# Publications

Link to the full list in the KTH publication portal.

## TCS Publications, 50 latest

[1]

J. Simonsson

*et al.*, "Observability and Chaos Engineering on System Calls for Containerized Applications in Docker,"*Future generations computer systems*, vol. 122, pp. 117-129, 2021.
[2]

L. Zhang

*et al.*, "Maximizing Error Injection Realism for Chaos Engineering with System Calls,"*IEEE Transactions on Dependable and Secure Computing*, 2021.
[3]

I. Bastys

*et al.*, "Clockwork : Tracking Remote Timing Attacks," in*Proceedings IEEE Computer Security Foundations Symposium, CSF 2020*, 2020.
[4]

B. Danglot

*et al.*, "An approach and benchmark to detect behavioral changes of commits in continuous integration,"*Journal of Empirical Software Engineering*, vol. 25, no. 4, pp. 2379-2415, 2020.
[5]

S. Bhattacharya, D. Na Nongkai and T. Saranurak,
"Coarse-grained complexity for dynamic algorithms,"
in

*Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, SODA 2020*, 2020, pp. 476-494.
[6]

S. Forster

*et al.*, "Computing and testing small connectivity in near-linear time and queries via fast local cut algorithms," in*Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms*, 2020, pp. 2046-2065.
[7]

W. Oortwijn, D. Gurov and M. Huisman,
"An Abstraction Technique for Verifying Shared-Memory Concurrency,"

*Applied Sciences*, vol. 10, no. 11, 2020.
[8]

P. Nie

*et al.*, "Deep Generation of Coq Lemma Names Using Elaborated Terms," in*Automated Reasoning*, 2020, pp. 97-118.
[9]

J. van den Brand,
"A Deterministic Linear Program Solver in Current Matrix Multiplication Time,"
in

*Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, SODA 2020*, 2020, pp. 259-278.
[10]

X. Zhao and P. Haller,
"Consistency types for replicated data in a higher-order distributed programming language,"

*The Art, Science, and Engineering of Programming*, vol. 5, no. 2, 2021.
[11]

M.-H. Le

*et al.*, "AnonFACES : Anonymizing Faces Adjusted to Constraints on Efficacy and Security," in*Proceedings of the 19th Workshop on Privacy in the Electronic Society*, 2020, pp. 87-100.
[12]

A. Coto, R. Guanciale and E. Tuosto,
"Choreographic development of message-passing applications : a tutorial,"
in

*Lecture Notes in Computer Science book series*, 2020, pp. 20-36.
[13]

H. Ye

*et al.*, "A comprehensive study of automatic program repair on the QuixBugs benchmark,"*Journal of Systems and Software*, vol. 171, 2021.
[14]

G. Zhang and A. Gionis,
"Diverse Rule Sets,"
in

*Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining*, 2020, pp. 1532-1541.
[15]

M. Balliu

*et al.*, "Friendly Fire : Cross-App Interactions in IoT Platforms,"*ACM Transactions on Privacy and Security (TOPS)*, vol. 24, no. 3, pp. 1-40, 2021.
[16]

M. Shcherbakov and M. Balliu,
"SerialDetector: Principled and Practical Exploration of Object Injection Vulnerabilities for the Web,"
in

*Proceedings of the Network and Distributed System Security Symposium (NDSS 2021)*, 2021.
[17]

R. Guanciale and E. Tuosto,
"PomCho : Atool chain for choreographic design,"

*Science of Computer Programming*, vol. 202, 2021.
[18]

X. Zhao,
"Language-based Approaches to Safe and Efficient Distributed Programming,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2021:6, 2021.

[19]

R. Glassey

*et al.*, "Addressing the double challenge of learning and teaching enterprise technologies through peer teaching," in*Proceedings - International Conference on Software Engineering*, 2020, pp. 130-138.
[20]

P. Rozenshtein, N. Tatti and A. Gionis,
"The network-untangling problem : from interactions to activity timelines,"

*Data mining and knowledge discovery*, vol. 35, no. 1, pp. 213-247, 2021.
[21]

D. Gurov, P. Herber and I. Schaefer,
"Automated Verification of Embedded Control Software : Track Introduction,"
in

*Leveraging Applications of Formal Methods, Verification and Validation : Applications*, 2020, pp. 235-239.
[22]

A. Alshnakat

*et al.*, "Constraint-Based Contract Inference for Deductive Verification," in*Deductive Software Verification : Future Perspectives,*: Springer Nature, 2020, pp. 149-176.
[23]

J. Elffers and J. Nordström,
"A cardinal improvement to pseudo-boolean solving,"
in

*AAAI 2020 - 34th AAAI Conference on Artificial Intelligence*, 2020, pp. 1495-1503.
[24]

E. Riese

*et al.*, "Scholarship of third-cycle education at KTH: How could doctoral education move forward?," in*KTH SoTL 2021*, 2021.
[25]

E. Riese

*et al.*, "Experiences and lessons learned by offering introductory training for teaching assistants who teach computer science," in*KTH SoTL*, 2021.
[26]

E. Riese and V. Kann,
"Computer Science students’ perceptions of emergency remote teaching caused by the COVID-19 pandemic,"
in

*KTH SoTL 2021*, 2021.
[27]

