-
Secure synthesis of distributed cryptographic applications
Provably secure and correct compilation to cryptographic mechanisms
IEEE Computer Security Foundations Symp. (CSF),
July 2024.
Coşku Acay, Joshua Gancher, Rolph Recto, and Andrew C. Myers.
[ ×@inproceedings{viaduct-formal,
title="Secure synthesis of distributed cryptographic applications",
author="Coşku Acay and Joshua Gancher and Rolph Recto and Andrew C. Myers",
booktitle="IEEE Computer Security Foundations Symp. (CSF)",
url="http://www.cs.cornell.edu/andru/papers/viaduct-formal",
month="July",
year="2024"} ]
-
Charlotte: reformulating blockchains into a web of composable attested data structures for cross-domain applications
A proto-blockchain for building and composing blockchain-like systems.
ACM Trans. on Computer Systems, 41(1–4):1–52,
December 2023.
Isaac Sheff, Xinwen Wang, Kushal Babel, Haobin Ni, Robbert van Renesse, and Andrew C. Myers.
[ ×@article{charlotte,
title="Charlotte: reformulating blockchains into a web of composable attested data structures for cross-domain applications",
author="Isaac Sheff and Xinwen Wang and Kushal Babel and Haobin Ni
and Robbert van Renesse and Andrew C. Myers",
journal="ACM Trans. on Computer Systems",
volume="41",
number="1–4",
url="http://www.cs.cornell.edu/andru/papers/charlotte",
pages="1–52",
month="December",
year="2023"} ]
-
SpecVerilog: Adapting information flow control for secure speculation
Enforcing secure speculation in Verilog code via information flow
30th ACM Conf. on Computer and Communications Security (CCS),
November 2023.
Distinguished paper award.
Drew Zagieboylo, Charles Sherk, Andrew C. Myers, and G. Edward Suh.
[ ×@inproceedings{specverilog,
title="SpecVerilog: Adapting information flow control for secure speculation",
author="Drew Zagieboylo and Charles Sherk and Andrew C. Myers and
G. Edward Suh",
booktitle="30th ACM Conf. on Computer and Communications Security (CCS)",
url="http://www.cs.cornell.edu/andru/papers/specverilog",
month="November",
note="Distinguished paper award.",
year="2023"} ]
-
An array intermediate language for mixed cryptography
Workshop on Foundations of Computer Security,
July 2023.
Vivian Ding, Coşku Acay, and Andrew C. Myers.
[ ×@misc{fcs23,
title="An array intermediate language for mixed cryptography",
author="Vivian Ding and Coşku Acay and Andrew C. Myers",
url="https://squera.github.io/fcs-pdf/dingFCS2023.pdf",
month="July",
year="2023"} ]
-
Compilers for secure computation
Ph.D. dissertation, Cornell University,
2023.
Rolph Recto.
[ ×@phdthesis{recto-thesis,
title="Compilers for secure computation",
author="Rolph Recto",
url="http://www.cs.cornell.edu/andru/papers/recto-dissertation.pdf",
year="2023"} ]
-
Provably correct compilation for distributed cryptographic applications
Ph.D. dissertation, Cornell University,
2023.
Coşku Acay.
[ ×@phdthesis{acay-thesis,
title="Provably correct compilation for distributed cryptographic applications",
author="Coşku Acay",
url="http://www.cs.cornell.edu/andru/papers/acay-thesis.pdf",
year="2023"} ]
-
Language-based techniques for building timing channel secure
hardware–software systems
Ph.D. dissertation, Cornell University,
2023.
Drew Zagieboylo.
[ ×@phdthesis{dzag-thesis,
title="Language-based techniques for building timing channel secure
hardware–software systems",
author="Drew Zagieboylo",
url="https://www.cs.cornell.edu/ dzag/assets/thesis.pdl",
year="2023"} ]
-
Expressing information flow properties
A survey of research on information-flow properties
Foundations and Trends in Privacy and Security, 3(1):1–102,
2022.
Eliza Kozyri, Stephen Chong, and Andrew C. Myers.
[ ×@article{iflow-properties,
title="Expressing information flow properties",
author="Eliza Kozyri and Stephen Chong and Andrew C. Myers",
journal="Foundations and Trends in Privacy and Security",
volume="3",
number="1",
url="http://www.cs.cornell.edu/andru/papers/now-info-flow/now-info-flow.pdf",
pages="1–102",
year="2022"} ]
-
Mechanisms for provable integrity protection in decentralized systems
Ph.D. dissertation, Cornell University,
August 2021.
Ethan Cecchetti.
[ ×@phdthesis{cecchetti-thesis,
title="Mechanisms for provable integrity protection in decentralized systems",
author="Ethan Cecchetti",
url="https://www.cs.cornell.edu/&etilde;than/papers/EthanCecchettiDissertation.pdf",
month="August",
year="2021"} ]
-
Information flow, from crypto to blockchain
Workshop on Foundations of Computer Security,
June 2021.
Keynote talk.
Andrew C. Myers.
[ ×@misc{fcs21-talk,
title="Information flow, from crypto to blockchain",
author="Andrew C. Myers",
month="June",
note="Keynote talk.",
year="2021"} ]
-
Viaduct: an extensible, optimizing compiler for secure distributed programs
Automatically synthesizing cryptography from information flow specifications
42nd ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
pp. 740–755,
June 2021.
Coşku Acay, Rolph Recto, Joshua Gancher, Andrew Myers, and Elaine Shi.
[ ×@inproceedings{viaduct-pldi21,
title="Viaduct: an extensible, optimizing compiler for secure distributed programs",
author="Coşku Acay and Rolph Recto and Joshua Gancher and Andrew Myers and Elaine Shi",
booktitle="42nd ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/viaduct/",
pages="740–755",
month="June",
year="2021"} ]
-
Compositional security for reentrant applications
Extending information flow control to provably handle reentrancy
IEEE Symp. on Security and Privacy,
May 2021.
Best paper award.
Ethan Cecchetti, Siqiu Yao, Haobin Ni, and Andrew C. Myers.
[ ×@inproceedings{serif21,
title="Compositional security for reentrant applications",
author="Ethan Cecchetti and Siqiu Yao and Haobin Ni and Andrew C. Myers",
booktitle="IEEE Symp. on Security and Privacy",
url="http://www.cs.cornell.edu/andru/papers/oakland21",
month="May",
note="Best paper award.",
year="2021"} ]
-
No title
Reentrancy should be viewed through the lens of information flow
Don't know how to expand parameterless macro howpublishedunknown,
2021.
.
