Martín Abadi

Affiliations:
  • University of California, Santa Cruz, USA


According to our database1, Martín Abadi authored at least 208 papers between 1985 and 2023.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Awards

ACM Fellow

ACM Fellow 2008, "For contributions to computer security and verification of computer systems.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Smart Choices and the Selection Monad.
Log. Methods Comput. Sci., 2023

2021
Falkirk Wheel: Rollback Recovery for Dataflow Systems.
Proceedings of the SoCC '21: ACM Symposium on Cloud Computing, 2021

2020
A simple differentiable programming language.
Proc. ACM Program. Lang., 2020

2018
The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication.
J. ACM, 2018

Dynamic control flow in large-scale machine learning.
Proceedings of the Thirteenth EuroSys Conference, 2018

2017
Adversarial Patch.
CoRR, 2017

On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches.
CoRR, 2017

A computational model for TensorFlow: an introduction.
Proceedings of the 1st ACM SIGPLAN International Workshop on Machine Learning and Programming Languages, 2017

Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data.
Proceedings of the 5th International Conference on Learning Representations, 2017

Learning a Natural Language Interface with Neural Programmer.
Proceedings of the 5th International Conference on Learning Representations, 2017

On the Protection of Private Information in Machine Learning Systems: Two Recent Approches.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
TensorFlow: A system for large-scale machine learning.
CoRR, 2016

TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems.
CoRR, 2016

Learning to Protect Communications with Adversarial Neural Cryptography.
CoRR, 2016

Incremental, iterative data processing with timely dataflow.
Commun. ACM, 2016


TensorFlow: learning functions at scale.
Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming, 2016

Deep Learning with Differential Privacy.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Message-Locked Encryption for Lock-Dependent Messages.
IACR Cryptol. ePrint Arch., 2015

Falkirk Wheel: Rollback Recovery for Dataflow Systems.
CoRR, 2015

On the Flow of Data, Information, and Time.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

Timely Rollback: Specification and Verification.
Proceedings of the NASA Formal Methods - 7th International Symposium, 2015

Foundations of Differential Dataflow.
Proceedings of the Foundations of Software Science and Computation Structures, 2015

Timely Dataflow: A Model.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2015

The Prophecy of Undo.
Proceedings of the Fundamental Approaches to Software Engineering, 2015

The Prophecy of Timely Rollback (Invited Talk).
Proceedings of the 24th EACSL Annual Conference on Computer Science Logic, 2015

Distributed Authorization with Distributed Grammars.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
Web PKI: Closing the Gap between Guidelines and Practices.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Understanding TypeScript.
Proceedings of the ECOOP 2014 - Object-Oriented Programming - 28th European Conference, Uppsala, Sweden, July 28, 2014

2013
Layout Randomization and Nondeterminism.
Proceedings of the Twenty-ninth Conference on the Mathematical Foundations of Programming Semantics, 2013

Naiad: a timely dataflow system.
Proceedings of the ACM SIGOPS 24th Symposium on Operating Systems Principles, 2013

On Layout Randomization for Arrays and Functions.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

Global Authentication in an Untrustworthy World.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

Formal Analysis of a Distributed Algorithm for Tracking Progress.
Proceedings of the Formal Techniques for Distributed Systems, 2013

Early security classification of skype users via machine learning.
Proceedings of the AISec'13, 2013

SocialWatch: detection of online service abuse via large-scale social graphs.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
On Protection by Layout Randomization.
ACM Trans. Inf. Syst. Secur., 2012

Host Fingerprinting and Tracking on the Web: Privacy and Security Implications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Software Security: A Formal Perspective - (Notes for a Talk).
Proceedings of the FM 2012: Formal Methods, 2012

Innocent by association: early recognition of legitimate users.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

A Functional View of Imperative Information Flow.
Proceedings of the Programming Languages and Systems - 10th Asian Symposium, 2012

