1. 2019
  2. Submitted

    Purely functional GLL parsing

    van Binsbergen, L. T., Scott, E. & Johnstone, A., 3 Dec 2019, (Submitted) In : Journal of Computer Languages.

    Research output: Contribution to journalArticle

  3. Published

    Multiple lexicalisation (a Java based study)

    Scott, E. & Johnstone, A., 20 Oct 2019, ACM Digital Library: Proceedings of Software Language Engineering 2019. ACM, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. E-pub ahead of print

    Principled and Pragmatic Specification of Programming Languages

    Johnstone, A. & Scott, E., 23 Sep 2019, In : Lecture Notes in Computer Science. 11758, p. 165-180 16 p.

    Research output: Contribution to journalArticle

  5. Published

    Derivation representation using binary subtree sets

    Scott, E., Johnstone, A. & van Binsbergen, L. T., 15 Apr 2019, In : Science of Computer Programming. 175, p. 63-84 22 p.

    Research output: Contribution to journalArticle

  6. 2018
  7. Published

    Decidable models of integer-manipulating programs with recursive parallelism

    Hague, M. & Lin, A., 30 Nov 2018, In : Theoretical Computer Science. 750, p. 24-37 14 p.

    Research output: Contribution to journalArticle

  8. Published

    GLL syntax analysers for EBNF grammars

    Scott, E. & Johnstone, A., 15 Nov 2018, In : Science of Computer Programming. 166, p. 120-145 26 p.

    Research output: Contribution to journalArticle

  9. 2017
  10. E-pub ahead of print

    What is decidable about string constraints with the ReplaceAll function

    Chen, T., Chen, Y., Hague, M., Lin, A. & Wu, Z., 27 Dec 2017, Principles of Programming Languages 2018 (POPL 2018). Vol. 2. p. 1-29 29 p. 3

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Checking cryptographic API usage with composable annotations

    Mitchell, D., van Binsbergen, L. T., Loring, B. & Kinder, J., 25 Dec 2017, ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM 2018). p. 53-59 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Modular Synthesis of Heap Exploits

    Repel, D., Kinder, J. & Cavallaro, L., 30 Oct 2017, PLAS '17 Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security. Association for Computing Machinery (ACM), p. 25-35 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Collapsible Pushdown Automata and Recursion Schemes

    Hague, M., Murawski, A., Ong, C-H. L. & Serre, O., 21 Aug 2017, In : ACM Transactions on Computational Logic. 18, 3, p. 1-42 42 p.

    Research output: Contribution to journalArticle

  14. Published

    POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Aug 2017, USENIX Workshop on Offensive Technologies (WOOT). USENIX, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    ExpoSE: practical symbolic execution of standalone JavaScript

    Loring, B., Mitchell, D. & Kinder, J., 13 Jul 2017, SPIN 2017 : Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software. ACM, p. 196–199 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware

    Suarez de Tangil Rotaeche, G., Dash, S., Ahmadi, M., Kinder, J., Giacinto, G. & Cavallaro, L., 22 Mar 2017, ACM CODASPY. ACM, p. 309-320 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Domains for Higher-Order Games

    Hague, M., Meyer, R. & Muskalla, S., 2017, 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS 2017). LIPIcs, p. 59:1-59:15 15 p. 59

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. 2016
  19. E-pub ahead of print

    Decidable Models of Integer-Manipulating Programs with Recursive Parallelism

    Hague, M. & Lin, A., 13 Sep 2016, Reachability Problems: 10th International Workshop, RP 2016, Aalborg, Denmark, September 19-21, 2016, Proceedings. Springer International Publishing, Vol. 9899. p. 148-162 15 p. (Lecture Notes in Computer Science; vol. 9899).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Structuring the GLL parsing algorithm for performance

    Scott, E. & Johnstone, A., 1 Sep 2016, In : Science of Computer Programming. 125, p. 1-22 22 p.

    Research output: Contribution to journalArticle

  21. Published

    DroidScribe: Classifying Android Malware Based on Runtime Behavior

    Dash, S., Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J. & Cavallaro, L., 4 Aug 2016, Security and Privacy Workshops (SPW), 2016 IEEE: Mobile Security Technologies (MoST 2016). IEEE, p. 252-261 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?

    Schrittwieser, S., Katzenbeisser, S., Kinder, J., Merzdovnik, G. & Weippl, E., 28 Jul 2016, In : ACM Computing Surveys. 49, 1, 37 p., 4.