[ ×@unknown{cync21,
title="No title",
author="Don't know how to expand parameterless macro bibtexAuthors",
url="http://www.cs.cornell.edu/andru/papers/oakland21",
year="2021"} ]
-
Heterogeneous Paxos
A consensus algorithm heterogeneous on all three dimensions, like many blockchains.
OPODIS,
December 2020.
Isaac Sheff, Xinwen Wang, Robbert van Renesse, and Andrew C. Myers.
[ ×@inproceedings{hetpaxos,
title="Heterogeneous Paxos",
author="Isaac Sheff and Xinwen Wang and Robbert van Renesse and Andrew C. Myers",
booktitle="OPODIS",
url="http://www.cs.cornell.edu/andru/papers/hetcons",
month="December",
year="2020"} ]
-
Trust, authority, and information flow in secure distributed systems
Ph.D. dissertation, Cornell University,
October 2020.
Michael D. George.
[ ×@phdthesis{mdg-thesis,
title="Trust, authority, and information flow in secure distributed systems",
author="Michael D. George",
url="http://www.cs.cornell.edu/andru/papers/mdg-thesis.pdf",
month="October",
year="2020"} ]
-
Stealthy tracking of autonomous vehicles with cache side channels
Cache side channels reveal where vehicles are driving.
29th USENIX Security Symp.,
August 2020.
Mulong Luo, G. Edward Suh, and Andrew C. Myers.
[ ×@inproceedings{tracking-vehicles-cache,
title="Stealthy tracking of autonomous vehicles with cache side channels",
author="Mulong Luo and G. Edward Suh and Andrew C. Myers",
booktitle="29th USENIX Security Symp.",
url="http://www.cs.cornell.edu/andru/papers/stealthy-tracking",
month="August",
year="2020"} ]
-
Securing smart contracts with information flow
Information-flow control provides compositional security for smart contracts.
3rd Int'l Symp. on Foundations and Applications of Blockchain (FAB),
April 2020.
Ethan Cecchetti, Siqiu Yao, Haobin Ni, and Andrew C. Myers.
[ ×@inproceedings{cecchetti-fab20,
title="Securing smart contracts with information flow",
author="Ethan Cecchetti and Siqiu Yao and Haobin Ni and Andrew C. Myers",
booktitle="3rd Int'l Symp. on Foundations and Applications of Blockchain (FAB)",
url="http://www.cs.cornell.edu/andru/papers/fab20",
month="April",
year="2020"} ]
-
Path planning under malicious injections and removals of perceived
obstacles: a probabilistic programming approach
Robots plan paths with both random and adversarial uncertainty.
IEEE Robotics and Automation Letters (RA-L),
2020.
Jacopo Banfi, Yizhou Zhang, G. Edward Suh, Andrew C. Myers, and Mark Campbell.
[ ×@article{bzsmc20,
title="Path planning under malicious injections and removals of perceived
obstacles: a probabilistic programming approach",
author="Jacopo Banfi and Yizhou Zhang and G. Edward Suh and Andrew C. Myers and
Mark Campbell",
journal="IEEE Robotics and Automation Letters (RA-L)",
url="https://ieeexplore.ieee.org/document/9184965",
year="2020"} ]
-
Using information flow to design an ISA that controls timing channels
Designing an instruction set for secure, timing-sensitive information flow.
32nd IEEE Computer Security Foundations Symp. (CSF),
June 2019.
Drew Zagieboylo, G. Edward Suh, and Andrew C. Myers.
[ ×@inproceedings{zsm19,
title="Using information flow to design an ISA that controls timing channels",
author="Drew Zagieboylo and G. Edward Suh and Andrew C. Myers",
booktitle="32nd IEEE Computer Security Foundations Symp. (CSF)",
url="http://www.cs.cornell.edu/andru/papers/hyperisa",
month="June",
year="2019"} ]
-
Hyperflow: A processor architecture for nonmalleable, timing-safe information-flow security
Information flow helps design a secure processor that controls timing channels
25th ACM Conf. on Computer and Communications Security (CCS),
October 2018.
Andrew Ferraiuolo, Mark Zhao, Andrew C. Myers, and G. Edward Suh.
[ ×@inproceedings{hyperflow,
title="Hyperflow: A processor architecture for nonmalleable, timing-safe information-flow security",
author="Andrew Ferraiuolo and Mark Zhao and Andrew C. Myers and Suh, G. Edward",
booktitle="25th ACM Conf. on Computer and Communications Security (CCS)",
url="http://www.cs.cornell.edu/andru/papers/hyperflow",
month="October",
year="2018"} ]
-
Secure autonomous cyber-physical systems through verifiable information flow control
Software and hardware codesign to improve assurance of cyberphysical systems
ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC),
October 2018.
Jed Liu, Joe Corbett-Davies, Andrew Ferraiuolo, Alexander Ivanov, Mulong Luo, G. Edward Suh, Andrew C. Myers, and Mark Campbell.
[ ×@inproceedings{cpsspc18,
title="Secure autonomous cyber-physical systems through verifiable information flow control",
author="Jed Liu and Joe Corbett-Davies and Andrew Ferraiuolo and Alexander Ivanov and Mulong Luo and G. Edward Suh and Andrew C. Myers and Mark Campbell",
booktitle="ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC)",
url="http://www.cs.cornell.edu/andru/papers/cpsspc18",
month="October",
year="2018"} ]
-
Designing hardware to be free of covert channels by construction
ACM Workshop on Formal Methods in Security,
June 2018.
Invited talk.
Andrew C. Myers.
[ ×@misc{fms18-talk,
title="Designing hardware to be free of covert channels by construction",
author="Andrew C. Myers",
url="http://www.cs.cornell.edu/andru/papers/18jun-fms/18jun-fms-myers.pdf",
pages="315–316",
month="June",
note="Invited talk.",
year="2018"} ]
-
Nonmalleable information flow control
A type system enforcing a dual hyperproperty that constrains the use of endorsement
24th ACM Conf. on Computer and Communications Security (CCS),
pp. 1875–1891,
October 2017.
Ethan Cecchetti, Andrew C. Myers, and Owen Arden.
[ ×@inproceedings{nmifc,
title="Nonmalleable information flow control",
author="Ethan Cecchetti and Andrew C. Myers and Owen Arden",
booktitle="24th ACM Conf. on Computer and Communications Security (CCS)",
url="http://www.cs.cornell.edu/andru/papers/nmifc",
pages="1875–1891",
month="October",
year="2017"}| TR ]
-
Nonmalleable information flow control: technical report
A type system enforcing a dual hyperproperty that constrains the use of endorsement
Technical report arXiv:1708.08596, Cornell University Computing and Information Science,
August 2017.
