overview

I am interesting in identification of software vulnerabilities, using formal methods to create software with security properties, and computer security/computer science education.

education and training
selected publications
Academic Articles29
  • Fagin, B. S., & Carlisle, M. C. (2018). The IRONSIDES Project: Final Report.. Ada User Journal. 39(3), 197-202.
  • Carlisle, M. C. (2011). Why i came back to Ada. ACM SIGAda Ada Letters. 31(3), 37-38.
    doi badge online source badge
  • Carlisle, M. C. (2009). Raptor: A Visual Programming Environment for Teaching Object-Oriented Programming. J. Comput. Sci. Coll.. 275281-275281.
  • Carlisle, M. C., & Baird III, L. C. (2007). Timing neural networks in C and ada. ACM SIGAda Ada Letters. XXVII(3), 71-74.
    doi badge online source badge
  • Carlisle, M. C. (2006). Automatic OO parser generation using visitors for Ada 2005. ACM SIGAda Ada Letters. XXVI(3), 3-8.
    doi badge online source badge
Chapters2
  • Fagin, B., & Carlisle, M. (2013). Provably Secure DNS: A Case Study in Reliable Software. ALGORITHMS AND DATA STRUCTURES, PROCEEDINGS. Reliable Software Technologies Ada-Europe 2013. 81-93. Springer Berlin Heidelberg.
    doi badge
  • Carlisle, M. C., & Rogers, A. (2001). Supporting Dynamic Data Structures with Olden. ALGORITHMS AND DATA STRUCTURES, PROCEEDINGS. Pande, S., & Agrawal, D. P. (Eds.), Compiler Optimizations for Scalable Parallel Systems. 709-749. Springer Berlin Heidelberg.
    doi badge
Conference Papers32
  • Jones, L., Christman, D., Banescu, S., & Carlisle, M. (2018). ByteWise: A case study in neural network obfuscation identification. 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC). 155-164.
    doi badge
  • Fagin, B. S., Klanderman, B., & Carlisle, M. C. (2017). Making DNS Servers Resistant to Cyber Attacks: An Empirical Study on Formal Methods and Performance. 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). 02, 566-571.
    doi badge
  • Jones, L., Sellers, A., & Carlisle, M. (2016). CARDINAL: similarity analysis to defeat malware compiler variations. 2016 11th International Conference on Malicious and Unwanted Software (MALWARE), 2016 11th International Conference on Malicious and Unwanted Software (MALWARE). 1-8.
    doi badge
  • Jones, L., Sellers, A., & Carlisle, M. (2016). CARDINAL: Similarity Analysis to Defeat Malware Compiler Variations. 2016 11TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE). 39-46.
  • Adkins, F., Jones, L., Carlisle, M., & Upchurch, J. (2013). Heuristic malware detection via basic block comparison. 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE), 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE). 11-18.
    doi badge
open teaching materials
  • open access badge
open teaching materials
  • open access badge
Email
carlislem@tamu.edu
First Name
Martin
Last Name
Carlisle