    Research output: Contribution to journalArticle

  23. Published

    Generating Concurrency Checks Automatically

    Hague, M. & Hoyland, J., 17 Jul 2016, Proceedings of the 18th Workshop on Formal Techniques for Java-like Programs . ACM, p. 1-15 15 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Unboundedness and downward closures of higher-order pushdown automata

    Hague, M., Ong, C-H. L. & Kochems, J., 11 Jan 2016, POPL: Principles of Programming Languages. New York, NY: ACM, p. 151-163 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. 2015
  26. Published

    Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach

    Hague, M., Lin, A. & Ong, C-H. L., 23 Oct 2015, OOPSLA: Object-Oriented Programming Systems, Languages and Applications. New York, NY: ACM, p. 1-19 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. E-pub ahead of print

    High System-Code Security with Low Overhead

    Wagner, J., Kuznetsov, V., Candea, G. & Kinder, J., 20 Jul 2015, Proc. IEEE Symp. Security and Privacy (S&P 2015). p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Hypertesting: The Case for Automated Testing of Hyperproperties

    Kinder, J., Mar 2015, 3rd Workshop on Hot Issues in Security Principles and Trust (HotSpot 2015). p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Principled software microengineering

    Johnstone, A. & Scott, E., 1 Jan 2015, In : Science of Computer Programming. 97, Part 1, p. 64–68 5 p.

    Research output: Contribution to journalArticle

  30. 2014
  31. Published

    Senescent ground tree rewrite systems

    Hague, M., 14 Jul 2014, CSL-LICS '14 Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS). ACM, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Modular grammar specification

    Johnstone, A., Scott, E. & van den Brand, M., 1 Jul 2014, In : Science of Computer Programming. 87, p. 23-43 21 p.

    Research output: Contribution to journalArticle

  33. Published

    Saturation algorithms for model-checking pushdown systems

    Hague, M. & Carayol, A., May 2014, Proceedings of the 14th International Conference on Automata and Formal Languages . 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Efficient State Merging in Symbolic Execution (Extended Abstract)

    Kuznetsov, V., Kinder, J., Bucur, S. & Candea, G., 2014, p. 45-46. 2 p.

    Research output: Contribution to conferenceAbstract

  35. Published

    Prototyping symbolic execution engines for interpreted languages

    Bucur, S., Kinder, J. & Candea, G., 2014, Proc. Architectural Support for Programming Languages and Operating Systems (ASPLOS 2014). ACM, p. 239-254

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Regular Strategies in Pushdown Reachability Games

    Hague, M. & Carayol, A., 2014, 8th International Workshop on Reachability Problems 2014. 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. 2013
  38. Published

    Saturation of Concurrent Collapsible Pushdown Systems

    Hague, M., 12 Dec 2013, FSTTCS: Foundations of Software Technology and Theoretical Computer Science. 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    GLL parse-tree generation

    Scott, E. & Johnstone, A., 1 Oct 2013, In : Science of Computer Programming. 78, 10, p. 1828–1844 17 p.

    Research output: Contribution to journalArticle

  40. Published

    C-SHORe: A Collapsible Approach to Verifying Higher-Order Programs

    Broadbent, C., Carayol, A., Hague, M. & Serre, O., 25 Sep 2013, ICFP: International Conference on Functional Programming. p. 13-24 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Making Automated Testing of Cloud Applications an Integral Component of PaaS

    Bucur, S., Kinder, J. & Candea, G., Jul 2013, Proc. 4th Asia-Pacific Workshop on Systems (APSYS 2013). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Automated Debugging for Arbitrarily Long Executions

    Zamfir, C., Kasikci, B., Kinder, J., Bugnion, E. & Candea, G., May 2013, Proc. 14th Workshop on Hot Topics in Operating Systems (HotOS 2013). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Coercive subtyping: theory and implementation

    Luo, Z., Soloviev, S. & Xue, T., Feb 2013, In : Information and Computation. 223, p. 18-42

    Research output: Contribution to journalArticle

  44. Published

    Island Grammar-Based Parsing Using GLL and Tom

    Afroozeh, A., Bach, J-C., van den Brand, M., Johnstone, A., Manders, M., Moreau, P-E. & Scott, E., 2013, Software Language Engineering Lecture Notes in Computer Science : 5th International Conference, SLE 2012, Dresden, Germany, September 26-28, 2012, Revised Selected Papers. p. 224-243 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Safe Specification of Operator Precedence Rules

    Afroozeh, A., van den Brand, M., Johnstone, A., Scott, E. & Vinju, J., 2013, Software Language Engineering Lecture Notes in Computer Science . Vol. 8225. p. 137-156 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. 2012
  47. Published

    Towards Static Analysis of Virtualization-Obfuscated Binaries

    Kinder, J., Oct 2012, Proc. 19th Working Conf. Reverse Engineering (WCRE 2012). IEEE, p. 61-70

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Efficient state merging in symbolic execution

    Kuznetsov, V., Kinder, J., Bucur, S. & Candea, G., Jun 2012, Proc. 33rd Conf. Programming Language Design and Implementation (PLDI 2012). ACM, p. 193-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    An algorithm for finding input-output constrained convex sets in an acyclic digraph

    Gutin, G., Johnstone, A., Reddington, J., Scott, E. & Yeo, A., May 2012, In : Journal of Discrete Algorithms. 13, p. 47-58 12 p.

