Jean Yang
Jean Yang
MIT
Verified email at cs.cmu.edu - Homepage
Title
Cited by
Cited by
Year
Secure distributed programming with value-dependent types
N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang
ACM SIGPLAN Notices 46 (9), 266-278, 2011
2462011
A language for automatically enforcing privacy policies
J Yang, K Yessenov, A Solar-Lezama
ACM SIGPLAN Notices 47 (1), 85-96, 2012
1642012
Safe to the last instruction: automated verification of a type-safe operating system
J Yang, C Hawblitzel
Proceedings of the 31st ACM SIGPLAN Conference on Programming Language …, 2010
1522010
Faceted execution of policy-agnostic programs
TH Austin, J Yang, C Flanagan, A Solar-Lezama
Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and …, 2013
642013
Precise, Dynamic Information Flow for Database-Backed Applications
J Yang, T Hance, TH Austin, A Solar-Lezama, C Flanagan, S Chong
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language …, 2016
632016
Secure distributed programming with value-dependent types
N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang
Journal of Functional Programming 23 (4), 402-451, 2013
522013
Automated verification of a type-safe operating system
C Hawblitzel, J Yang
US Patent 8,341,602, 2012
192012
Safe to the last instruction: automated verification of a type-safe operating system
J Yang, C Hawblitzel
Communications of the ACM 54 (12), 123-131, 2011
142011
Type-driven repair for information flow security
N Polikarpova, J Yang, S Itzhaky, A Solar-Lezama
CoRR abs/1607.03445, 2016
122016
Security programming with refinement types and mobile proofs
N Swamy, J Chen, C Fournet, K Bharagavan, J Yang
Microsoft Research, Tech. Rep. MSR-TR-2010–149, 2010
102010
End-to-end policy-agnostic security for database-backed applications
J Yang, T Hance, TH Austin, A Solar-Lezama, C Flanagan, S Chong
CoRR, abs/1507.03513, 2015
82015
Preventing information leaks with policy-agnostic programming
J Yang
Massachusetts Institute of Technology, 2015
82015
Enforcing information flow policies with type-targeted program synthesis
N Polikarpova, J Yang, S Itzhaky, A Solar-Lezama
eScholarship, University of California, 2017
72017
Liquid information flow control
N Polikarpova, D Stefan, J Yang, S Itzhaky, T Hance, A Solar-Lezama
Proceedings of the ACM on Programming Languages 4 (ICFP), 1-30, 2020
62020
Counterfactual Resimulation for Causal Analysis of Rule-Based Models.
J Laurent, J Yang, W Fontana
IJCAI, 1882-1890, 2018
62018
A trace query language for rule-based models
J Laurent, HF Medina-Abarca, P Boutillier, J Yang, W Fontana
International Conference on Computational Methods in Systems Biology, 220-237, 2018
32018
Specification-enhanced execution
J Yang
Massachusetts Institute of Technology, 2010
22010
Contextual and Granular Policy Enforcement in Database-backed Applications
A Bichhawat, M Fredrikson, J Yang, A Trehan
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
1*2020
STORM: Refinement Types for Secure Web Applications
N Lehmann, R Kunkel, J Brown, J Yang, N Vazou, N Polikarpova, ...
15th {USENIX} Symposium on Operating Systems Design and Implementation …, 2021
2021
How APIs Are Both the Illness and the Cure: The Software Heterogeneity Problem in Modern Web Applications
J Yang
Proceedings of the 15th Workshop on Programming Languages and Analysis for …, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20