Scott Stoller's Home Page


Research Interests

My primary research interests are design, analysis, optimization, testing, and verification of software, with focuses on computer security, concurrency, and incremental computation.

Security Policy Mining is one of my current research topics.


C.V.


Publications


Journals

Foundations and Trends in Programming Languages, Member of Editorial Board

International Journal on Software Tools for Technology Transfer, Member of Editorial Board


Research Events

6th International Conference on Runtime Verification (RV 2015), Program Committee member

10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), Program Committee member

10th International Conference on Information Systems Security (ICISS 2014), Program Committee member

International Conference on Multicore Software Engineering, Performance, and Tools (MUSEPAT 2014), Program Committee member

International SPIN Symposium on Model Checking of Software (SPIN 2014), Program Committee member

19th ACM Symposium on Access Control Models and Technologies (SACMAT 2014), Program Committee member

5th International Conference on Runtime Verification (RV 2014), Program Committee member

9th International Conference on Information Systems Security (ICISS 2013), Program Committee member

International Conference on Multicore Software Engineering, Performance, and Tools (MUSEPAT 2013), Program Committee member

International SPIN Symposium on Model Checking of Software (SPIN 2013), Program Committee member and Publicity Chair

18th ACM Symposium on Access Control Models and Technologies (SACMAT 2013), Program Committee member

Older Research Events


Courses

Fall2014 CSE 535: Asynchronous Systems
Fall2013 CSE 308 (Sections 1 and 2): Software Engineering
Fall2012 CSE 594: Distributed Systems

Older Courses


Software

All software developed by my research group is available here or by request.

Mining ABAC Policies From Logs: an implementation of the policy mining algorithms described in our paper CoRR 1403.5715.

Mining ABAC Policies: an implementation of the policy mining algorithms described in our paper CoRR 1306.2401.

Mining Meaningful Roles: an implementation of the role mining algorithms described in our SACMAT 2012 paper.

Abductive Analysis of Administrative Policies in Rule-Based Access Control: an implementation of the policy analysis algorithms described in our 2014 IEEE TDSC paper.

Nachos-dfs: Nachos-3.4 plus Distributed File System Project. Version 2.1, released December 1999. It runs under Linux and Solaris.


Humor

To understand recursion, one must first understand recursion.
- Unknown

In theory, there's no difference between theory and practice.
In practice, there is.
- Yogi Berra


Scott D. Stoller Telephone: 631-632-1627
Computer Science Department FAX: 631-632-8334
Computer Science Bldg, Room 1429 myLastName@cs.stonybrook.edu
Stony Brook University http://www.cs.stonybrook.edu/~stoller/
Stony Brook, NY 11794-4400 My GnuPG Public Key
Picture of Scott Stoller