    Research output: Contribution to journalArticle

  50. Published

    Alternating Control Flow Reconstruction

    Kinder, J. & Kravchenko, D., Jan 2012, Proc. 13th Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI 2012). Springer, p. 267-282

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    A Saturation Method for Collapsible Pushdown Systems

    Broadbent, C., Carayol, A., Hague, M. & Serre, O., 2012, ICALP: International Colloquium on Automata, Languages and Programming.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Synchronisation‐ and Reversal‐Bounded Analysis of Multithreaded Programs with Counters

    Hague, M. & Lin, A., 2012, CAV: Computer Aided Verification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. 2011
  54. Published

    A Pluralist Approach to the Formalisation of Mathematics

    Adams, R. & Luo, Z., 2 Jul 2011, In : Mathematical Structures in Computer Science. 21, 4, p. 913-942 29 p.

    Research output: Contribution to journalArticle

  55. Published

    Trap Hunting: Finding Personal Data Management Issues in Next Generation AAC Devices

    Reddington, J. & Coles-Kemp, L., 1 Jul 2011, Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies. Edinburgh, Scotland, UK: Association for Computational Linguistics, p. 32-42 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    A saturation method for the modal μ-calculus over pushdown systems

    Hague, M. & Ong, C-HL., May 2011, In : Information and Computation. 209, 5, p. 799–821

    Research output: Contribution to journalArticle

  57. Published

    LDT: a language definition technique

    Johnstone, A., Scott, E. & van den Brand, M., 26 Mar 2011, LDTA '11 Proceedings of the Eleventh Workshop on Language Descriptions, Tools and Applications. ACM, p. 1-8 8 p. 9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Automatically generating stories from sensor data

    Reddington, J. & Tintarev, N., 1 Jan 2011, p. 407-410. 4 p.

    Research output: Contribution to conferencePaper

  59. Published

    “Hands Busy, Eyes Busy”: Generating Stories from Sensor Data for Automotive applications

    Tintarev, N., Reddington, J., Reiter, E., Black, R. & Waller, A., 2011.

    Research output: Contribution to conferencePaper

  60. Published

    A mobile phone based personal narrative system

    Black, R., Waller, A., Tintarev, N., Reiter, E. & Reddington, J., 2011, The proceedings of the 13th international ACM SIGACCESS conference on Computers and accessibility. p. 171-178 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Complexity of Computing Convex Subgraphs in Custom Instruction Synthesis

    Reddington, J. & Atasu, K., 2011, In : IEEE Transactions on Very Large Scale Integration (VLSI) Systems. p. 1-5

    Research output: Contribution to journalArticle

  62. Published

    Contextual analysis of word meanings in type-theoretical semantics

    Luo, Z., 2011, Logical Aspects of Computational Linguistics:6th International Conference, LACL 2011, Montpellier, France, June 29 – July 1, 2011: Proceedings. Pogodalla, S. & Prost, J-P. (eds.). Springer, p. 159-174 16 p. (Lecture Notes in Computer Science; vol. 6736).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Efficient model checking of fault-tolerant distributed protocols

    Bokor, P., Kinder, J., Serafini, M. & Suri, N., 2011, Proc. 41st Int Conf. Dependable Systems and Networks (DSN-DCCS 2011). IEEE, p. 73-84

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud

    Coles-Kemp, L., Reddington, J. & Williams, P. A. H., 2011, In : Information Security Technical Report. 16, 3-4, p. 115-122

    Research output: Contribution to journalArticle

  65. Published

    Malware Detection

    Katzenbeisser, S., Kinder, J. & Veith, H., 2011, Encyclopedia of Cryptography and Security, 2nd Ed.. van Tilborg, H. & Jajodia, S. (eds.). Springer, p. 752-755

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  66. Published

    Model Checking Recursive Programs with Numeric Data Types

    Hague, M. & Lin, A., 2011, CAV: Computer Aided Verification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    New Methods of Analysis of Narrative and Semantics in Support of Interactivity

    Murtagh, F., Ganz, A. & Reddington, J., 2011, In : Entertainment Computing. 2, p. 115-121

    Research output: Contribution to journalArticle

  68. Published

    Parameterised Pushdown Systems with Non‐Atomic Writes

    Hague, M., 2011, FSTTCS: Foundations of Software Technology and Theoretical Computer Science.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Semantics from narrative: state of the art and future perspectives

    Murtagh, F., Ganz, A. & Reddington, J., 2011, Statistical Learning and Data Science. Summa, M. G., Bottou, L., Goldfarb, B., Murtagh, F., Pardoux, C. & Touati, M. (eds.). Taylor and Francis, (Computer Science and Data Analysis).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  70. Published

