Refinement types: A tutorial

R Jhala, N Vazou - Foundations and Trends® in …, 2021 - nowpublishers.com
Refinement types enrich a language's type system with logical predicates that circumscribe
the set of values described by the type. These refinement predicates provide software …

Program synthesis

S Gulwani, O Polozov, R Singh - Foundations and Trends® in …, 2017 - nowpublishers.com
Program synthesis is the task of automatically finding a program in the underlying
programming language that satisfies the user intent expressed in the form of some …

Statically verified refinements for multiparty protocols

F Zhou, F Ferreira, R Hu, R Neykova… - Proceedings of the ACM …, 2020 - dl.acm.org
With distributed computing becoming ubiquitous in the modern era, safe distributed
programming is an open challenge. To address this, multiparty session types (MPST) …

Position: GDPR compliance by construction

M Schwarzkopf, E Kohler, M Frans Kaashoek… - … , and Analytics for …, 2019 - Springer
New laws such as the European Union's General Data Protection Regulation (GDPR) grant
users unprecedented control over personal data stored and processed by businesses …

Propr: property-based automatic program repair

MP Gissurarson, L Applis, A Panichella… - Proceedings of the 44th …, 2022 - dl.acm.org
Automatic program repair (APR) regularly faces the challenge of overfitting patches---
patches that pass the test suite, but do not actually address the problems when evaluated …

Sesame: Practical End-to-End Privacy Compliance with Policy Containers and Privacy Regions

K Dak Albab, A Agvanian, A Aby, C Tiffany… - Proceedings of the …, 2024 - dl.acm.org
Web applications are governed by privacy policies, but developers lack practical
abstractions to ensure that their code actually abides by these policies. This leads to …

Sugarcoat: Programmatically generating privacy-preserving, web-compatible resource replacements for content blocking

M Smith, P Snyder, B Livshits, D Stefan - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Content blocking systems today exempt thousands of privacy-harming scripts. They do this
because blocking these scripts breaks the Web sites that rely on them. In this paper, we …

{STORM}: Refinement types for secure web applications

N Lehmann, R Kunkel, J Brown, J Yang… - … on Operating Systems …, 2021 - usenix.org
We present Storm, a web framework that allows developers to build MVC applications with
compile-time enforcement of centrally specified data-dependent security policies. Storm …

Enforcing the GDPR

F Hublet, D Basin, S Krstić - European Symposium on Research in …, 2023 - Springer
Violations of data protection laws such as the General Data Protection Regulation (GDPR)
are ubiquitous. Currently, building IT support to implement such laws is difficult and the …

Towards multiverse databases

A Marzoev, LT Araújo, M Schwarzkopf… - Proceedings of the …, 2019 - dl.acm.org
A multiverse database transparently presents each application user with a flexible, dynamic,
and independent view of shared data. This transformed view of the entire database contains …