo Grieco and
                  Alex Groce},
  title        = {Tutorial: DeepState: Bringing Vulnerability Detection Tools into the
                  Development Cycle},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {130--131},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00028},
  doi          = {10.1109/SECDEV.2018.00028},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/GoodmanGG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotdep/KumarGGB13,
  author       = {Akshay Kumar and
                  Peter Goodman and
                  Ashvin Goel and
                  Angela Demke Brown},
  editor       = {Christian Cachin and
                  Robbert van Renesse},
  title        = {Behave or be watched: debugging with behavioral watchpoints},
  booktitle    = {Proceedings of the 9th Workshop on Hot Topics in Dependable Systems,
                  HotDep 2013, Farmington, Pennsylvania, USA, November 3, 2013},
  pages        = {11:1--11:6},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2524224.2524234},
  doi          = {10.1145/2524224.2524234},
  timestamp    = {Tue, 06 Nov 2018 16:58:01 +0100},
  biburl       = {https://dblp.org/rec/conf/hotdep/KumarGGB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}