Ethan Cecchetti, Andrew C. Myers, and Owen Arden.
[ ×@techreport{nmifc-tr,
title="Nonmalleable information flow control: technical report",
author="Ethan Cecchetti and Andrew C. Myers and Owen Arden",
institution="Cornell University Computing and Information Science",
number="arXiv:1708.08596",
url="https://arxiv.org/abs/1708.08596",
month="August",
year="2017"} ]
-
Secure information flow verification with mutable dependent types
Fully compile-time enforcement of dependent labels in a security-typed HDL
54th Design Automation Conference (DAC),
June 2017.
Andrew Ferraiuolo, Weizhe Hua, Andrew C. Myers, and G. Edward Suh.
[ ×@inproceedings{FHMS17,
title="Secure information flow verification with mutable dependent types",
author="Andrew Ferraiuolo and Weizhe Hua and Andrew C. Myers and G. Edward Suh",
booktitle="54th Design Automation Conference (DAC)",
url="https://people.ece.cornell.edu/af433/pdf/ferraiuolo-dac-17.pdf",
month="June",
year="2017"} ]
-
Fabric: Building open distributed systems securely by construction
A secure, decentralized, distributed programming system
based on information flow control
J. Computer Security, 25(4–5):319–321,
May 2017.
Jed Liu, Owen Arden, Michael D. George, and Andrew C. Myers.
[ ×@article{jfabric,
title="Fabric: Building open distributed systems securely by construction",
author="Jed Liu and Owen Arden and Michael D. George and Andrew C. Myers",
journal="J. Computer Security",
volume="25",
number="4–5",
url="http://www.cs.cornell.edu/andru/papers/jfabric",
pages="319–321",
month="May",
year="2017"} ]
-
Full-processor timing channel protection with applications to secure hardware compartments
Technical report 1813–41218, Cornell University Computing and Information Science,
April 2017.
Andrew Ferraiuolo, Yao Wang, Rui Xu, Danfeng Zhang, Andrew C. Myers, and Edward Suh.
[ ×@techreport{timing-compartments-tr,
title="Full-processor timing channel protection with applications to secure hardware compartments",
author="Andrew Ferraiuolo and Yao Wang and Rui Xu and Danfeng Zhang and Andrew C. Myers and Edward Suh",
institution="Cornell University Computing and Information Science",
number="1813–41218",
url="http://hdl.handle.net/1813/41218",
month="April",
year="2017"} ]
-
Verification of a practical hardware security architecture through static information flow analysis
Verifying information flow in an implementation of the TrustZone architecture
Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS),
April 2017.
Andrew Ferraiuolo, Rui Xu, Danfeng Zhang, Andrew C. Myers, and G. Edward Suh.
[ ×@inproceedings{trustzone-secverilog,
title="Verification of a practical hardware security architecture through static information flow analysis",
author="Andrew Ferraiuolo and Rui Xu and Danfeng Zhang and Andrew C. Myers and
G. Edward Suh",
booktitle="Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS)",
url="http://www.cs.cornell.edu/andru/papers/trustzone",
month="April",
year="2017"}
| SecVerilogproject| TR ]
-
Safe serializable secure scheduling: transactions and the trade-off between security and consistency
A side channel created by an intrinsic conflict between consistency and security, and a fix
23rd ACM Conf. on Computer and Communications Security (CCS),
pp. 229–241,
October 2016.
Isaac Sheff, Tom Magrino, Jed Liu, Andrew C. Myers, and Robbert Van Renesse.
[ ×@inproceedings{abrtchan,
title="Safe serializable secure scheduling: transactions and the trade-off between security and consistency",
author="Isaac Sheff and Tom Magrino and Jed Liu and Andrew C. Myers and Robbert Van Renesse",
booktitle="23rd ACM Conf. on Computer and Communications Security (CCS)",
url="http://www.cs.cornell.edu/andru/papers/abrtchan",
pages="229–241",
month="October",
year="2016"}
| Fabricproject ]
-
SecDCP: Secure dynamic cache partitioning for efficient timing channel protection
Timing channels can be prevented efficiently by
dynamically partitioning caches.
53rd Design Automation Conference (DAC),
pp. 74:1–74:6,
June 2016.
Yao Wang, Andrew Ferraiuolo, Danfeng Zhang, Andrew C. Myers, and G. Edward Suh.
[ ×@inproceedings{WFZMS16,
title="SecDCP: Secure dynamic cache partitioning for efficient timing channel protection",
author="Yao Wang and Andrew Ferraiuolo and Danfeng Zhang and Andrew C. Myers and G. Edward Suh",
booktitle="53rd Design Automation Conference (DAC)",
url="http://www.cs.cornell.edu/andru/papers/dac16",
pages="74:1–74:6",
month="June",
year="2016"} ]
-
A calculus for flow-limited authorization
A language that uses information flow to check the code of authorization mechanisms.
29th IEEE Computer Security Foundations Symp. (CSF),
pp. 135–147,
June 2016.
Owen Arden and Andrew C. Myers.
[ ×@inproceedings{flac,
title="A calculus for flow-limited authorization",
author="Owen Arden and Andrew C. Myers",
booktitle="29th IEEE Computer Security Foundations Symp. (CSF)",
url="http://www.cs.cornell.edu/andru/papers/flac",
pages="135–147",
month="June",
year="2016"}| TR ]
-
Lattice priority scheduling: low-overhead timing channel
protection for a shared memory controller
Using lattice policies to design a low-overhead memory controller that does not leak information via timing channels.
22nd IEEE Symp. on High Performance Computer Architecture (HPCA),
pp. 382–393,
March 2016.
Andrew Ferraiuolo, Yao Wang, Danfeng Zhang, Andrew C.
Myers, and G. Edward Suh.
[ ×@inproceedings{Ferraiuolo16,
title="Lattice priority scheduling: low-overhead timing channel
protection for a shared memory controller",
author="Andrew Ferraiuolo and Yao Wang and Danfeng Zhang and Andrew C.
Myers and Suh, G. Edward",
booktitle="22nd IEEE Symp. on High Performance Computer Architecture (HPCA)",
url="http://www.cs.cornell.edu/andru/papers/hpca16",
pages="382–393",
month="March",
year="2016"} ]
-
JRIF: reactive information flow control for Java
Specifying information flow policies with reactive information-flow automata
Technical report 1813–41194, Cornell University Computing and Information Science,
February 2016.
Elisavet Kozyri, Owen Arden, Andrew C. Myers, and Fred B. Schneider.