2011
Semantics of transactional memory and automatic mutual exclusion.
ACM Trans. Program. Lang. Syst., 2011

Heat-seeking honeypots: design and experience.
Proceedings of the 20th International Conference on World Wide Web, 2011

deSEO: Combating Search-Result Poisoning.
Proceedings of the 20th USENIX Security Symposium, 2011

Differential privacy with information flow control.
Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, 2011

AC: composable asynchronous IO for native languages.
Proceedings of the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2011

2010
Guessing attacks and the computational soundness of static equivalence.
J. Comput. Secur., 2010

A model of dynamic separation for transactional memory.
Inf. Comput., 2010

A Model of Cooperative Threads
Log. Methods Comput. Sci., 2010

Searching the Searchers with SearchAudit.
Proceedings of the 19th USENIX Security Symposium, 2010

The Fine Print of Security.
Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science, 2010

How to tell an airport from a home: techniques and applications.
Proceedings of the 9th ACM Workshop on Hot Topics in Networks. HotNets 2010, Monterey, CA, USA - October 20, 2010

2009
Control-flow integrity principles, implementations, and applications.
ACM Trans. Inf. Syst. Secur., 2009

De-anonymizing the internet using unreliable IDs.
Proceedings of the ACM SIGCOMM 2009 Conference on Applications, 2009

Transactional memory with strong atomicity using off-the-shelf memory protection hardware.
Proceedings of the 14th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2009

Unified Declarative Platform for Secure Netwoked Information Systems.
Proceedings of the 25th International Conference on Data Engineering, 2009

Logic in Access Control (Tutorial Notes).
Proceedings of the Foundations of Security Analysis and Design V, 2009

Perspectives on Transactional Memory.
Proceedings of the CONCUR 2009 - Concurrency Theory, 20th International Conference, 2009

Implementation and Use of Transactional Memory with Dynamic Separation.
Proceedings of the Compiler Construction, 18th International Conference, 2009

Models and Proofs of Protocol Security: A Progress Report.
Proceedings of the Computer Aided Verification, 21st International Conference, 2009

2008
Automated verification of selected equivalences for security protocols.
J. Log. Algebraic Methods Program., 2008

Security analysis of cryptographically controlled access to XML documents.
J. ACM, 2008

A Modal Deconstruction of Access Control Logics.
Proceedings of the Foundations of Software Science and Computational Structures, 2008

Code-Carrying Authorization.
Proceedings of the Computer Security, 2008

Variations in Access Control Logic.
Proceedings of the Deontic Logic in Computer Science, 9th International Conference, 2008

The good, the bad, and the provable.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Automatic Mutual Exclusion and Atomicity Checks.
Proceedings of the Concurrency, 2008

2007
Editorial.
ACM Trans. Program. Lang. Syst., 2007

Just fast keying in the pi calculus.
ACM Trans. Inf. Syst. Secur., 2007

Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption).
J. Cryptol., 2007

Access Control in a Core Calculus of Dependency.
Proceedings of the Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin, 2007

Towards a Declarative Language and System for Secure Networking.
Proceedings of the Third International Workshop on Networking Meets Databases, 2007

Security Protocols: Principles and Calculi.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

Authorizing applications in singularity.
Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, 2007

Policies and Proofs for Code Auditing.
Proceedings of the Automated Technology for Verification and Analysis, 2007

2006
Types for safe locking: Static race detection for Java.
ACM Trans. Program. Lang. Syst., 2006

Deciding knowledge in security protocols under equational theories.
Theor. Comput. Sci., 2006

XFI: Software Guards for System Address Spaces.
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), 2006

Formal Analysis of Dynamic, Distributed File-System Access Controls.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2006

Secrecy by Typing and File-Access Control.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

Architectural support for software-based protection.
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006

Computational Secrecy by Typing for the Pi Calculus.
Proceedings of the Programming Languages and Systems, 4th Asian Symposium, 2006

2005
Moderately hard, memory-bound functions.
ACM Trans. Internet Techn., 2005

Computer-assisted verification of a protocol for certified email.
Sci. Comput. Program., 2005

