Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Refinement types: A tutorial
Refinement types enrich a language's type system with logical predicates that circumscribe
the set of values described by the type. These refinement predicates provide software …
the set of values described by the type. These refinement predicates provide software …
Statically verified refinements for multiparty protocols
With distributed computing becoming ubiquitous in the modern era, safe distributed
programming is an open challenge. To address this, multiparty session types (MPST) …
programming is an open challenge. To address this, multiparty session types (MPST) …
Propr: property-based automatic program repair
Automatic program repair (APR) regularly faces the challenge of overfitting patches---
patches that pass the test suite, but do not actually address the problems when evaluated …
patches that pass the test suite, but do not actually address the problems when evaluated …
{STORM}: Refinement types for secure web applications
We present Storm, a web framework that allows developers to build MVC applications with
compile-time enforcement of centrally specified data-dependent security policies. Storm …
compile-time enforcement of centrally specified data-dependent security policies. Storm …
Sugarcoat: Programmatically generating privacy-preserving, web-compatible resource replacements for content blocking
Content blocking systems today exempt thousands of privacy-harming scripts. They do this
because blocking these scripts breaks the Web sites that rely on them. In this paper, we …
because blocking these scripts breaks the Web sites that rely on them. In this paper, we …
Sesame: Practical End-to-End Privacy Compliance with Policy Containers and Privacy Regions
Web applications are governed by privacy policies, but developers lack practical
abstractions to ensure that their code actually abides by these policies. This leads to …
abstractions to ensure that their code actually abides by these policies. This leads to …
Semantics for noninterference with interaction trees
Noninterference is the strong information-security property that a program does not leak
secrets through publicly-visible behavior. In the presence of effects such as nontermination …
secrets through publicly-visible behavior. In the presence of effects such as nontermination …
Enforcing the GDPR
Violations of data protection laws such as the General Data Protection Regulation (GDPR)
are ubiquitous. Currently, building IT support to implement such laws is difficult and the …
are ubiquitous. Currently, building IT support to implement such laws is difficult and the …
RbSyn: type-and effect-guided program synthesis
In recent years, researchers have explored component-based synthesis, which aims to
automatically construct programs that operate by composing calls to existing APIs. However …
automatically construct programs that operate by composing calls to existing APIs. However …
Access control for database applications: Beyond policy enforcement
There have been many recent advances in enforcing finegrained access control for
database-backed applications. However, operators face significant challenges both before …
database-backed applications. However, operators face significant challenges both before …