Exploring and enforcing security guarantees via program dependence graphs A Johnson, L Waye, S Moore, S Chong ACM SIGPLAN Notices 50 (6), 291-302, 2015 | 81 | 2015 |
Static analysis for efficient hybrid information-flow control S Moore, S Chong 2011 IEEE 24th Computer Security Foundations Symposium, 146-160, 2011 | 76 | 2011 |
Declarative policies for capability control C Dimoulas, S Moore, A Askarov, S Chong 2014 IEEE 27th Computer Security Foundations Symposium, 3-17, 2014 | 42 | 2014 |
Precise enforcement of progress-sensitive security S Moore, A Askarov, S Chong Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 38 | 2012 |
{SHILL}: A Secure Shell Scripting Language S Moore, C Dimoulas, D King, S Chong 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014 | 34 | 2014 |
Extensible access control with authorization contracts S Moore, C Dimoulas, RB Findler, M Flatt, S Chong ACM SIGPLAN Notices 51 (10), 214-233, 2016 | 22 | 2016 |
ActionScript bytecode verification with co-logic programming BW DeVries, G Gupta, KW Hamlen, S Moore, M Sridhar Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009 | 17 | 2009 |
Cryptographic enforcement of language-based information erasure A Askarov, S Moore, C Dimoulas, S Chong 2015 IEEE 28th Computer Security Foundations Symposium, 334-348, 2015 | 12 | 2015 |
The 2010 Census Confidentiality Protections Failed, Here's How and Why JM Abowd, T Adams, R Ashmead, D Darais, S Dey, SL Garfinkel, ... National Bureau of Economic Research, 2023 | 8 | 2023 |
Weird machines as insecure compilation J Paykin, E Mertens, M Tullsen, L Maurer, B Razet, A Bakst, S Moore arXiv preprint arXiv:1911.00157, 2019 | 6 | 2019 |
Bring Your Own Data Structures to Datalog A Sahebolamri, L Barrett, S Moore, K Micinski Proceedings of the ACM on Programming Languages, 1198–1223, 2023 | 5 | 2023 |
Declaratively processing provenance metadata S Moore, A Gehani 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP 13), 2013 | 3 | 2013 |
Software Contracts for Security SD Moore | 2 | 2016 |
Knowledge and effect: A logic for reasoning about confidentiality and integrity guarantees S Moore, A Askarov, S Chong Workshop on Foundations of Computer Security (FCS 2015), 242, 2015 | 2 | 2015 |
Fine-grained, language-based access control for database-backed applications E Zigmond, S Chong, C Dimoulas, S Moore arXiv preprint arXiv:1909.12279, 2019 | 1 | 2019 |
PhatRaid, yo A Johnson, D King, L Waye, S Moore | | 2014 |
Exploring and Enforcing Application Security Guarantees via Program Dependence Graphs A Johnson, LR Waye, S Moore, SN Chong | | 2014 |
Static Analysis for Efficient S Moore, S Chong Version 10.1109/CSF. 2011.17, 2011 | | 2011 |
List of External Reviewers CSF 2021 (all submission cycles) C Abate, AA de Amorim, T Antonopoulos, C Badertscher, G Battiston, ... | | |
Regret: Moving Towards a Descriptive Game Theory S Moore | | |