[ ×@techreport{jrif-tr,
title="JRIF: reactive information flow control for Java",
author="Kozyri, Elisavet and Arden, Owen and Myers, Andrew C. and Schneider, Fred B.",
institution="Cornell University Computing and Information Science",
number="1813–41194",
url="https://ecommons.cornell.edu/handle/1813/41194",
month="February",
year="2016"} ]
-
Flow-limited authorization
Ph.D. dissertation, Cornell University,
2016.
Owen Arden.
[ ×@phdthesis{owen-thesis,
title="Flow-limited authorization",
author="Owen Arden",
url="http://www.cs.cornell.edu/andru/papers/FLA_OwenArden.pdf",
year="2016"}
| Fabricproject ]
-
Sound and practical methods for full-system timing channel control
Ph.D. dissertation, Cornell University Department of Computer Science,
August 2015.
Danfeng Zhang.
[ ×@phdthesis{zhangdf-thesis,
title="Sound and practical methods for full-system timing channel control",
author="Danfeng Zhang",
url="http://www.cs.cornell.edu/andru/papers/zhangdf-thesis.pdf",
month="August",
year="2015"}
| SecVerilogproject ]
-
Building distributed systems with information flow control
Ph.D. dissertation, Cornell University Department of Computer Science,
August 2015.
K. Vikram.
[ ×@phdthesis{vikram-thesis,
title="Building distributed systems with information flow control",
author="K. Vikram",
url="http://www.cs.cornell.edu/andru/papers/kv-thesis.pdf",
month="August",
year="2015"}
| Fabricproject ]
-
Flow-limited authorization
An expressive logic for reasoning about the interaction between
authorization and information flow.
28th IEEE Computer Security Foundations Symp. (CSF),
pp. 569–583,
July 2015.
Owen Arden, Jed Liu, and Andrew C. Myers.
[ ×@inproceedings{flam,
title="Flow-limited authorization",
author="Owen Arden and Jed Liu and Andrew C. Myers",
booktitle="28th IEEE Computer Security Foundations Symp. (CSF)",
url="http://www.cs.cornell.edu/andru/papers/flam",
pages="569–583",
month="July",
year="2015"}| TR| slides ]
-
Flow-limited authorization: technical report
Technical report 1813–40138, Cornell University Computing and Information Science,
May 2015.
Owen Arden, Jed Liu, and Andrew C. Myers.
[ ×@techreport{flamtr,
title="Flow-limited authorization: technical report",
author="Owen Arden and Jed Liu and Andrew C. Myers",
institution="Cornell University Computing and Information Science",
number="1813–40138",
url="http://hdl.handle.net/1813/40138",
month="May",
year="2015"} ]
-
A hardware design language for timing-sensitive information-flow security
SecVerilog: a security-typed hardware design language for building hardware without leaks or timing channels.
Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS),
pp. 503–516,
March 2015.
Danfeng Zhang, Yao Wang, G. Edward Suh, and Andrew C. Myers.
[ ×@inproceedings{zwsm15,
title="A hardware design language for timing-sensitive information-flow security",
author="Danfeng Zhang and Yao Wang and G. Edward Suh and Andrew C. Myers",
booktitle="Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS)",
url="http://www.cs.cornell.edu/andru/papers/asplos15",
pages="503–516",
month="March",
year="2015"}
| SecVerilogproject| TR ]
-
A calculus for flow-limited authorization: technical report
Technical report 1813–42406, Cornell University Computing and Information Science,
February 2015.
Owen Arden and Andrew C. Myers.
[ ×@techreport{flac-tr,
title="A calculus for flow-limited authorization: technical report",
author="Owen Arden and Andrew C. Myers",
institution="Cornell University Computing and Information Science",
number="1813–42406",
url="http://hdl.handle.net/1813/42406",
month="February",
year="2015"} ]
-
Distributed protocols and heterogeneous trust: technical report
Technical report arXiv:1412.3136, Cornell University Computer and Information Science,
December 2014.
Isaac C. Sheff, Robbert van Renesse, and Andrew C. Myers.
[ ×@techreport{hetconstechreport,
title="Distributed protocols and heterogeneous trust: technical report",
author="Isaac C. Sheff and
Robbert van Renesse and
Andrew C. Myers",
institution="Cornell University Computer and Information Science",
volume="abs/1412.3136",
number=" arXiv:1412.3136",
url="http://arxiv.org/abs/1412.3136",
month="December",
year="2014"} ]
-
A language-based approach to secure quorum replication
Quorum replication with information flow control can simultaneously enforce all three core
security properties: confidentiality, integrity, and availability.
9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS),
August 2014.
Lantian Zheng and Andrew C. Myers.
[ ×@inproceedings{zm14-plas,
title="A language-based approach to secure quorum replication",
author="Lantian Zheng and Andrew C. Myers",
booktitle="9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS)",
url="http://www.cs.cornell.edu/andru/papers/plas14",
month="August",
year="2014"} ]
-
A hardware design language for efficient control of timing channels
Technical report http://hdl.handle.net/1813/36274, Cornell University Computing and Information Science,
April 2014.
Danfeng Zhang, Yao Wang, G. Edward Suh, and Andrew C. Myers.
[ ×@techreport{hwtiming14,
title="A hardware design language for efficient control of timing channels",
author="Danfeng Zhang and Yao Wang and G. Edward Suh and Andrew C. Myers",
institution="Cornell University Computing and Information Science",
number="http://hdl.handle.net/1813/36274",
url="http://hdl.handle.net/1813/36274",
month="April",
year="2014"} ]
-
Defining and enforcing referential security
New security properties related to referential integrity and persistence can be soundly enforced by a type system.
3rd Conf. on Principles of Security and Trust (POST),
pp. 199–219,
April 2014.
Jed Liu and Andrew C. Myers.
[ ×@inproceedings{persist,
title="Defining and enforcing referential security",
author="Liu, Jed and Myers, Andrew C.",
booktitle="3rd Conf. on Principles of Security and Trust (POST)",
url="http://www.cs.cornell.edu/andru/papers/persist",
pages="199–219",
month="April",
year="2014"}| TR ]
-
A language for securely referencing
persistent information in a federated system
Technical report 1813–35150, Cornell University Computing and Information Science,
January 2014.
Jed Liu and Andrew C. Myers.
[ ×@techreport{persist-TR,
title="A language for securely referencing
persistent information in a federated system",
author="Jed Liu and Andrew C. Myers",
institution="Cornell University Computing and Information Science",
number="1813–35150",
url="http://hdl.handle.net/1813/35150",
month="January",
year="2014"} ]
-
How Languages Can Save Distributed Computing
ACM Principles of Programming Languages,
January 2013.
Keynote talk.
Andrew C. Myers.
