Jeannette M. Wing

Professor of Computer Science
Head, Computer Science Department

wing@cs.cmu.edu

Research Interests

Software specification and verification, security, concurrent and distributed systems, programming languages, programming methodology.

Publications (complete list, page still under construction).

Selected Recent Publications

  • Security
  • Measuring A System's Attack Surface, Pratyusa Manadhata and Jeannette Wing, submitted to USENIX Security 2004, available as CMU-TR-04-102, January 2004.
  • Tools for Generating and Analyzing Attack Graphs, Oleg Sheyner and Jeannette Wing, to appear in Proceedings of Formal Methods for Components and Objects, Lecture Notes in Computer Science, 2005.
  • Measuring Relative Attack Surfaces, Michael Howard, Jon Pincus, and Jeannette Wing, Proceedings of Workshop on Advanced Developments in Software and Systems Security, available as CMU-TR-03-169, August 2003. .ps version.
  • Beyond the Horizon: A Call to Arms, Jeannette M. Wing, IEEE Security and Privacy. November/December 2003, pp. 62-67.
  • Verifiable Secret Redistribution for Archive Systems, Theodore M. Wong, Chenxi Wang, and Jeannette M. Wing, Proceedings of the First International Security in Storage Workshop, Maryland, December 2002. .ps version.
  • Game Strategies in Network Security, Kong-wei Lye and Jeannette Wing, accepted International Journal of Information Security, April 2003, under revision. Our shorter conference version, Proceedings of Foundations of Computer Security Workshop, July 26, 2002, Copenhagen, Denmark; our technical report CMU-CS-02-136, May 2002.
  • Verifiable Secret Redistribution for Threshold Sharing Schemes, Theodore M. Wong, Chenxi Wang, and Jeannette M. Wing. Earlier version available as CMU-CS-02-114 Technical Report, February 2002.
  • Minimization and Reliability Analyses of Attack Graphs, Somesh Jha, Oleg Sheyner, and Jeannette M. Wing. CMU-CS-02-109, February 2002. This is a detailed version of our paper in Proceedings of the Computer Security Foundations Workshop, Nova Scotia, June 2002, pp. 49-63.
  • Automated Generation and Analysis of Attack Graphs, Oleg Sheyner, Somesh Jha, and Jeannette M. Wing, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2002.
  • Survivability Analysis of Networked Systems, Somesh Jha and Jeannette M. Wing, Proceedings of the International Conference on Software Engineering, Toronto, May 2001. Earlier version available as CMU-CS-00-168, October 2000.
  • Composing Proofs of Security Protocols Using Isabelle/IOA, Oleg Sheyner and Jeannette M. Wing, Theorem Proving for Higher Order Logics Workshop, August 2000. Long version with proofs available as CMU-CS-00-106.
  • A Comparison and Combination of Theory Generation and Model Checking for Security Protocol Analysis, Nicholas J. Hopper, Sanjit A. Seshia, and Jeannette M. Wing, Workshop on Formal Methods and Security, July 2000.
  • Survivability Analysis of Network Specifications, Somesh Jha, Richard Linger, Tom Longstaff, and Jeannette Wing, Proceedings of the International Conference on Dependable Systems and Networks, Workshop on Dependability Despite Malicious Faults, New York City, NY, June 25-28, 2000.
  • Theory Generation for Security Protocols, Darrell Kindred and Jeannette M. Wing, July 1999. Work in progress.
  • Fast, Automatic Checking of Security Protocols, Darrell Kindred and Jeannette M. Wing, Proc. of the USENIX 1996 Workshop on Electronic Commerce, November 1996.
  • Distributed Systems, Fault Tolerance
  • A Nitpick Analysis of Mobile IPv6, Daniel Jackson, Yuchung Ng, and Jeannette Wing, Formal Aspects of Computing. Also available as CMU-CS-98-113, March 1998.
  • A Case Study in Model Checking Software Systems, Jeannette M. Wing and Mandana Vaziri-Farahani, Science of Computer Programming, vol. 28, 1997, pp. 273-299.
  • Avalon/C++, David L. Detlefs, Maurice P. Herlihy and Jeannette M. Wing, in Advanced Language Implementation: Recent Research at Carnegie Mellon University, P. Lee, editor, MIT Press, 1991.
  • The Avalon Language, Jeannette M. Wing et al., Part IV, Chapters 19-22, in Camelot and Avalon: A Distributed Transaction Facility, J. Eppinger, L. Mummert and A. Spector, editors, Morgan Kaufmann Publishers, Inc., 1991.
  • Subtyping, Interface Specifications
  • Respectful Type Converters, Jeannette M. Wing and John Ockerbloom, IEEE Transactions on Software Engineering, July 2000. Also CMU-CS-98-130.
  • Behavioral Subtyping Using Invariants and Constraints, Barbara H. Liskov and Jeannette M. Wing, Formal Methods for Distributed Processing: An Object Oriented Approach, H. Bowman and J. Derrick, editors, Cambridge University Press. Also CMU-CS-99-156, July 1999.
  • Respectful Type Converters For Mutable Types, Jeannette M. Wing and John Ockerbloom, Foundations of Component Based Systems, G. Leavens and M. Sitaraman, editors, Cambridge University Press. Also CMU-CS-99-142, June 1999.
  • Specification Matching Software Components, Amy Moormann Zaremski and Jeannette M. Wing, ACM Transactions on Software Engineering and Methodology, October 1997.
  • A Behavioral Notion of Subtyping, Barbara H. Liskov and Jeannette M. Wing, ACM Transactions on Programming Languages and Systems, November 1994.
  • Formal Methods (General)
  • Formal Methods: State of the Art and Future Directions, Edmund M. Clarke and Jeannette M. Wing, report by the Working Group on Formal Methods for the ACM Workshop on Strategic Directions in Computing Research, ACM Computing Surveys, vol. 28, no. 4, December 1996, pp. 626-643. Also CMU-CS-96-178.
  • Related talk: Formal Methods: Past, Present, and Future, Keynote Address at ASIAN'98, Manila, The Philippines, December 10, 1998; Distinguished Lecturer at DePaul University, October 2, 1998; Invited Speaker at the Fourth Software Reuse Symposium, August 19, 1998; Distinguished Lecturer at University of Washington, February 19, 1998.
  • A Symbiotic Relationship Between Formal Methods and Security, Jeannette M. Wing, Proceedings from Workshops on Computer Security, Fault Tolerance, and Software Assurance: From Needs to Solution, CMU-CS-98-188, December 1998.
  • Formal Methods (Education)
  • Mathematics in Computer Science Curricula (Abstract), Jeannette M. Wing, in Proceedings of the 6th International Conference, Mathematics of Program Construction 2002, Dagstuhl Castle, Germany, July 2002.
  • Weaving Formal Methods into the Undergraduate Computer Science Curriculum (Extended Abstract), Jeannette M. Wing, in Proceedings of the 8th International Conference on Algebraic Methodology and Software Technology (AMAST) 2000, pp. 2-7, May 2000. Slides of invited talk, for Education Day.
  • Hints to Specifiers, Jeannette M. Wing, in Teaching and Learning Formal Methods, Dean and Hinchey, editors, Academic Press, 1996, Chapter 5, pp. 57-77. Also available as CMU-CS-95-118R, May 1995.
  • Students