R.-C. Tzeng, B. Ordozgoiti and A. Gionis,
"Discovering conflicting groups in signed networks,"
in

*Advances in Neural Information Processing Systems 33 (NeurIPS 2020)*, 2020.
[28]

I. Vistbakka and E. Troubitsyna,
"Analysing Privacy-Preserving Constraints in Microservices Architecture,"
in

*Proceedings - 2020 IEEE 44th Annual Computers, Software, and Applications Conference, COMPSAC 2020*, 2020, pp. 1089-1090.
[29]

D. Oliveira

*et al.*, "Evaluating Code Readability and Legibility : An Examination of Human-centric Studies," in*Proceedings - 2020 IEEE International Conference on Software Maintenance and Evolution, ICSME 2020*, 2020, pp. 348-359.
[30]

A. Coto, R. Guanciale and E. Tuosto,
"An abstract framework for choreographic testing,"
(Manuscript).

[31]

O. Bälter, R. Glassey and M. Wiggberg,
"Reduced Learning Time with Maintained Learning Outcomes,"
in

*Proceedings of the 52nd ACM Technical Symposium on Computer Science Education*, 2021, pp. 660-665.
[32]

F. Adriaens

*et al.*, "Block-approximated exponential random graphs," in*Proceedings - 2020 IEEE 7th International Conference on Data Science and Advanced Analytics, DSAA 2020*, 2020, pp. 70-80.
[33]

H. Ye, M. Martinez and M. Monperrus,
"Automated patch assessment for program repair at scale,"

*Journal of Empirical Software Engineering*, vol. 26, no. 2, 2021.
[34]

J. Cabrera Arteaga

*et al.*, "CROW: Code Diversification for WebAssembly," in*MADWeb, NDSS 2021*, 2021.
[35]

J. Chuzhoy

*et al.*, "A deterministic algorithm for balanced cut with applications to dynamic connectivity, flows, and beyond," in*Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS*, 2020, pp. 1158-1167.
[36]

C. Soto Valero

*et al.*, "A comprehensive study of bloated dependencies in the Maven ecosystem,"*Journal of Empirical Software Engineering*, vol. 26, no. 3, 2021.
[37]

J. van den Brand

*et al.*, "Bipartite Matching in Nearly-linear Time on Moderately Dense Graphs," in*61st IEEE Annual Symposium on Foundations of Computer Science, FOCS 2020, Durham, NC, USA, November 16-19, 2020*, 2020, pp. 919-930.
[38]

J. van den Brand,
"Unifying Matrix Data Structures : Simplifying and Speeding up Iterative Algorithms,"
in

*4th Symposium on Simplicity in Algorithms, SOSA 2021, Virtual Conference, January 11-12, 2021*, 2021, pp. 1-13.
[39]

J. van den Brand

*et al.*, "Minimum Cost Flows, MDPs, and L1-Regression in Nearly Linear Time for Dense Instances," in*Proccedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2020, Rome, Italy, June 21-25, 2021*, 2021.
[40]

S. Varga, J. Brynielsson and U. Franke,
"Cyber-threat perception and risk management in the Swedish financial sector,"

*Computers & security (Print)*, vol. 105, 2021.
[41]

V. Palmkvist

*et al.*, "Resolvable ambiguity : Principled resolution of syntactically ambiguous programs," in*CC 2021 : Proceedings of the 30th ACM SIGPLAN International Conference on Compiler Construction*, 2021.
[42]

D. Helm

*et al.*, "A programming model for semi-implicit parallelization of static analyses," in*Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis*, 2020, pp. 428-439.
[43]

A. Oak

*et al.*, "Language Support for Secure Software Development with Enclaves," in*IEEE Computer Security Foundations Symposium (CSF 2021)*, 2021.
[44]

C. $$$Muvva, M. Natarajan Arul and V. Subramanian,
"Assessment of Amyloid Forming Tendency of Peptide Sequences from Amyloid Beta and Tau Proteins Using Force-Field, Semi-Empirical, and Density Functional Theory Calculations,"

*International Journal of Molecular Sciences*, vol. 22, no. 6, 2021.
[45]

J. van den Brand,
"Dynamic Matrix Algorithms and Applications in Convex and Combinatorial Optimization,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2021:31, 2021.

[46]

M. M. Ahmadpanah

*et al.*, "SandTrap: Securing JavaScript-driven Trigger-Action Platforms," in*USENIX Security Symposium (USENIX Security 2021)*, 2021.
[47]

Z. Yu

*et al.*, "Characterizing the Usage, Evolution and Impact of Java Annotations in Practice,"*IEEE Transactions on Software Engineering*, vol. 47, no. 5, pp. 969-986, 2021.
[48]

C. Artho and P. C. Olveczky,
"Formal Techniques for Safety-Critical Systems (FTSCS 2018) Preface,"

*Science of Computer Programming*, vol. 208, 2021.
[49]

E. Riese and V. Kann,
"Computer Science Majors’ Experiences of Their Distance Education Caused by the COVID-19 Pandemic,"
in

*2021 IEEE Global Engineering Education Conference (EDUCON)*, 2021, pp. 393-397.
[50]

R. Dutta

*et al.*, "Temporal and diurnal variation in social media posts to a suicide support forum,"*BMC Psychiatry*, vol. 21, no. 1, 2021.