[ ×@misc{popl13-talk,
title="How Languages Can Save Distributed Computing",
author="Andrew C. Myers",
url="https://dl.acm.org/citation.cfm?id=2429107",
pages="315–316",
month="January",
note="Keynote talk.",
year="2013"} ]
-
Towards a secure federated information system
Ph.D. dissertation, Cornell University Department of Computer Science,
August 2012.
Jed Liu.
[ ×@phdthesis{liu-thesis,
title="Towards a secure federated information system",
author="Jed Liu",
url="http://www.cs.cornell.edu/andru/papers/jed-liu-dissertation.pdf",
month="August",
year="2012"} ]
-
Language-based control and mitigation of timing channels
A type system bounds timing leakage when programs are run on hardware obeying the right contract.
ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
pp. 99–110,
June 2012.
Danfeng Zhang, Aslan Askarov, and Andrew C. Myers.
[ ×@inproceedings{pldi12,
title="Language-based control and mitigation of timing channels",
author="Danfeng Zhang and Aslan Askarov and Andrew C. Myers",
booktitle="ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="https://www.cs.cornell.edu/andru/papers/pltiming.html",
pages="99–110",
month="June",
year="2012"}
| SecVerilogproject ]
-
Sharing mobile code securely with information flow control
IEEE Symp. on Security and Privacy,
pp. 191–205,
May 2012.
Owen Arden, Michael D. George, Jed Liu, K. Vikram, Aslan Askarov, and Andrew C. Myers.
[ ×@inproceedings{oakland12,
title="Sharing mobile code securely with information flow control",
author="Owen Arden and Michael D. George and Jed Liu and K. Vikram
and Aslan Askarov and Andrew C. Myers",
booktitle="IEEE Symp. on Security and Privacy",
url="http://www.cs.cornell.edu/andru/papers/mobile.html",
pages="191–205",
month="May",
year="2012"}
| Fabricproject ]
-
Predictive mitigation of timing channels in interactive systems
18th ACM Conf. on Computer and Communications Security (CCS),
pp. 563–574,
October 2011.
Danfeng Zhang, Aslan Askarov, and Andrew C. Myers.
[ ×@inproceedings{zam11,
title="Predictive mitigation of timing channels in interactive systems",
author="Danfeng Zhang and Aslan Askarov and Andrew C. Myers",
booktitle="18th ACM Conf. on Computer and Communications Security (CCS)",
url="http://www.cs.cornell.edu/andru/papers/gentiming.html",
pages="563–574",
month="October",
year="2011"} ]
-
Attacker control and impact for confidentiality and integrity
Logical Methods in Computer Science, 7(3),
September 2011.
Aslan Askarov and Andrew C. Myers.
[ ×@article{am11,
title="Attacker control and impact for confidentiality and integrity",
author="Aslan Askarov and Andrew C. Myers",
journal="Logical Methods in Computer Science",
volume="7",
number="3",
url="http://www.cs.cornell.edu/andru/papers/robknowledge-lmcs.pdf",
month="September",
year="2011"} ]
-
Predictive black-box mitigation of timing channels
17th ACM Conf. on Computer and Communications Security (CCS),
pp. 297–307,
October 2010.
Aslan Askarov, Danfeng Zhang, and Andrew C. Myers.
[ ×@inproceedings{azm10,
title="Predictive black-box mitigation of timing channels",
author="Aslan Askarov and Danfeng Zhang and Andrew C. Myers",
booktitle="17th ACM Conf. on Computer and Communications Security (CCS)",
url="http://www.cs.cornell.edu/andru/papers/timing.html",
pages="297–307",
month="October",
year="2010"} ]
-
A semantic framework for declassification and endorsement
19th European Symposium on Programming,
pp. 64–84,
March 2010.
Aslan Askarov and Andrew C. Myers.
[ ×@inproceedings{am10,
title="A semantic framework for declassification and endorsement",
author="Aslan Askarov and Andrew C. Myers",
booktitle="19th European Symposium on Programming",
url="http://www.cs.cornell.edu/andru/papers/robknowledge.pdf",
pages="64–84",
month="March",
year="2010"} ]
-
Quantifying information flow with beliefs
Journal of Computer Security, 17(5):655–701,
October 2009.
Michael R. Clarkson, Andrew C. Myers, and Fred B. Schneider.
[ ×@article{cms09,
title="Quantifying information flow with beliefs",
author="Michael R. Clarkson and Andrew C. Myers and Fred B. Schneider",
journal="Journal of Computer Security",
volume="17",
number="5",
url="http://www.cs.cornell.edu/andru/papers/jbelief.pdf",
pages="655–701",
month="October",
year="2009"}| TR ]
-
Fabric: a platform for secure distributed computation and storage
22nd ACM Symp. on Operating System Principles (SOSP),
pp. 321–334,
October 2009.
Jed Liu, Michael D. George, K. Vikram, Xin Qi, Lucas Waye, and Andrew C. Myers.
[ ×@inproceedings{fabric09,
title="Fabric: a platform for secure distributed computation and storage",
author="Jed Liu and Michael D. George and K. Vikram and Xin Qi
and Lucas Waye and Andrew C. Myers",
booktitle="22nd ACM Symp. on Operating System Principles (SOSP)",
url="http://www.cs.cornell.edu/andru/papers/fabric-sosp09.html",
pages="321–334",
month="October",
year="2009"}
| Fabricproject ]
-
Quantification and formalization of security
Ph.D. dissertation, Cornell University Department of Computer Science,
August 2009.
Michael Clarkson.
[ ×@phdthesis{clarkson-thesis,
title="Quantification and formalization of security",
author="Michael Clarkson",
url="http://www.cs.cornell.edu/andru/papers/clarkson_dissertation.pdf",
month="August",
year="2009"} ]
-
Building secure web applications with automatic partitioning
Comm. of the ACM, 52(2):79–87,
February 2009.
Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, and Xin Zheng.
[ ×@article{swift09,
title="Building secure web applications with automatic partitioning",
author="Stephen Chong and Jed Liu and Andrew C. Myers and
Xin Qi and K. Vikram and Lantian Zheng and Xin Zheng",
journal="Comm. of the ACM",
volume="52",
number="2",
url="http://portal.acm.org/citation.cfm?id=1461949",
pages="79–87",
month="February",
year="2009"} ]
-
Expressive and enforceable information security policies
Ph.D. dissertation, Cornell University Department of Computer Science,
August 2008.
Stephen Chong.
