• 286 Citations
  • 5 h-Index
20122019

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Kristopher Micinski is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 5 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 286 Citations
  • 5 h-Index
  • 6 Conference contribution
  • 1 Article

An observational investigation of reverse engineers' processes and mental models

Votipka, D., Rabin, S., Micinski, K., Foster, J. S. & Mazurek, M. L., May 2 2019, CHI EA 2019 - Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, 3313040. (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1 Scopus citations

    User comfort with android background resource accesses in different contexts

    Votipka, D., Rabin, S. M., Micinski, K., Gilray, T., Mazurek, M. M. & Foster, J. S., Jan 1 2019, Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018. USENIX Association, p. 235-250 16 p. (Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1 Scopus citations

    User interactions and permission use on android

    Micinski, K., Votipka, D., Stevens, R., Kofinas, N., Mazurek, M. L. & Foster, J. S., May 2 2017, CHI 2017 - Proceedings of the 2017 ACM SIGCHI Conference on Human Factors in Computing Systems: Explore, Innovate, Inspire. Association for Computing Machinery, p. 362-373 12 p. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2017-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 12 Scopus citations

    Checking interaction-based declassification policies for android using symbolic execution

    Micinski, K., Fetter-Degges, J., Jeon, J., Foster, J. S. & Clarkson, M. R., Jan 1 2015, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings. Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Springer Verlag, p. 520-538 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9327).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 6 Scopus citations

    Temporal logics for hyperproperties

    Clarkson, M. R., Finkbeiner, B., Koleini, M., Micinski, K. K., Rabe, M. N. & Sánchez, C., Jan 1 2014, Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Proceedings. Springer Verlag, p. 265-284 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8414 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 67 Scopus citations

    Press and Media

    PrivacyCon 2018 Examines Opportunities and Challenges in IoT

    Kristopher Micinski

    3/8/18

    1 item of Media coverage

    Press/Media: Expert Comment

    COOL CLASSES: "Computer Security: Attacks and Defenses"

    Kristopher Micinski

    2/24/18

    1 item of Media coverage

    Press/Media: Expert Comment