Jean Yang
Jean Yang
MIT
Verified email at cs.cmu.edu - Homepage
Title
Cited by
Cited by
Year
Secure distributed programming with value-dependent types
N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang
ACM SIGPLAN Notices 46 (9), 266-278, 2011
2312011
A language for automatically enforcing privacy policies
J Yang, K Yessenov, A Solar-Lezama
ACM SIGPLAN Notices 47 (1), 85-96, 2012
1482012
Safe to the last instruction: automated verification of a type-safe operating system
J Yang, C Hawblitzel
Proceedings of the 31st ACM SIGPLAN Conference on Programming Language …, 2010
1432010
Precise, Dynamic Information Flow for Database-Backed Applications
J Yang, T Hance, TH Austin, A Solar-Lezama, C Flanagan, S Chong
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language …, 2016
572016
Faceted execution of policy-agnostic programs
TH Austin, J Yang, C Flanagan, A Solar-Lezama
Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and …, 2013
562013
Secure distributed programming with value-dependent types
N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang
472013
Automated verification of a type-safe operating system
C Hawblitzel, J Yang
US Patent 8,341,602, 2012
182012
Safe to the last instruction: automated verification of a type-safe operating system
J Yang, C Hawblitzel
Communications of the ACM 54 (12), 123-131, 2011
142011
Type-driven repair for information flow security
N Polikarpova, J Yang, S Itzhaky, A Solar-Lezama
CoRR abs/1607.03445, 2016
102016
Security programming with refinement types and mobile proofs
N Swamy, J Chen, C Fournet, K Bharagavan, J Yang
Microsoft Research, Tech. Rep. MSR-TR-2010–149, 2010
92010
End-to-end policy-agnostic security for database-backed applications
J Yang, T Hance, TH Austin, A Solar-Lezama, C Flanagan, S Chong
CoRR, abs/1507.03513, 2015
82015
Preventing information leaks with policy-agnostic programming
J Yang
Massachusetts Institute of Technology, 2015
62015
A trace query language for rule-based models
J Laurent, HF Medina-Abarca, P Boutillier, J Yang, W Fontana
International Conference on Computational Methods in Systems Biology, 220-237, 2018
32018
Counterfactual Resimulation for Causal Analysis of Rule-Based Models.
J Laurent, J Yang, W Fontana
IJCAI, 1882-1890, 2018
32018
Enforcing information flow policies with type-targeted program synthesis
N Polikarpova, J Yang, S Itzhaky, T Hance, A Solar-Lezama
arXiv preprint arXiv:1607.03445, 2016
32016
Liquid information flow control
N Polikarpova, D Stefan, J Yang, S Itzhaky, T Hance, A Solar-Lezama
Proceedings of the ACM on Programming Languages 4 (ICFP), 1-30, 2020
22020
Specification-enhanced execution
J Yang
Massachusetts Institute of Technology, 2010
22010
How APIs Are Both the Illness and the Cure: The Software Heterogeneity Problem in Modern Web Applications
J Yang
Proceedings of the 15th Workshop on Programming Languages and Analysis for …, 2020
2020
Contextual and Granular Policy Enforcement in Database-backed Applications
A Bichhawat, M Fredrikson, J Yang, A Trehan
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
2020
Estrela: Automated, Contextual Enforcement of Data Flow Policies across APIs
A Bichhawat, A Trehan, J Yang, M Fredrikson
arXiv preprint arXiv:1811.08234, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20