[ ×@phdthesis{chong-thesis,
title="Expressive and enforceable information security policies",
author="Stephen Chong",
url="http://people.seas.harvard.edu/don't know how to expand macro hong/pubs/chong_dissertation.pdf",
month="August",
year="2008"} ]
-
End-to-end enforcement of erasure and declassification
IEEE Computer Security Foundations Symp. (CSF),
pp. 98–111,
June 2008.
Stephen Chong and Andrew C. Myers.
[ ×@inproceedings{cm08,
title="End-to-end enforcement of erasure and declassification",
author="Stephen Chong and Andrew C. Myers",
booktitle="IEEE Computer Security Foundations Symp. (CSF)",
url="http://www.cs.cornell.edu/andru/papers/enferasure-csf08.pdf",
pages="98–111",
month="June",
year="2008"} ]
-
Securing nonintrusive web encryption through information flow
3rd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS),
pp. 125–134,
June 2008.
Lantian Zheng and Andrew C. Myers.
[ ×@inproceedings{zm08,
title="Securing nonintrusive web encryption through information flow",
author="Lantian Zheng and Andrew C. Myers",
booktitle="3rd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS)",
url="https://www.cs.cornell.edu/andru/papers/plas08.pdf",
pages="125–134",
month="June",
year="2008"} ]
-
Civitas: Toward a secure voting system
IEEE Symp. on Security and Privacy,
pp. 354–368,
May 2008.
Michael R. Clarkson, Stephen Chong, and Andrew C. Myers.
[ ×@inproceedings{ccm08,
title="Civitas: Toward a secure voting system",
author="Michael R. Clarkson and Stephen Chong and Andrew C. Myers",
booktitle="IEEE Symp. on Security and Privacy",
url="http://www.cs.cornell.edu/andru/papers/civitas.html",
pages="354–368",
month="May",
year="2008"}
| Civitasproject ]
-
Secure web applications via automatic partitioning
21st ACM Symp. on Operating System Principles (SOSP),
pp. 31–44,
October 2007.
(SOSP Best Paper Award.)
Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, and Xin Zheng.
[ ×@inproceedings{swift07,
title="Secure web applications via automatic partitioning",
author="Stephen Chong and Jed Liu and Andrew C. Myers and
Xin Qi and K. Vikram and Lantian Zheng and Xin Zheng",
booktitle="21st ACM Symp. on Operating System Principles (SOSP)",
url="http://www.cs.cornell.edu/andru/papers/swift-sosp07.pdf",
pages="31–44",
month="October",
year="2007"} ]
-
SIF: Enforcing confidentiality and
integrity in web applications
16th USENIX Security Symp.,
August 2007.
Stephen Chong, K. Vikram, and Andrew C. Myers.
[ ×@inproceedings{sif07,
title="SIF: Enforcing confidentiality and
integrity in web applications",
author="Stephen Chong and K. Vikram and Andrew C. Myers",
booktitle="16th USENIX Security Symp.",
url="http://www.cs.cornell.edu/andru/papers/sif.pdf",
month="August",
year="2007"}
| SIFproject ]
-
Quantifying information flow with beliefs
Technical report 2007-2075, Cornell University Computing and Information Science,
March 2007.
Michael R. Clarkson, Andrew C. Myers, and Fred B. Schneider.
[ ×@techreport{cms09-tr,
title="Quantifying information flow with beliefs",
author="Michael R. Clarkson and Andrew C. Myers and Fred B. Schneider",
institution="Cornell University Computing and Information Science",
number="2007-2075",
url="http://hdl.handle.net/1813/5766",
month="March",
year="2007"} ]
-
Dynamic security labels and static information flow control
International Journal of Information Security, 6(2–3),
March 2007.
Lantian Zheng and Andrew C. Myers.
[ ×@article{zm07,
title="Dynamic security labels and static information flow control",
author="Lantian Zheng and Andrew C. Myers",
journal="International Journal of Information Security",
volume="6",
number="2–3",
url="http://www.cs.cornell.edu/andru/papers/dynlabel-ijis.pdf",
month="March",
year="2007"} ]
-
Making distributed computation secure by construction
Ph.D. dissertation, Cornell University Department of Computer Science,
January 2007.
Lantian Zheng.
[ ×@phdthesis{zheng-thesis,
title="Making distributed computation secure by construction",
author="Lantian Zheng",
url="http://www.cs.cornell.edu/andru/papers/lantian-thesis.pdf",
month="January",
year="2007"} ]
-
Jif 3.0: Java information flow
Software release,
July 2006.
Andrew C. Myers, Lantian Zheng, Steve Zdancewic, Stephen Chong, and Nathaniel Nystrom.
[ ×@software{jif,
title="Jif 3.0: Java information flow",
author="Andrew C. Myers and Lantian Zheng and Steve Zdancewic and
Stephen Chong and Nathaniel Nystrom",
url="http://www.cs.cornell.edu/jif",
month="July",
year="2006"}
| Jifproject ]
-
Decentralized robustness
19th IEEE Computer Security Foundations Workshop (CSFW),
pp. 242–253,
July 2006.
Stephen Chong and Andrew C. Myers.
[ ×@inproceedings{cm06,
title="Decentralized robustness",
author="Stephen Chong and Andrew C. Myers",
booktitle="19th IEEE Computer Security Foundations Workshop (CSFW)",
url="http://www.cs.cornell.edu/andru/papers/robdlm.pdf",
pages="242–253",
month="July",
year="2006"} ]
-
Making distributed computation trustworthy by construction: technical report
Technical report 2006–2040, Cornell University Computing and Information Science,
2006.
Lantian Zheng and Andrew C. Myers.
[ ×@techreport{dsimp-tr,
title="Making distributed computation trustworthy by construction: technical report",
author="Lantian Zheng and Andrew C. Myers",
institution="Cornell University Computing and Information Science",
number="2006–2040",
url="http://techreports.library.cornell.edu:8081/Dienst/UI/1.0/Display/cul.cis/TR2006-2040",
year="2006"} ]
-
Enforcing robust declassification and qualified robustness
Journal of Computer Security, 14(2):157–196,
2006.
Andrew C. Myers, Andrei Sabelfeld, and Steve Zdancewic.
[ ×@article{msz06,
title="Enforcing robust declassification and qualified robustness",
author="Andrew C. Myers and Andrei Sabelfeld and Steve Zdancewic",
journal="Journal of Computer Security",
volume="14",
number="2",
url="http://www.cs.cornell.edu/andru/papers/robdecl-jcs",
pages="157–196",
year="2006"} ]
-
Belief in information flow
18th IEEE Computer Security Foundations Workshop (CSFW),
pp. 31–45,
June 2005.
Michael R. Clarkson, Andrew C. Myers, and Fred B. Schneider.