"Language-Based Security".
J. Funct. Program., 2005

Analyzing security protocols with secrecy types and logic programs.
J. ACM, 2005

A Theory of Secure Control Flow.
Proceedings of the Formal Methods and Software Engineering, 2005

Password-Based Encryption Analyzed.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

Access Control in a World of Software Diversity.
Proceedings of HotOS'05: 10th Workshop on Hot Topics in Operating Systems, 2005

Deciding Knowledge in Security Protocols under (Many More) Equational Theories.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

Formal security analysis of basic network-attached storage.
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005

Control-flow integrity.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Private authentication.
Theor. Comput. Sci., 2004

Trusted Computing, Trusted Third Parties, and Verified Communications.
Proceedings of the Security and Protection in Information Processing Systems, 2004

Language-Based Enforcement of Privacy Policies.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

BCiC: A System for Code Authentication and Verification.
Proceedings of the Logic for Programming, 2004

Choice in Dynamic Linking.
Proceedings of the Foundations of Software Science and Computation Structures, 2004

A Logical Account of NGSCB.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2004

By Reason and Authority: A System for Authorization of Proof-Carrying Code.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

2003
Secrecy types for asymmetric communication.
Theor. Comput. Sci., 2003

Reasoning About Secrecy for Active Networks.
J. Comput. Secur., 2003

Access Control Based on Execution History.
Proceedings of the Network and Distributed System Security Symposium, 2003

Moderately Hard, Memory-Bound Functions.
Proceedings of the Network and Distributed System Security Symposium, 2003

Logic in Access Control.
Proceedings of the 18th IEEE Symposium on Logic in Computer Science (LICS 2003), 2003

Built-in Object Security.
Proceedings of the ECOOP 2003, 2003

A Logic of Object-Oriented Programs.
Proceedings of the Verification: Theory and Practice, 2003

Bankable Postage for Network Services.
Proceedings of the Advances in Computing Science, 2003

2002
Editorial.
ACM Trans. Comput. Log., 2002

Certified email with a light on-line trusted third party: design and implementation.
Proceedings of the Eleventh International World Wide Web Conference, 2002

Private Authentication.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002

Hiding Names: Private Authentication in the Applied Pi Calculus.
Proceedings of the Software Security -- Theories and Systems, 2002

2001
Formal Eavesdropping and Its Computational Interpretation.
Proceedings of the Theoretical Aspects of Computer Software, 4th International Symposium, 2001

Mobile values, new names, and secure communication.
Proceedings of the Conference Record of POPL 2001: The 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001

Leslie Lamport's properties and actions.
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001

Computing Symbolic Models for Verifying Cryptographic Protocols.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

2000
top-top-closed relations and admissibility.
Math. Struct. Comput. Sci., 2000

Authentication Primitives and Their Compilation.
Proceedings of the POPL 2000, 2000

Taming the Adversary.
Proceedings of the Advances in Cryptology, 2000

1999
A Type System for Java Bytecode Subroutines.
ACM Trans. Program. Lang. Syst., 1999

A Calculus for Cryptographic Protocols: The spi Calculus.
Inf. Comput., 1999

Secrecy in Programming-Language Semantics.
Proceedings of the Fifteenth Conference on Mathematical Foundations of Progamming Semantics, 1999

Secure Communications Processing for Distributed Languages.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

A Core Calculus of Dependency.
Proceedings of the POPL '99, 1999

A Top-Down Look at a Secure Message.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1999

Security Protocols and Specifications.
Proceedings of the Foundations of Software Science and Computation Structure, 1999

Types for Safe Locking.
Proceedings of the Programming Languages and Systems, 1999

Object Types against Races.
Proceedings of the CONCUR '99: Concurrency Theory, 1999

1998
A Bisimulation Method for Cryptographic Protocols.
Nord. J. Comput., 1998

On SDSI's Linked Local Name Spaces.
J. Comput. Secur., 1998

Secure Web Tunneling.
Comput. Networks, 1998

Protection in Programming-Language Translations.
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998

