Eunsuk Kang
Eunsuk Kang
Assistant Professor of Computer Science, Carnegie Mellon University
Verified email at - Homepage
Cited by
Cited by
An approach for effective design space exploration
E Kang, E Jackson, W Schulte
Monterey Workshop, 33-54, 2010
Formal modeling and analysis of a flash filesystem in Alloy
E Kang, D Jackson
Abstract state machines, B and Z, 294-308, 2008
Components, platforms and possibilities: towards generic automation for MDA
EK Jackson, E Kang, M Dahlweid, D Seifert, T Santen
Proceedings of the tenth ACM international conference on Embedded software …, 2010
Alloy*: A general-purpose higher-order relational constraint solver
A Milicevic, JP Near, E Kang, D Jackson
Formal Methods in System Design 55 (1), 1-32, 2019
Model-based security analysis of a water treatment system
E Kang, S Adepu, D Jackson, AP Mathur
2016 IEEE/ACM 2nd International Workshop on Software Engineering for Smart …, 2016
Stealthy deception attacks for cyber-physical systems
RM Góes, E Kang, R Kwong, S Lafortune
2017 IEEE 56th Annual Conference on Decision and Control (CDC), 4224-4230, 2017
Software engineering for smart cyber-physical systems: Challenges and promising solutions
T Bures, D Weyns, B Schmer, E Tovar, E Boden, T Gabor, ...
ACM SIGSOFT Software Engineering Notes 42 (2), 19-24, 2017
Detection of design flaws in the android permission protocol through bounded verification
H Bagheri, E Kang, S Malek, D Jackson
International Symposium on Formal Methods, 73-89, 2015
A toolkit for construction of authorization service infrastructure for the Internet of Things
H Kim, E Kang, EA Lee, D Broman
Proceedings of the Second International Conference on Internet-of-Things …, 2017
Alloy: a language and tool for relational models
D Jackson, A Milicevic, J Near, E Kang, E Torlak
retrieved at<> on Jul 22, 1, 2012
A formal approach for detection of security flaws in the android permission system
H Bagheri, E Kang, S Malek, D Jackson
Formal Aspects of Computing 30 (5), 525-544, 2018
An adaptive Markov strategy for defending smart grid false data injection from malicious attackers
J Hao, E Kang, J Sun, Z Wang, Z Meng, X Li, Z Ming
IEEE Transactions on Smart Grid 9 (4), 2398-2408, 2016
A lightweight code analysis and its role in evaluation of a dependability case
JP Near, A Milicevic, E Kang, D Jackson
Proceedings of the 33rd International Conference on Software Engineering, 31-40, 2011
Dependability arguments with trusted bases
E Kang, D Jackson
Requirements Engineering Conference (RE), 2010 18th IEEE International, 262-271, 2010
Multi-representational security analysis
E Kang, A Milicevic, D Jackson
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
Separation of concerns for dependable software design
D Jackson, E Kang
Proceedings of the FSE/SDP workshop on Future of software engineering …, 2010
Designing and analyzing a flash file system with Alloy.
E Kang, D Jackson
Int. J. Software and Informatics 3 (2-3), 129-148, 2009
Designing minimal effective normative systems with the help of lightweight formal methods
J Hao, E Kang, J Sun, D Jackson
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
Runtime monitoring for safety of intelligent vehicles
K Watanabe, E Kang, CW Lin, S Shiraishi
Proceedings of the 55th Annual Design Automation Conference, 1-6, 2018
Design space exploration for security
E Kang
2016 IEEE Cybersecurity Development (SecDev), 30-36, 2016
The system can't perform the operation now. Try again later.
Articles 1–20