[ ×@inproceedings{cms05,
title="Belief in information flow",
author="Michael R. Clarkson and Andrew C. Myers and Fred B. Schneider",
booktitle="18th IEEE Computer Security Foundations Workshop (CSFW)",
url="http://www.cs.cornell.edu/andru/papers/InfoFlowBelief.pdf",
pages="31–45",
month="June",
year="2005"} ]
-
End-to-end availability policies and noninterference
18th IEEE Computer Security Foundations Workshop (CSFW),
pp. 272–286,
June 2005.
Lantian Zheng and Andrew C. Myers.
[ ×@inproceedings{zm05,
title="End-to-end availability policies and noninterference",
author="Lantian Zheng and Andrew C. Myers",
booktitle="18th IEEE Computer Security Foundations Workshop (CSFW)",
url="http://www.cs.cornell.edu/andru/papers/avail.pdf",
pages="272–286",
month="June",
year="2005"} ]
-
Language-based information erasure
18th IEEE Computer Security Foundations Workshop (CSFW),
pp. 241–254,
June 2005.
Stephen Chong and Andrew C. Myers.
[ ×@inproceedings{cm05,
title="Language-based information erasure",
author="Stephen Chong and Andrew C. Myers",
booktitle="18th IEEE Computer Security Foundations Workshop (CSFW)",
url="http://www.cs.cornell.edu/andru/papers/erasure.pdf",
pages="241–254",
month="June",
year="2005"} ]
-
End-to-end availability policies and noninterference
Technical report 2005–1987, Cornell University Computing and Information Science,
2005.
Lantian Zheng and Andrew C. Myers.
[ ×@techreport{zm05TR,
title="End-to-end availability policies and noninterference",
author="Lantian Zheng and Andrew C. Myers",
institution="Cornell University Computing and Information Science",
number="2005–1987",
url="http://techreports.library.cornell.edu:8081/Dienst/UI/1.0/Display/cul.cis/TR2005-1987",
year="2005"} ]
-
Security policies for downgrading
11th ACM Conf. on Computer and Communications Security (CCS),
pp. 198–209,
October 2004.
Stephen Chong and Andrew C. Myers.
[ ×@inproceedings{cm04,
title="Security policies for downgrading",
author="Stephen Chong and Andrew C. Myers",
booktitle="11th ACM Conf. on Computer and Communications Security (CCS)",
url="http://www.cs.cornell.edu/andru/papers/decl-policy.pdf",
pages="198–209",
month="October",
year="2004"} ]
-
Dynamic security labels and noninterference
2nd Workshop on Formal Aspects in Security
and Trust (FAST), IFIP TC1 WG1.7,
August 2004.
Lantian Zheng and Andrew C. Myers.
[ ×@inproceedings{zm04,
title="Dynamic security labels and noninterference",
author="Lantian Zheng and Andrew C. Myers",
booktitle="2nd Workshop on Formal Aspects in Security
and Trust (FAST), IFIP TC1 WG1.7",
url="http://www.cs.cornell.edu/andru/papers/dynlabel.pdf",
month="August",
year="2004"} ]
-
Enforcing robust declassification
17th IEEE Computer Security Foundations Workshop (CSFW),
pp. 172–186,
June 2004.
Andrew C. Myers, Andrei Sabelfeld, and Steve Zdancewic.
[ ×@inproceedings{msz04,
title="Enforcing robust declassification",
author="Andrew C. Myers and Andrei Sabelfeld and Steve Zdancewic",
booktitle="17th IEEE Computer Security Foundations Workshop (CSFW)",
url="http://www.cs.cornell.edu/andru/papers/csfw04.pdf",
pages="172–186",
month="June",
year="2004"} ]
-
A model for delimited release
2003 International Symposium on Software Security,
pp. 174–191,
2004.
Andrei Sabelfeld and Andrew C. Myers.
[ ×@inproceedings{sm04,
title="A model for delimited release",
author="Andrei Sabelfeld and Andrew C. Myers",
booktitle="2003 International Symposium on Software Security",
number="3233",
url="http://www.cs.cornell.edu/andru/papers/isss03.pdf",
pages="174–191",
year="2004"} ]
-
Dynamic security labels and noninterference
Technical report 2004–1924, Cornell University Computing and Information Science,
2004.
Lantian Zheng and Andrew C. Myers.
[ ×@techreport{zm04TR,
title="Dynamic security labels and noninterference",
author="Lantian Zheng and Andrew C. Myers",
institution="Cornell University Computing and Information Science",
number="2004–1924",
url="http://www.cs.cornell.edu/andru/papers/dynl-tr.pdf",
year="2004"} ]
-
Observational determinism for concurrent program security
16th IEEE Computer Security Foundations Workshop (CSFW),
pp. 29–43,
June 2003.
Steve Zdancewic and Andrew C. Myers.
[ ×@inproceedings{zm03,
title="Observational determinism for concurrent program security",
author="Steve Zdancewic and Andrew C. Myers",
booktitle="16th IEEE Computer Security Foundations Workshop (CSFW)",
url="http://www.cs.cornell.edu/andru/papers/csfw03.pdf",
pages="29–43",
month="June",
year="2003"} ]
-
Using replication and partitioning to build secure distributed systems
IEEE Symp. on Security and Privacy,
pp. 236–250,
May 2003.
Lantian Zheng, Stephen Chong, Andrew C. Myers, and Steve Zdancewic.
[ ×@inproceedings{zcmz03,
title="Using replication and partitioning to build secure distributed systems",
author="Lantian Zheng and Stephen Chong and Andrew C. Myers and Steve Zdancewic",
booktitle="IEEE Symp. on Security and Privacy",
url="http://www.cs.cornell.edu/andru/papers/sp03.pdf",
pages="236–250",
month="May",
year="2003"} ]
-
Language-based information-flow security
IEEE Journal on Selected Areas in Communications, 21(1):5–19,
January 2003.
Andrei Sabelfeld and Andrew C. Myers.
[ ×@article{sm-jsac,
title="Language-based information-flow security",
author="Andrei Sabelfeld and Andrew C. Myers",
journal="IEEE Journal on Selected Areas in Communications",
volume="21",
number="1",
url="http://www.cs.cornell.edu/andru/papers/jsac/sm-jsac03.pdf",
pages="5–19",
month="January",
year="2003"} ]
-
Secure information flow via linear continuations
Higher-Order and Symbolic Computation, 15(2–3):209–234,
September 2002.
Steve Zdancewic and Andrew C. Myers.
