Skip to main content

Technical Reports

reports image


CMU-CyLab-16-004:  Tracing Actual Causes
Author(s):  Anupam Datta, Depak Garg, Dilsun Kaynar, and Divya Sharma
Publication Date:  August 8, 2016

CMU-CyLab-16-002:  Interaction-aware Actual Causation: A Building Block for Accountability in Security Protocols
Research Area(s):  Privacy Protection
Cross-Cutting Thrusts:  Formal Methods
Author(s):  Divya Sharma
Publication Date:  September 30, 2015

CMU-CyLab-16-001:  Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers
Research Area(s):  Survivable Distributed Systems
Cross-Cutting Thrusts:  Business Risk Analysis and Economic Implications | Threat Analysis and Modeling
Author(s):  Jassim Aljuraidan, Lujo Bauer, Michael K. Reiter, and Matthias Beckerle
Publication Date:  February 20, 2016


CMU-CyLab-15-004:  Monitors and Blame Assignment for Higher-Order Session Types
Cross-Cutting Thrusts:  Formal Methods
Author(s):  Limin Jia, Hannah Gommerstadt, and Frank Pfenning
Publication Date:  November 6, 2015

CMU-CyLab-15-002:  Automated Verification of Safety Properties of Declarative Networking Programs
Author(s):  Chen Chen, Lay Kuan Loh, Limin Jia, Wenchao Zhou, Boon Thau Loo
Publication Date:  July 1, 2015

CMU-CyLab-15-001:  Influence in Classification via Cooperative Game Theory
Research Area(s):  Privacy Protection
Author(s):  Amit Datta, Anupam Datta, Ariel D. Procaccia and Yair Zick
Publication Date:  May 1, 2015