Follow
James Parker
James Parker
University of Maryland, College Park
Verified email at jamesparker.me
Title
Cited by
Cited by
Year
4D, N = 1 supersymmetry genomics (II)
SJ Gates Jr, J Hallett, J Parker, VGJ Rodgers, K Stiffler
Journal of High Energy Physics 2012 (6), 1-34, 2012
83*2012
Build it, break it, fix it: Contesting secure development
A Ruef, M Hicks, J Parker, D Levin, ML Mazurek, P Mardziel
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
732016
Understanding security mistakes developers make: Qualitative analysis from build it, break it, fix it
D Votipka, KR Fulton, J Parker, M Hou, ML Mazurek, M Hicks
29th USENIX Security Symposium (USENIX Security 20), 109-126, 2020
622020
4D, N= 1 supersymmetry genomics (I)
SJ Gates Jr, J Gonzales, B MacGregor, J Parker, R Polo-Sherk, ...
Journal of High Energy Physics 2009 (12), 008, 2009
562009
LWeb: Information flow security for multi-tier web applications
J Parker, N Vazou, M Hicks
Proceedings of the ACM on Programming Languages 3 (POPL), 1-30, 2019
432019
Verifying replicated data types with typeclass refinements in Liquid Haskell
Y Liu, J Parker, P Redmond, L Kuper, M Hicks, N Vazou
Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-30, 2020
242020
4D, = 1 supergravity genomics
I Chappell, SJ Gates, WD Linch, J Parker, S Randall, A Ridgway, K Stiffler
Journal of High Energy Physics 2013 (10), 1-52, 2013
142013
Build it, break it, fix it: Contesting secure development
J Parker, M Hicks, A Ruef, ML Mazurek, D Levin, D Votipka, P Mardziel, ...
ACM Transactions on Privacy and Security (TOPS) 23 (2), 1-36, 2020
132020
Balboa: Bobbing and weaving around network censorship
MB Rosen, J Parker, AJ Malozemoff
30th USENIX Security Symposium (USENIX Security 21), 3399-3413, 2021
122021
LMonad: Information flow control for Haskell web applications
JL Parker
University of Maryland, College Park, 2014
112014
An Extended Detailed Investigation of First and Second Order Supersymmetries for Off-Shell and Supermultiplets
SJ Gates Jr, J Parker, VGJ Rodgers, L Rodriguez, K Stiffler
Symmetry 7 (2), 1080-1121, 2015
72015
Build it break it: Measuring and comparing development security
A Ruef, M Hicks, J Parker, D Levin, A Memon, J Plane, P Mardziel
8th Workshop on Cyber Security Experimentation and Test (CSET 15), 2015
62015
Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities
S Cuéllar, B Harris, J Parker, S Pernsteiner, E Tromer
32nd USENIX Security Symposium (USENIX Security 23), 6525-6540, 2023
42023
Understanding the how and the why: Exploring secure development practices through a course competition
KR Fulton, D Votipka, D Abrokwa, ML Mazurek, M Hicks, J Parker
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
22022
ANOSY: approximated knowledge synthesis with refinement types for declassification
SN Guria, N Vazou, M Guarnieri, J Parker
Proceedings of the 43rd ACM SIGPLAN International Conference on Programming …, 2022
22022
Understanding Security Mistakes Developers Make
D Votipka, K Fulton, J Parker, M Hou, M Mazurek, M Hicks
RWC-BIBIFI-qual. pdf, 2019
22019
Froid: Functional Reactive Android
J Parker
Undergraduate Honours Thesis, University of Maryland, 2013
22013
ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge
D Luick, J Kolesar, T Antonopoulos, WR Harris, J Parker, R Piskac, ...
Cryptology ePrint Archive, 2023
12023
Advanced Language-Based Techniques for Correct, Secure Networked Systems
J Parker
University of Maryland, College Park, 2020
2020
Visible to the public Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
D Votipka, K Fulton, J Parker, M Hou, ML Mazurek, M Hicks
The system can't perform the operation now. Try again later.
Articles 1–20