Michael Franz
Orcid: 0000-0001-5911-2275Affiliations:
- University of California, Irvine, USA
According to our database1,
Michael Franz
authored at least 161 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2015, "For contributions to just-in-time compilation and optimization and to compiler techniques for computer security.".
IEEE Fellow
IEEE Fellow 2016, "For contributions to just-in-time compilation and to computer security through compiler-generated software diversity".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on ics.uci.edu
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
The Astonishing Evolution of Probabilistic Memory Safety: From Basic Heap-Data Attack Detection Toward Fully Survivable Multivariant Execution.
IEEE Secur. Priv., 2024
CoRR, 2024
Proceedings of the Nineteenth European Conference on Computer Systems, 2024
What You Trace is What You Get: Dynamic Stack-Layout Recovery for Binary Recompilation.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024
2023
Method for Using IMU-Based Experimental Motion Data in BVH Format for Musculoskeletal Simulations via OpenSim.
Sensors, 2023
The vendor-agnostic EMPAIA platform for integrating AI applications into digital pathology infrastructures.
Future Gener. Comput. Syst., 2023
A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
2022
CoRR, 2022
DFI: An Interprocedural Value-Flow Analysis Framework that Scales to Large Codebases.
CoRR, 2022
MCAD: Beyond Basic-Block Throughput Estimation Through Differential, Instruction-Level Tracing.
CoRR, 2022
Improving cross-platform binary analysis using representation learning via graph alignment.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022
The EMPAIA Platform: Vendor-neutral integration of AI applications into digital pathology infrastructures.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, 2021
StackBERT: Machine Learning Assisted Static Stack Frame Size Recovery on Stripped and Optimized Binaries.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021
Better Keep Cash in Your Boots - Hardware Wallets are the New Single Point of Failure.
Proceedings of the DeFi '21: Proceedings of the 2021 ACM CCS Workshop on Decentralized Finance and Security, 2021
2020
Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020
2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software Transformation, 2018
Accelerating Dynamically-Typed Languages on Heterogeneous Platforms Using Guards Optimization.
Proceedings of the 32nd European Conference on Object-Oriented Programming, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018
2017
IEEE Trans. Dependable Secur. Comput., 2017
ACM Comput. Surv., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the Twelfth European Conference on Computer Systems, 2017
2016
ACM Trans. Program. Lang. Syst., 2016
Proceedings of the 2016 USENIX Annual Technical Conference, 2016
Proceedings of the 2016 USENIX Annual Technical Conference, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
2015
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02346-0, 2015
J. Integr. Bioinform., 2015
repAIrC: A Tool for Ensuring Data Consistency by Means of Active Integrity Constraints.
CoRR, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Principles and Practices of Programming on The Java Platform, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 2015 ACM SIGPLAN International Symposium on Memory Management, 2015
Proceedings of the Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2015
From Fine Grained Code Diversity to JIT-ROP to Execute-Only Memory: The Cat and Mouse Game Between Attackers and Defenders Continues.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 2014 International Conference on Principles and Practices of Programming on the Java Platform Virtual Machines, 2014
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, 2014
Proceedings of the First ACM Workshop on Moving Target Defense, 2014
2013
Proceedings of the Moving Target Defense II, 2013
ACM Trans. Archit. Code Optim., 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Proceedings of the 2013 International Conference on Principles and Practices of Programming on the Java Platform: Virtual Machines, 2013
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012
Proceedings of the 11th International Conference on Aspect-oriented Software Development, 2012
2011
Proceedings of the Moving Target Defense, 2011
IEEE Trans. Dependable Secur. Comput., 2011
"Slimming" a Java virtual machine by way of cold code removal and optimistic partial program loading.
Sci. Comput. Program., 2011
ACM SIGPLAN international workshop on programming language and systems technologies for internet clients: (PLASTIC 2011).
Proceedings of the Companion to the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2011
Proceedings of the 10th International Symposium on Memory Management, 2011
The impact of optional type information on jit compilation of dynamically typed languages.
Proceedings of the 7th Symposium on Dynamic Languages, 2011
2010
Proceedings of the 8th International Conference on Principles and Practice of Programming in Java, 2010
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2009
ACM Trans. Program. Lang. Syst., 2009
The effectiveness of producer-side machine-independent optimizations for mobile code.
Softw. Pract. Exp., 2009
Proceedings of the 5th International Conference on Virtual Execution Environments, 2009
Proceedings of the Objects, Components, Models and Patterns, 47th International Conference, 2009
Proceedings of the 7th International Conference on Principles and Practice of Programming in Java, 2009
Proceedings of the 7th International Conference on Principles and Practice of Programming in Java, 2009
Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, 2009
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009
Proceedings of the 5th Symposium on Dynamic Languages, 2009
2008
ACM Trans. Program. Lang. Syst., 2008
Dynamic Parallelization and Vectorization of Binary Executables on Hierarchical Platforms.
