Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2022
Yoneda Hacking: The Algebra of Attacker Actions
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 6, Issue 3Article No.: 25, Pages 1–27https://doi.org/10.1145/3531063Our work focuses on modeling the security of systems from their component-level designs. Towards this goal, we develop a categorical formalism to model attacker actions. Equipping the categorical formalism with algebras produces two interesting results ...
- research-articleSeptember 2010
Reason isomorphically!
WGP '10: Proceedings of the 6th ACM SIGPLAN workshop on Generic programmingPages 85–96https://doi.org/10.1145/1863495.1863507When are two types the same? In this paper we argue that isomorphism is a more useful notion than equality. We explain a succinct and elegant approach to establishing isomorphisms, with our focus on showing their existence over deriving the witnesses. ...