Civitas: Toward a secure voting system MR Clarkson, S Chong, AC Myers 2008 IEEE Symposium on Security and Privacy (sp 2008), 354-368, 2008 | 588 | 2008 |
Secure web applications via automatic partitioning S Chong, J Liu, AC Myers, X Qi, K Vikram, L Zheng, X Zheng ACM SIGOPS Operating Systems Review 41 (6), 31-44, 2007 | 358 | 2007 |
Jif: Java information flow AC Myers, L Zheng, S Zdancewic, S Chong, N Nystrom Software release. Located at http://www. cs. cornell. edu/jif 2005, 2001 | 318 | 2001 |
Asynchronous functional reactive programming for GUIs E Czaplicki, S Chong 34th ACM SIGPLAN Conference on Programming Language Design and …, 2013 | 308 | 2013 |
SIF: Enforcing Confidentiality and Integrity in Web Applications. S Chong, K Vikram, AC Myers USENIX Security Symposium, 1-16, 2007 | 245 | 2007 |
Security policies for downgrading S Chong, AC Myers Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 195 | 2004 |
Scalable extensibility via nested inheritance N Nystrom, S Chong, AC Myers Proceedings of the 19th annual ACM SIGPLAN conference on Object-oriented …, 2004 | 171 | 2004 |
Provenance: a future history J Cheney, S Chong, N Foster, M Seltzer, S Vansummeren Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented …, 2009 | 159 | 2009 |
Using replication and partitioning to build secure distributed systems L Zheng, S Chong, AC Myers, S Zdancewic Security and Privacy, 2003. Proceedings. 2003 Symposium on, 236-250, 2003 | 157 | 2003 |
Information-flow security for interactive programs KR O'Neill, MR Clarkson, S Chong 19th IEEE Computer Security Foundations Workshop (CSFW'06), 12 pp.-201, 2006 | 124 | 2006 |
Truthful mechanisms for agents that value privacy Y Chen, S Chong, IA Kash, T Moran, S Vadhan ACM Transactions on Economics and Computation (TEAC) 4 (3), 1-30, 2016 | 118 | 2016 |
Jif: Java information flow. Software release AC Myers, L Zheng, S Zdancewic, S Chong, N Nystrom | 98 | 2001 |
Towards fully automatic placement of security sanitizers and declassifiers B Livshits, S Chong Proceedings of the 40th ACM SIGPLAN-SIGACT Symposium on Principles of …, 2013 | 96 | 2013 |
Language-based information erasure S Chong, AC Myers 18th IEEE Computer Security Foundations Workshop (CSFW'05), 241-254, 2005 | 93 | 2005 |
Precise, dynamic information flow for database-backed applications J Yang, T Hance, TH Austin, A Solar-Lezama, C Flanagan, S Chong ACM Sigplan Notices 51 (6), 631-647, 2016 | 87 | 2016 |
Decentralized robustness S Chong, AC Myers 19th IEEE Computer Security Foundations Workshop (CSFW'06), 12 pp.-256, 2006 | 81 | 2006 |
Exploring and enforcing security guarantees via program dependence graphs A Johnson, L Waye, S Moore, S Chong ACM SIGPLAN Notices 50 (6), 291-302, 2015 | 79 | 2015 |
Static analysis for efficient hybrid information-flow control S Moore, S Chong 2011 IEEE 24th Computer Security Foundations Symposium, 146-160, 2011 | 76 | 2011 |
End-to-end enforcement of erasure and declassification S Chong, AC Myers 2008 21st IEEE Computer Security Foundations Symposium, 98-111, 2008 | 76 | 2008 |
Learning is change in knowledge: Knowledge-based security for dynamic policies A Askarov, S Chong 2012 IEEE 25th Computer Security Foundations Symposium, 308-322, 2012 | 72 | 2012 |