    Supporting Domain-Specific State Space Reductions through Local Partial-Order Reduction

    Bokor, P., Kinder, J., Serafini, M. & Suri, N., 2011, Proc. 26th Int. Conf. Automated Software Engineering (ASE 2011). p. 113-122

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Typed Operational Semantics for Dependent Record Types

    Feng, Y. & Luo, Z., 2011, Proceedings of Types for Proofs and Programs (TYPES'09), EPTCS 53.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. 2010
  73. Published

    Tag Clouds for Displaying Semantics: The Case of Filmscripts

    Murtagh, F., Ganz, A. & Reddington, J., 2010, In : Information Visualization . 9, 4, p. 253-262 10 p.

    Research output: Contribution to journalArticle

  74. Published

    Using NLG and sensors to support personal narrative for children with complex communication needs

    Black, R., Reddington, J., Reiter, E., Tintarev, N. & Waller, A., 2010, Proceedings of the NAACL HLT 2010 Workshop on Speech and Language Processing for Assistive Technologies. p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. 2009
  76. Published

    Algorithms for generating convex sets in acyclic digraphs

    Balister, P., Gerke, S., Gutin, G., Johnstone, A., Reddington, J., Scott, E., Soleimanfallah, A. & Yeo, A., Dec 2009, In : Journal of Discrete Algorithms. 7, 4, p. 509–518 10 p.

    Research output: Contribution to journalArticle

  77. Unpublished

    Improvements to instruction identification for custom instruction set design

    Reddington, J., 31 Aug 2009, (Unpublished) 225 p.

    Research output: ThesisDoctoral Thesis

  78. Published

    Better Than Optimal: Fast Identification of Custom Instruction Candidates

    Reddington, J., Gutin, G., Johnstone, A., Scott, E. & Yeo, A., 2009, CSE '09: International Conference on Computational Science and Engineering, 2009. Vol. 2. p. 17-24 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. 2008
  80. Published

    An Algorithm for Finding Input-Output Constrained Convex Sets in an Acyclic Digraph

    Gutin, G., Johnstone, A., Reddington, J., Scott, E., Yeo, A., Broersma, H. (ed.), Erlebach, T. (ed.), Friedeizky, T. (ed.) & Paulusma, D. (ed.), 2008, In : Lecture Notes in Computer Science. 5344, p. 206-217 12 p.

    Research output: Contribution to journalArticle

  81. 2007
  82. Published
  83. 2004
  84. Published

    The GTB and PAT tools

    Johnstone, A., Scott, E. & Economopoulos, G., 31 Dec 2004, p. 173-175. 3 p.

    Research output: Contribution to conferencePaper

  85. 2000
  86. Published

    What assembly programmers get up to: control flow challenges in reverse compilation

    Johnstone, A., Scott, E. & Womack, T., 3 Mar 2000, p. 83-92. 10 p.

    Research output: Contribution to conferencePaper

  87. 1999
  88. Published

    Reverse compilation of digital signal processor assembler source to ANSI-C

    Johnstone, A., Scott, E. & Womack, T., Sep 1999, p. 1-10. 10 p.

    Research output: Contribution to conferencePaper

  89. 1998
  90. Published

    Generalised recursive descent parsing and follow-determinism

    Johnstone, A. & Scott, E., 1998, In : Lecture Notes in Computer Science. 1383, p. 16-30 15 p.

    Research output: Contribution to journalArticle

  91. 1995
  92. Published

    Crucial Issues in the Design of a Real-Time Contaminant Detection System for Food Products

    Davies, E. R., Patel, D. & Johnstone, A., Dec 1995, In : Real-Time Imaging. 1, 6, p. 397-407 11 p.

    Research output: Contribution to journalArticle

  93. 1992
  94. Published

    LATEX Concisely

    Johnstone, A., 1 Sep 1992, Ellis Horwood. 170 p.

    Research output: Book/ReportBook

  95. 1989
  96. Published

    Full Custom VLSI Design for Computer Scientists

    Johnstone, A., 1 Jan 1989, In : INTERNATIONAL JOURNAL OF ELECTRICAL ENGINEERING EDUCATION. 26, 1-2, p. 103-112 10 p.

    Research output: Contribution to journalArticle

  97. Published

    Methodology for optimising cost/speed tradeoffs in real-time inspection hardware

    Davies, E. R. & Johnstone, A. I. C., Jan 1989, In : IEE Proc E. 136, 1, p. 62-69 8 p.

    Research output: Contribution to journalArticle

  98. 1986
  99. Published

    Engineering tradeoffs in the design of a real-time system for visual inspection of small products

    Davies, E. R. & Johnstone, A., 1986, p. 15-22.

    Research output: Contribution to conferencePaper