Howard E. Shrobe

Orcid: 0000-0003-0323-4606

Affiliations:
  • Massachusetts Institute of Technology, Computer Science and Artificial Intelligence Laboratory
  • Defense Advanced Research Projects Agency (DARPA)


According to our database1, Howard E. Shrobe authored at least 88 papers between 1978 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
TAG: Tagged Architecture Guide.
ACM Comput. Surv., 2023

2022
Preventing Kernel Hacks with HAKCs.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance.
CoRR, 2021

TORTIS: Retry-Free Software Transactional Memory for Real-Time Systems.
Proceedings of the 42nd IEEE Real-Time Systems Symposium, 2021

Towards Scalable Security of Real-time Applications: A Formally Certified Approach.
Proceedings of the 26th IEEE International Conference on Emerging Technologies and Factory Automation, 2021

Modeling human planning in a life-like search-and-rescue mission.
Proceedings of the 43rd Annual Meeting of the Cognitive Science Society, 2021

Keeping Safe Rust Safe with Galeed.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
One Giant Leap for Computer Security.
IEEE Secur. Priv., 2020

Runtime Protection of Real-time Critical Control Applications against Known Threats.
IEEE Des. Test, 2020

Assured Autonomy: Path Toward Living With Autonomous Systems We Can Trust.
CoRR, 2020

Rigorous Machine Learning for Secure and Autonomous Cyber Physical Systems.
Proceedings of the 25th IEEE International Conference on Emerging Technologies and Factory Automation, 2020

Moving Target Defense Considerations in Real-Time Safety- and Mission-Critical Systems.
Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020

2019
Deriving Cyber-security Requirements for Cyber Physical Systems.
CoRR, 2019

Security of Cyberphysical Systems: Chaining Induction and Deduction.
Computer, 2019

FirmFuzz: Automated IoT Firmware Introspection and Analysis.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

2018
ARMET: Behavior-Based Secure and Resilient Industrial Control Systems.
Proc. IEEE, 2018

IIoT Cybersecurity Risk Modeling for SCADA Systems.
IEEE Internet Things J., 2018

Designing Safe and Secure Industrial Control Systems: A Tutorial Review.
IEEE Des. Test, 2018

Reports of the Workshops of the 32nd AAAI Conference on Artificial Intelligence.
AI Mag., 2018

A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities.
IEEE Access, 2018

Highly Assured Safety and Security of e-Health Applications.
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

There's a Hole in the Bottom of the C: On the Effectiveness of Allocation Protection.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

RADMAX: Risk and Deadline Aware Planning for Maximum Utility.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2016
Behaviour-Based Security for Cyber-Physical Systems.
ERCIM News, 2016

Sound and Complete Runtime Security Monitor for Application Software.
CoRR, 2016

A rigorous and efficient run-time security monitor for real-time critical embedded system applications.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

2015
Missing the Point(er): On the Effectiveness of Code Pointer Integrity.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Abstract Data Machine: Data Classifier for Reliable Embedded Systems Software.
Proceedings of the 10th Workshop on Embedded Systems Security, 2015

Automated vulnerability analysis of AC state estimation under constrained false data injection in electric power systems.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Towards a Programmer's Apprentice (Again).
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
On the Formal Semantics of the Cognitive Middleware AWDRAT.
CoRR, 2014

On the Behavioural Formalization of the Cognitive Middleware AWDRAT.
CoRR, 2014

2012
Suppose We Got a Do-Over: A Revolution for Secure Computing.
IEEE Secur. Priv., 2012

What if we got a do-over?
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

2008
Generating Baseball Summaries from Multiple Perspectives by Reordering Content.
Proceedings of the INLG 2008, 2008

2007
AWDRAT: A Cognitive Middleware System for Information Survivability.
AI Mag., 2007

A Practical Activity Capture Framework for Personal, Lifetime User Modeling.
Proceedings of the User Modeling 2007, 11th International Conference, 2007

Self-Adaptive Systems for Information Survivability: PMOP and AWDRAT.
Proceedings of the First International Conference on Self-Adaptive and Self-Organizing Systems, 2007

Towards intelligent mapping applications: a study of elements found in cognitive maps.
Proceedings of the 12th International Conference on Intelligent User Interfaces, 2007

2006
Cognitive Adaptive Radio Teams.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

Simultaneous localization, calibration, and tracking in an ad hoc sensor network.
Proceedings of the Fifth International Conference on Information Processing in Sensor Networks, 2006

2005
A location representation for generating descriptive walking directions.
Proceedings of the 10th International Conference on Intelligent User Interfaces, 2005

2004
Experimental Results for and Theoretical Analysis of a Self-Organizing Global Coordinate System for Ad Hoc Sensor Networks.
Telecommun. Syst., 2004