J. Instr. Level Parallelism, 2008
Proceedings of the Software Engineering 2008. Fachtagung des GI-Fachbereichs Softwaretechnik, 2008
Proceedings of the 6th International Symposium on Principles and Practice of Programming in Java, 2008
Slim VM: optimistic partial program loading for connected embedded Java virtual machines.
Proceedings of the 6th International Symposium on Principles and Practice of Programming in Java, 2008
Automatic Partitioning of Object-Oriented Programs for Resource-Constrained Mobile Devices with Multiple Distribution Objectives.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008
Proceedings of the Emerging Uses and Paradigms for Dynamic Binary Translation, 26.10., 2008
Eliminating the insider threat in software development by combining parallelism, randomization and checkpointing.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities.
Proceedings of the Second International Conference on Complex, 2008
2007
ACM Trans. Archit. Code Optim., 2007
A new way of estimating compute-boundedness and its application to dynamic voltage scaling.
Int. J. Embed. Syst., 2007
Automatic generation of machine emulators: Efficient synthesis of robust virtual machines for legacy software migration.
Proceedings of the Software Engineering 2007, 2007
Proceedings of the 5th International Symposium on Principles and Practice of Programming in Java, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the 2nd International Conference on Virtual Execution Environments, 2006
Proceedings of the Third Conference on Computing Frontiers, 2006
Proceedings of the 3rd Workshop on Programming Languages and Operating Systems: Linguistic Support for Modern Operating Systems, 2006
2005
Sci. Comput. Program., 2005
Sci. Comput. Program., 2005
Proceedings of the Fourth International Workshop on Compiler Optimization meets Compiler Verification, 2005
Proceedings of the First International Workshop on Abstract Interpretation of Object-oriented Languages, 2005
Proceedings of the Fourth International Workshop on Compiler Optimization meets Compiler Verification, 2005
Proceedings of the New Security Paradigms Workshop 2005, 2005
A Multilevel Introspective Dynamic Optimization System For Holistic Power-Aware Computing.
Proceedings of the Power-aware Computing Systems, 3.-8. April 2005, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Proceedings of the New Security Paradigms Workshop 2004, 2004
Awarded Best Paper! Semantic Remote Attestation - Virtual Machine Directed Approach to Trusted Computing.
Proceedings of the 3rd Virtual Machine Research and Technology Symposium, 2004
Proceedings of the 2004 Workshop on Interpreters, Virtual Machines and Emulators, 2004
2003
Proceedings of the Compiler Optimization Meets Compiler Verification, 2003
Proceedings of the Modular Programming Languages, Joint Modular Languages Conference, 2003
Proceedings of the 2003 Workshop on Interpreters, Virtual Machines and Emulators, 2003
2002
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002
Efficient online optimization by utilizing offline analysis and the safeTSA representation.
Proceedings of the naugural International Symposium on Principles and Practice of Programming in Java, 2002
Proceedings of the 2002 Workshop on New Security Paradigms, 2002
2001
Proceedings of the First International Workshop on Multi-Language Infrastructure and Interoperability, 2001
SafeTSA: A Type Safe and Referentially Secure Mobile-Code Representation Based on Static Single Assignment Form.
Proceedings of the 2001 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), 2001
2000
Automated data-member layout of help objects to improve memory-hierarchy performance.
ACM Trans. Program. Lang. Syst., 2000
Proceedings of the Modular Programming Languages, Joint Modular Languages Conference, 2000
Oberon - The Overlooked Jewel.
Proceedings of the School of Niklaus Wirth, "The Art of Simplicity", 2000
1999
Perpetual Adaptation of Software to Hardware: An Extensible Architecture for Providing Code Optimization as a Central System Service
CoRR, 1999
Proceedings of the Fifth International Workshop on Object-Oriented Real-Time Dependable Systems, 1999
1998
J. Univers. Comput. Sci., 1998
1997
The Programming Language Lagoona - A Fresh Look at Object-Orientation.
Softw. Concepts Tools, 1997
Beyond Java: An Infrastructure for High-Performance Mobile Code on the World Wide Web.
Proceedings of WebNet 97, 1997
Proceedings of The Sixth Workshop on Hot Topics in Operating Systems, 1997
1996
Adaptive Compression of Syntax Trees and Iterative Dynamic Code Optimization: Two Basic Technologies for Mobile Object Systems.
Proceedings of the Mobile Object Systems, 1996
1995
Protocol Extension: A Technique for Structuring Large Extensible Software-Systems.
Softw. Concepts Tools, 1995
1994
Proceedings of the Programming Languages and System Architectures, 1994
1993
The Case for Universal Symbol Files.
Struct. Program., 1993
1991