Scott Moore
Scott Moore
Galois, Inc.
Verified email at - Homepage
Cited by
Cited by
Static analysis for efficient hybrid information-flow control
S Moore, S Chong
2011 IEEE 24th Computer Security Foundations Symposium, 146-160, 2011
Exploring and enforcing security guarantees via program dependence graphs
A Johnson, L Waye, S Moore, S Chong
ACM SIGPLAN Notices 50 (6), 291-302, 2015
Declarative policies for capability control
C Dimoulas, S Moore, A Askarov, S Chong
2014 IEEE 27th Computer Security Foundations Symposium, 3-17, 2014
Precise enforcement of progress-sensitive security
S Moore, A Askarov, S Chong
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
{SHILL}: A Secure Shell Scripting Language
S Moore, C Dimoulas, D King, S Chong
11th {USENIX} Symposium on Operating Systems Design and Implementation …, 2014
ActionScript bytecode verification with co-logic programming
BW DeVries, G Gupta, KW Hamlen, S Moore, M Sridhar
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009
Extensible access control with authorization contracts
S Moore, C Dimoulas, RB Findler, M Flatt, S Chong
ACM SIGPLAN Notices 51 (10), 214-233, 2016
Cryptographic enforcement of language-based information erasure
A Askarov, S Moore, C Dimoulas, S Chong
2015 IEEE 28th Computer Security Foundations Symposium, 334-348, 2015
Declaratively Processing Provenance Metadata.
S Moore, A Gehani, N Shankar
TaPP, 2013
Software Contracts for Security
SD Moore
Weird machines as insecure compilation
J Paykin, E Mertens, M Tullsen, L Maurer, B Razet, A Bakst, S Moore
arXiv preprint arXiv:1911.00157, 2019
Fine-grained, language-based access control for database-backed applications
E Zigmond, S Chong, C Dimoulas, S Moore
arXiv preprint arXiv:1909.12279, 2019
Knowledge and effect: A logic for reasoning about confidentiality and integrity guarantees
S Moore, S Harvard, A Askarov, S Chong
Workshop on Foundations of Computer Security (FCS 2015), 242, 2015
PhatRaid, yo
A Johnson, D King, L Waye, S Moore
Exploring and Enforcing Application Security Guarantees via Program Dependence Graphs
A Johnson, LR Waye, S Moore, SN Chong
Static Analysis for Efficient
S Moore, S Chong
Version 10.1109/CSF. 2011.17, 2011
List of External Reviewers CSF 2021 (all submission cycles)
C Abate, AA de Amorim, T Antonopoulos, C Badertscher, G Battiston, ...
Regret: Moving Towards a Descriptive Game Theory
S Moore
The system can't perform the operation now. Try again later.
Articles 1–18