Protection in Programming-Language Translations: Mobile Object Systems (Abstract).
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

Panel Introduction: Varieties of Authentication.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

Two Facets of Authentication.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1997
Explicit Communication Revisited: Two New Attacks on Authentication Protocols.
IEEE Trans. Software Eng., 1997

Secure Implementation of Channel Abstractions.
Proceedings of the Second Workshop on Higher-Order Operational Techniques in Semantics, 1997

Secrecy by Typing inSecurity Protocols.
Proceedings of the Theoretical Aspects of Computer Software, Third International Symposium, 1997

Reasoning about Cryptographic Protocols in the Spi Calculus.
Proceedings of the CONCUR '97: Concurrency Theory, 1997

1996
The Millicent Protocol for Inexpensive Electronic Commerce.
World Wide Web J., 1996

Prudent Engineering Practice for Cryptographic Protocols.
IEEE Trans. Software Eng., 1996

On Subtyping and Matching.
ACM Trans. Program. Lang. Syst., 1996

A Theory of Primitive Objects: Untyped and First-Order Systems.
Inf. Comput., 1996

Secure Network Objects.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

An Interpretation of Objects and Object Types.
Proceedings of the Conference Record of POPL'96: The 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1996

On TLA as a logic.
Proceedings of the NATO Advanced Study Institute on Deductive Program Design, 1996

Syntactic Considerations on Recursive Types.
Proceedings of the Proceedings, 1996

Analysis and Caching of Dependencies.
Proceedings of the 1996 ACM SIGPLAN International Conference on Functional Programming, 1996

A Theory of Objects.
Monographs in Computer Science, Springer, ISBN: 978-1-4419-8598-9, 1996

1995
Conjoining Specifications.
ACM Trans. Program. Lang. Syst., 1995

Methods as Assertions.
Theory Pract. Object Syst., 1995

An Imperative Object Calculus (Invited Paper).
Theory Pract. Object Syst., 1995

A Theory of Primitive Objects: Second-Order Systems.
Sci. Comput. Program., 1995

Dynamic Typing in Polymorphic Languages.
J. Funct. Program., 1995

A Model for Formal Parametric Polymorphism: A PER Interpretation for System R.
Proceedings of the Typed Lambda Calculi and Applications, 1995

An Imperative Object Calculus.
Proceedings of the TAPSOFT'95: Theory and Practice of Software Development, 1995

An Abstract Account of Composition.
Proceedings of the Mathematical Foundations of Computer Science 1995, 1995

1994
Decidability and Expressiveness for First-Order Logics of Probability
Inf. Comput., July, 1994

An Old-Fashined Recipe for Real-Time.
ACM Trans. Program. Lang. Syst., 1994

Authentication in the Taos Operating System.
ACM Trans. Comput. Syst., 1994

Baby Modula-3 and a Theory of Objects.
J. Funct. Program., 1994

A Semantics for Static Type Inference in a Nondeterministic Language
Inf. Comput., 1994

Decomposing Specifications of Concurrent Systems.
Proceedings of the Programming Concepts, 1994

Open Systems in TLA.
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994

Subtyping and Parametricity
Proceedings of the Ninth Annual Symposium on Logic in Computer Science (LICS '94), 1994

A Semantics of Object Types
Proceedings of the Ninth Annual Symposium on Logic in Computer Science (LICS '94), 1994

A Theory of Primitive Objects - Scond-Order Systems.
Proceedings of the Programming Languages and Systems, 1994

A TLA Solution to the RPC-Memory Specification Problem.
Proceedings of the Formal Systems Specification, 1994

1993
Composing Specifications.
ACM Trans. Program. Lang. Syst., 1993

A Calculus for Access Control in Distributed Systems.
ACM Trans. Program. Lang. Syst., 1993

