[go: up one dir, main page]

Follow
Scott Moore
Scott Moore
Galois, Inc.
Verified email at galois.com - Homepage
Title
Cited by
Cited by
Year
Exploring and enforcing security guarantees via program dependence graphs
A Johnson, L Waye, S Moore, S Chong
ACM SIGPLAN Notices 50 (6), 291-302, 2015
932015
Static analysis for efficient hybrid information-flow control
S Moore, S Chong
2011 IEEE 24th Computer Security Foundations Symposium, 146-160, 2011
782011
Declarative policies for capability control
C Dimoulas, S Moore, A Askarov, S Chong
2014 IEEE 27th Computer Security Foundations Symposium, 3-17, 2014
452014
Precise enforcement of progress-sensitive security
S Moore, A Askarov, S Chong
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
392012
{SHILL}: A Secure Shell Scripting Language
S Moore, C Dimoulas, D King, S Chong
11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014
382014
The 2010 Census confidentiality protections failed, here's how and why
JM Abowd, T Adams, R Ashmead, D Darais, S Dey, SL Garfinkel, ...
National Bureau of Economic Research, 2023
312023
Extensible access control with authorization contracts
S Moore, C Dimoulas, RB Findler, M Flatt, S Chong
ACM SIGPLAN Notices 51 (10), 214-233, 2016
282016
Bring Your Own Data Structures to Datalog
A Sahebolamri, L Barrett, S Moore, K Micinski
Proceedings of the ACM on Programming Languages, 1198–1223, 2023
232023
ActionScript bytecode verification with co-logic programming
BW DeVries, G Gupta, KW Hamlen, S Moore, M Sridhar
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009
182009
Cryptographic enforcement of language-based information erasure
A Askarov, S Moore, C Dimoulas, S Chong
2015 IEEE 28th Computer Security Foundations Symposium, 334-348, 2015
132015
Weird machines as insecure compilation
J Paykin, E Mertens, M Tullsen, L Maurer, B Razet, A Bakst, S Moore
arXiv preprint arXiv:1911.00157, 2019
82019
A simulated reconstruction and reidentification attack on the 2010 US Census
JM Abowd, T Adams, R Ashmead, D Darais, S Dey, S Garfinkel, ...
Harvard Data Science Review 7 (3), 2025
42025
Declaratively processing provenance metadata
S Moore, A Gehani
5th USENIX Workshop on the Theory and Practice of Provenance (TaPP 13), 2013
42013
Fine-grained, language-based access control for database-backed applications
E Zigmond, S Chong, C Dimoulas, S Moore
arXiv preprint arXiv:1909.12279, 2019
32019
Software Contracts for Security
SD Moore
22016
Knowledge and effect: A logic for reasoning about confidentiality and integrity guarantees
S Moore, A Askarov, S Chong
Workshop on Foundations of Computer Security, FCS 2015, 2015
22015
A Simulated Reconstruction and Reidentification Attack on the 2010 US Census: Full Technical Report
JM Abowd, T Adams, R Ashmead, D Darais, S Dey, SL Garfinkel, ...
Technical report, US Bureau of the Census, working paper CES-23-63, 2023
12023
PhatRaid, yo
A Johnson, D King, L Waye, S Moore
2014
Exploring and Enforcing Application Security Guarantees via Program Dependence Graphs
A Johnson, LR Waye, S Moore, S Chong
2014
Static Analysis for Efficient Hybrid Information-Flow Control
SN Chong, SD Moore
Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF …, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–20