One-Push Sharing: Facilitating Picture Sharing from Camera Phones.
Proceedings of the Mobile Human-Computer Interaction, 2004

A plan-based mission control center for autonomous vehicles.
Proceedings of the 9th International Conference on Intelligent User Interfaces, 2004

2003
Using Semantic Networks for Knowledge Representation in an Intelligent Environment.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network.
Proceedings of the Information Processing in Sensor Networks, 2003

Activity Zones for Context-Aware Computing.
Proceedings of the UbiComp 2003: Ubiquitous Computing, 2003

2002
Computational Vulnerability Analysis for Information Survivability.
AI Mag., 2002

2001
Model-Based Diagnosis for Information Survivability.
Proceedings of the Self-Adaptive Software, Second International Workshop, 2001

Results of the Second International Workshop on Self-adaptive Software.
Proceedings of the Self-Adaptive Software, Second International Workshop, 2001

Probabilistic Dispatch, Dynamic Domain Architecture, and Self-adaptive Software.
Proceedings of the Self-Adaptive Software, Second International Workshop, 2001

Introduction to Self-adaptive Software: Applications.
Proceedings of the Self-Adaptive Software, Second International Workshop, 2001

Design Principles for Resource Management Systems for Intelligent Spaces.
Proceedings of the Self-Adaptive Software, Second International Workshop, 2001

2000
What Does the Future Hold?
AI Mag., 2000

Qualitative rigid-body mechanics.
Artif. Intell., 2000

Active Trust Management for Autonomous Adaptive Survivable Systems.
Proceedings of the Self-Adaptive Software, First International Workshop, 2000

Introduction: The First International Workshop on Self-Adaptive Software.
Proceedings of the Self-Adaptive Software, First International Workshop, 2000

Results of the First International Workshop on Self Adaptive Software.
Proceedings of the Self-Adaptive Software, First International Workshop, 2000

1999
Software Technology of the Future.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

1998
Generating Multiple New Designs from a Sketch.
Artif. Intell., 1998

An architecture for constructing self-evolving software systems.
Proceedings of the Third International Workshop on Software Architecture, 1998

1996
Two Challenging Domains.
ACM Comput. Surv., 1996

The Innovative Applications of Artificial Intelligence Conference: Past and Future.
AI Mag., 1996

Diagnosing Delivery Problems in the White House Information-Distribution System.
AI Mag., 1996

1995
Evolutionary design of complex software (EDCS).
ACM SIGSOFT Softw. Eng. Notes, 1995

The Innovative Applications Conference Highlights and Changes.
AI Mag., 1995

1994
Knowledge-Based Systems in Japan (Report of the JTEC Panel).
Commun. ACM, 1994

Knowledge-Based Systems Research and Applications in Japan, 1992.
AI Mag., 1994

1993
The Japanese national Fifth Generation project: Introduction, survey, and evaluation.
Future Gener. Comput. Syst., 1993

What Is a Knowledge Representation?
AI Mag., 1993

Supporting and Optimizing Full Unification in a Forward Chaining Rule System.
Proceedings of the 11th National Conference on Artificial Intelligence. Washington, 1993

Understanding Linkages.
Proceedings of the 11th National Conference on Artificial Intelligence. Washington, 1993

1991
Providing Paradigm Orientation without Implementational Handcuffs.
SIGART Bull., 1991

OOP and AI (Panel).
Proceedings of the Sixth Annual Conference on Object-Oriented Programming Systems, 1991

1990
Guest Editor's Introduction: Object-Oriented Programming in AI.
IEEE Expert, 1990

1988
Towards a Virtual Parallel Inference Engine.
Proceedings of the 7th National Conference on Artificial Intelligence, 1988

1987
Joshua: Uniform Access to Heterogeneous Knowledge Structures, or why Joshing Is Better than Conniving or Planning.
Proceedings of the 6th National Conference on Artificial Intelligence. Seattle, 1987

1984
Interactive programming environments.
ACM SIGSOFT Softw. Eng. Notes, 1984

1983
Representing Structure and Behavior of Digital Hardware.
Computer, 1983

1982
The Data Path Generator.
Proceedings of the COMPCON'82, 1982

Panel Discussion.
Proceedings of the COMPCON'82, 1982

Diagnosis Based on Description of Structure and Function.
Proceedings of the National Conference on Artificial Intelligence, 1982

1981
Guest Editorial: Programming Environments.
IEEE Trans. Software Eng., 1981

1979
Dependency Directed Reasoning in the Analysis of Programs which Modify Complex Data Structures.
Proceedings of the Sixth International Joint Conference on Artificial Intelligence, 1979

Overview of the Programmer's Apprentice.
Proceedings of the Sixth International Joint Conference on Artificial Intelligence, 1979

1978
Initial Report on a Lisp Programmer's Apprentice.
IEEE Trans. Software Eng., 1978


  Loading...