Follow
Scott Moore
Scott Moore
Galois, Inc.
Verified email at galois.com - Homepage
Title
Cited by
Cited by
Year
Static analysis for efficient hybrid information-flow control
S Moore, S Chong
2011 IEEE 24th Computer Security Foundations Symposium, 146-160, 2011
762011
Exploring and enforcing security guarantees via program dependence graphs
A Johnson, L Waye, S Moore, S Chong
ACM SIGPLAN Notices 50 (6), 291-302, 2015
732015
Declarative policies for capability control
C Dimoulas, S Moore, A Askarov, S Chong
2014 IEEE 27th Computer Security Foundations Symposium, 3-17, 2014
402014
Precise enforcement of progress-sensitive security
S Moore, A Askarov, S Chong
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
382012
{SHILL}: A Secure Shell Scripting Language
S Moore, C Dimoulas, D King, S Chong
11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014
322014
Extensible access control with authorization contracts
S Moore, C Dimoulas, RB Findler, M Flatt, S Chong
ACM SIGPLAN Notices 51 (10), 214-233, 2016
212016
ActionScript bytecode verification with co-logic programming
BW DeVries, G Gupta, KW Hamlen, S Moore, M Sridhar
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009
172009
Cryptographic enforcement of language-based information erasure
A Askarov, S Moore, C Dimoulas, S Chong
2015 IEEE 28th Computer Security Foundations Symposium, 334-348, 2015
132015
Weird machines as insecure compilation
J Paykin, E Mertens, M Tullsen, L Maurer, B Razet, A Bakst, S Moore
arXiv preprint arXiv:1911.00157, 2019
42019
Bring Your Own Data Structures to Datalog
A Sahebolamri, L Barrett, S Moore, K Micinski
Proceedings of the ACM on Programming Languages, 1198–1223, 2023
32023
Declaratively processing provenance metadata
S Moore, A Gehani
5th USENIX Workshop on the Theory and Practice of Provenance (TaPP 13), 2013
32013
The 2010 Census Confidentiality Protections Failed, Here's How and Why
JM Abowd, T Adams, R Ashmead, D Darais, S Dey, SL Garfinkel, ...
National Bureau of Economic Research, 2023
22023
Fine-grained, language-based access control for database-backed applications
E Zigmond, S Chong, C Dimoulas, S Moore
arXiv preprint arXiv:1909.12279, 2019
22019
Software Contracts for Security
SD Moore
22016
Knowledge and effect: A logic for reasoning about confidentiality and integrity guarantees
S Moore, A Askarov, S Chong
Workshop on Foundations of Computer Security (FCS 2015), 242, 2015
22015
Mammakarzinom–komplementäre Praxis
S Wey
Erfahrungsheilkunde 66 (05), 302-314, 2017
12017
PhatRaid, yo
A Johnson, D King, L Waye, S Moore
2014
Exploring and Enforcing Application Security Guarantees via Program Dependence Graphs
A Johnson, LR Waye, S Moore, SN Chong
2014
Static Analysis for Efficient
S Moore, S Chong
Version 10.1109/CSF. 2011.17, 2011
2011
List of External Reviewers CSF 2021 (all submission cycles)
C Abate, AA de Amorim, T Antonopoulos, C Badertscher, G Battiston, ...
The system can't perform the operation now. Try again later.
Articles 1–20