  • Arvind Kannan, INI masters student
  • Pratyusa Manadhata, CS doctoral student
  • Oleg Sheyner, CS doctoral student
  • Meera Sridhar, CS Fifth Year Scholar
  • Theodore Wong, CS doctoral student
  • Former Ph.D. Students
  • Research Projects

  • Specification and Verification Center: Specification and verification tools, languages, and methods for hardware and software systems. Co-PIs: Ed Clarke, David Garlan, Bruce Krogh, Reid Simmons. Sponsored by the Army Research Office (David Hislop, program manager), National Science Foundation, and NASA/Ames.
  • Carnegie Mellon CyLab
  • Software security and security metrics (new interests)
  • Secure networked systems: Attack graph generation and analysis
  • Secure storage systems: Protocols for verifiable secret redistribution
  • TOM Consortium: The TOM server automatically converts documents and files of one type to another. Great for reading e-mail attachments, creating web pages from powerpoint slides, excel spreadsheets, latex documents, etc.
  • Past Projects
  • Teaching

  • Spring 2004: 15-827 Secure Software Systems
  • Fall 2001: 17-654 Analysis of Software Artifacts
  • Spring 2002: 15-212 Principles of Programming
  • Fall 1998: 15-827 Security and Cryptography
  • Service

  • The National Academies: Computer Science and Telecommunications Board member.
  • Editorial Board member
  • Journal of the ACM
  • Formal Aspects of Computing (North American Editor)
  • Formal Methods in System Design
  • Software Tools for Technology Transfer
  • Conference organization
  • UW-MSR-CMU Software Security Summer Institute, Skamania Lodge, WA, June 15-18, 2003, Institute co-chair.
  • FM'99 World Congress in Formal Methods, Toulouse, France, September 20-24, 1999, Technical Symposium co-chair (with Jim Woodcock).
  • Past Administrative Duties

  • Associate Dean for Academic Affairs, School of Computer Science.
  • Associate Department Head for the Ph.D. Program, Computer Science Department.
  • SCS Ph.D. Programs. A summary table of all our programs' requirements and transfer policies..
  • SCS Graduate Student Statistics.
  • My annual Emigration Course talk "Tips on the Job Interview Process" (pdf, html)
  • For More Information

  • See my plan file for information on how to contact me via postal mail, e-mail, phone, fax, or my secretary.
  • Full cv (.pdf, .ps).
  • Biographical sketch: long and short.
  • They call me Dragon Lady!
  • See the CMU School of Computer Science "front door" for more information about research, educational, and social activities here.