1. Kirill Kononenko. A unified approach to identifying and healing vulnerabilities in x86 machine code. In Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, Mobicom '12, pages 397--398, New York, USA, ACM.
2. Kirill Kononenko. Libjit linear scan: a model for fast and efficient compilation. In International Review on Modeling and Simulations, October 2010, Vol. 3 N.5.
3. Kirill Kononenko. Fast Compilation in O(n). In Proceedings of the 2010 International Conference on Theoretical and Mathematical Foundations of Computer Science, pages 51--56, Orlando, Florida.
4. Jean-Baptiste Jeannin, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg, and Nikhil Swamy. 2013. DKAL*: constructing executable specifications of authorization protocols. In Proceedings of the 5th international conference on Engineering Secure Software and Systems (ESSoS'13), Jan Jürjens, Benjamin Livshits, and Riccardo Scandariato (Eds.). Springer-Verlag, Berlin, Heidelberg, 139--154.
5. Amittai Aviram, Shu-Chun Weng, Sen Hu, and Bryan Ford. 2012. Efficient system-enforced deterministic parallelism. Commun. ACM, 55(5):111--119.