A Logical View of Composition.
Theor. Comput. Sci., 1993

Formal Parametric Polymorphism.
Theor. Comput. Sci., 1993

Authentification and Delegation with Smart-Cards.
Sci. Comput. Program., 1993

A Logic for Parametric Polymorphism.
Proceedings of the Typed Lambda Calculi and Applications, 1993

Authentication in the Taos Operating System.
Proceedings of the Fourteenth ACM Symposium on Operating System Principles, 1993

Extensible Grammars for Language Specialization.
Proceedings of the Database Programming Languages (DBPL-4), Proceedings of the Fourth International Workshop on Database Programming Languages - Object Models and Languages, Manhattan, New York City, USA, 30 August, 1993

1992
Authentication in Distributed Systems: Theory and Practice.
ACM Trans. Comput. Syst., 1992

The Geometry of Optimal Lambda Reduction.
Proceedings of the Conference Record of the Nineteenth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1992

Linear Logic Without Boxes
Proceedings of the Seventh Annual Symposium on Logic in Computer Science (LICS '92), 1992

1991
Dynamic Typing in a Statically Typed Language.
ACM Trans. Program. Lang. Syst., 1991

The Existence of Refinement Mappings.
Theor. Comput. Sci., 1991

Explicit Substitutions.
J. Funct. Program., 1991

Preserving Liveness: Comments on "Safety and Liveness from a Methodological Point of View".
Inf. Process. Lett., 1991

Faithful Ideal Models for Recursive Polymorphic Types.
Int. J. Found. Comput. Sci., 1991

Authentication and Delegation with Smart-cards.
Proceedings of the Theoretical Aspects of Computer Software, 1991

An Old-Fashioned Recipe for Real Time.
Proceedings of the Real-Time: Theory in Practice, 1991

A Logical View of Composition and Refinement.
Proceedings of the Conference Record of the Eighteenth Annual ACM Symposium on Principles of Programming Languages, 1991

A Semantics for a Logic of Authentication (Extended Abstract).
Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, 1991

1990
Nonclausal Deduction in First-Order Temporal Logic
J. ACM, April, 1990

A Logic of Authentication.
ACM Trans. Comput. Syst., 1990

Corrigendum: The Power of Temporal Proofs.
Theor. Comput. Sci., 1990

Rejoinder to Nessett.
ACM SIGOPS Oper. Syst. Rev., 1990

Secure Circuit Evaluation.
J. Cryptol., 1990

A Per Model of Polymorphism and Recursive Types
Proceedings of the Fifth Annual Symposium on Logic in Computer Science (LICS '90), 1990

An Axiomatization of Lamport's Temporal Logic of Actions.
Proceedings of the CONCUR '90, 1990

1989
The Power of Temporal Proofs.
Theor. Comput. Sci., 1989

Temporal Logic Programming.
J. Symb. Comput., 1989

On Hiding Information from an Oracle.
J. Comput. Syst. Sci., 1989

Realizable and Unrealizable Specifications of Reactive Systems.
Proceedings of the Automata, Languages and Programming, 16th International Colloquium, 1989

Decidability and Expressiveness for First-Order Logics of Probability (Extended Abstract)
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989

The Scope of a Logic of Authentication.
Proceedings of the Distributed Computing And Cryptography, 1989

1988
Authentication: A Practical Study in Belief and Action.
Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge, 1988

A Simple Protocol for Secure Circuit Evaluation.
Proceedings of the STACS 88, 1988

On Generating Solved Instances of Computational Problems.
Proceedings of the Advances in Cryptology, 1988

1987
Temporal-logic theorem proving.
PhD thesis, 1987

On Hiding Information from an Oracle (Extended Abstract)
Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987

1986
A Timely Resolution
Proceedings of the Symposium on Logic in Computer Science (LICS '86), 1986

Modal Theorem Proving.
Proceedings of the 8th International Conference on Automated Deduction, Oxford, England, July 27, 1986

1985
Nonclausal Temporal Deduction.
Proceedings of the Logics of Programs, 1985


  Loading...