default search action
BibTeX records: Peter Goodman
@inproceedings{DBLP:conf/sp/KellasCGY23, author = {Andreas D. Kellas and Alan Cao and Peter Goodman and Junfeng Yang}, title = {Divergent Representations: When Compiler Optimizations Enable Exploitation}, booktitle = {2023 {IEEE} Security and Privacy Workshops (SPW), San Francisco, CA, USA, May 25, 2023}, pages = {337--348}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SPW59333.2023.00035}, doi = {10.1109/SPW59333.2023.00035}, timestamp = {Thu, 21 Sep 2023 16:11:09 +0200}, biburl = {https://dblp.org/rec/conf/sp/KellasCGY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-06295, author = {Henrich Lauko and Luk{\'{a}}s Korencik and Peter Goodman}, title = {On the Optimization of Equivalent Concurrent Computations}, journal = {CoRR}, volume = {abs/2208.06295}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.06295}, doi = {10.48550/ARXIV.2208.06295}, eprinttype = {arXiv}, eprint = {2208.06295}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-06295.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GoodmanD18, author = {Peter Goodman and Artem Dinaburg}, title = {The Past, Present, and Future of Cyberdyne}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {2}, pages = {61--69}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1870859}, doi = {10.1109/MSP.2018.1870859}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GoodmanD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/GoodmanGG18, author = {Peter Goodman and Gustavo Grieco and Alex Groce}, title = {Tutorial: DeepState: Bringing Vulnerability Detection Tools into the Development Cycle}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {130--131}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00028}, doi = {10.1109/SECDEV.2018.00028}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/GoodmanGG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotdep/KumarGGB13, author = {Akshay Kumar and Peter Goodman and Ashvin Goel and Angela Demke Brown}, editor = {Christian Cachin and Robbert van Renesse}, title = {Behave or be watched: debugging with behavioral watchpoints}, booktitle = {Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, HotDep 2013, Farmington, Pennsylvania, USA, November 3, 2013}, pages = {11:1--11:6}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2524224.2524234}, doi = {10.1145/2524224.2524234}, timestamp = {Tue, 06 Nov 2018 16:58:01 +0100}, biburl = {https://dblp.org/rec/conf/hotdep/KumarGGB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.