[ ×@article{zm02-hosc,
title="Secure information flow via linear continuations",
author="Steve Zdancewic and Andrew C. Myers",
journal="Higher-Order and Symbolic Computation",
volume="15",
number="2–3",
url="http://www.cs.cornell.edu/andru/papers/hosc01.pdf",
pages="209–234",
month="September",
year="2002"} ]
-
Programming languages for information security
Ph.D. dissertation, Cornell University Department of Computer Science,
August 2002.
Steve Zdancewic.
[ ×@phdthesis{zdance-thesis,
title="Programming languages for information security",
author="Steve Zdancewic",
url="http://www.cis.upenn.edu/don't know how to expand macro tevez/papers/Zda02.pdf",
month="August",
year="2002"} ]
-
Secure program partitioning
ACM Trans. on Computer Systems, 20(3):283–328,
August 2002.
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers.
[ ×@article{zznm02,
title="Secure program partitioning",
author="Steve Zdancewic and Lantian Zheng and Nathaniel Nystrom and
Andrew C. Myers",
journal="ACM Trans. on Computer Systems",
volume="20",
number="3",
url="http://www.cs.cornell.edu/andru/papers/sosp01/spp-tr.pdf",
pages="283–328",
month="August",
year="2002"} ]
-
Untrusted hosts and confidentiality: secure program partitioning
18th ACM Symp. on Operating System Principles (SOSP),
pp. 1–14,
October 2001.
(SOSP Best Paper Award.)
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers.
[ ×@inproceedings{zznm01,
title="Untrusted hosts and confidentiality: secure program partitioning",
author="Steve Zdancewic and Lantian Zheng and Nathaniel Nystrom and
Andrew C. Myers",
booktitle="18th ACM Symp. on Operating System Principles (SOSP)",
url="http://www.cs.cornell.edu/andru/papers/sosp01/zznm01.pdf",
pages="1–14",
month="October",
year="2001"} ]
-
Robust declassification
14th IEEE Computer Security Foundations Workshop (CSFW),
pp. 15–23,
June 2001.
Steve Zdancewic and Andrew C. Myers.
[ ×@inproceedings{zm01b,
title="Robust declassification",
author="Steve Zdancewic and Andrew C. Myers",
booktitle="14th IEEE Computer Security Foundations Workshop (CSFW)",
url="http://www.cs.cornell.edu/andru/papers/csfw01.pdf",
pages="15–23",
month="June",
year="2001"} ]
-
Secure program partitioning
Technical report 2001–1846, Cornell University Department of Computer Science,
2001.
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers.
[ ×@techreport{zznm01-tr,
title="Secure program partitioning",
author="Steve Zdancewic and Lantian Zheng and Nathaniel Nystrom and
Andrew C. Myers",
institution="Cornell University Department of Computer Science",
number="2001–1846",
url="http://www.cs.cornell.edu/andru/papers/sosp01/spp-tr.pdf",
year="2001"} ]
-
Secure information flow and CPS
10th European Symposium on Programming,
pp. 46–61,
2001.
Steve Zdancewic and Andrew C. Myers.
[ ×@inproceedings{zm01,
title="Secure information flow and CPS",
author="Steve Zdancewic and Andrew C. Myers",
booktitle="10th European Symposium on Programming",
volume="2028",
url="http://www.cs.cornell.edu/andru/papers/lincont.pdf",
pages="46–61",
year="2001"} ]
-
Protecting privacy using the decentralized label model
ACM Transactions on Software Engineering and Methodology, 9(4):410–442,
October 2000.
Andrew C. Myers and Barbara Liskov.
[ ×@article{ml-tosem,
title="Protecting privacy using the decentralized label model",
author="Andrew C. Myers and Barbara Liskov",
journal="ACM Transactions on Software Engineering and Methodology",
volume="9",
number="4",
url="http://www.cs.cornell.edu/andru/papers/iflow-tosem.pdf",
pages="410–442",
month="October",
year="2000"} ]
-
Confidentiality and integrity with untrusted hosts
Technical report 2000–1810, Computer Science Dept., Cornell University,
August 2000.
Steve Zdancewic and Andrew C. Myers.
[ ×@techreport{zm00TR,
title="Confidentiality and integrity with untrusted hosts",
author="Steve Zdancewic and Andrew C. Myers",
institution="Computer Science Dept., Cornell University",
number="2000–1810",
url="http://hdl.handle.net/1813/5800",
month="August",
year="2000"} ]
-
Mostly-static decentralized information flow control
Technical report MIT/LCS/TR-783, Massachusetts Institute of Technology,
January 1999.
(George M. Sprowls Award for outstanding Ph.D. thesis in the MIT EECS department.)
Andrew C. Myers.
[ ×@techreport{myers-phd-tr-award,
title="Mostly-static decentralized information flow control",
author="Andrew C. Myers",
institution="Massachusetts Institute of Technology",
number="MIT/LCS/TR-783",
url="http://www.cs.cornell.edu/andru/release/tr783.pdf",
month="January",
year="1999"} ]
-
JFlow: practical mostly-static information flow control
26th ACM Symp. on Principles of Programming Languages (POPL),
pp. 228–241,
January 1999.
(ACM POPL Most Influential Paper Award, 2009.)
Andrew C. Myers.
[ ×@inproceedings{myers-popl99,
title="JFlow: practical mostly-static information flow control",
author="Andrew C. Myers",
booktitle="26th ACM Symp. on Principles of Programming Languages (POPL)",
url="http://www.cs.cornell.edu/andru/papers/popl99/popl99.pdf",
pages="228–241",
month="January",
year="1999"}| slides ]
-
Complete, safe information flow with decentralized labels
IEEE Symp. on Security and Privacy,
pp. 186–197,
May 1998.
Andrew C. Myers and Barbara Liskov.
[ ×@inproceedings{ml-sp98,
title="Complete, safe information flow with decentralized labels",
author="Andrew C. Myers and Barbara Liskov",
booktitle="IEEE Symp. on Security and Privacy",
url="http://www.cs.cornell.edu/andru/papers/sp98/sp98.pdf",
pages="186–197",
month="May",
year="1998"} ]
-
A decentralized model for information flow control
16th ACM Symp. on Operating System Principles (SOSP),
pp. 129–142,
October 1997.
Andrew C. Myers and Barbara Liskov.
[ ×@inproceedings{ml-ifc-97,
title="A decentralized model for information flow control",
author="Andrew C. Myers and Barbara Liskov",
booktitle="16th ACM Symp. on Operating System Principles (SOSP)",
url="http://www.cs.cornell.edu/andru/papers/iflow-sosp97/paper.html",
pages="129–142",
month="October",
year="1997"} ]
-
Charlotte: reformulating blockchains into a web of composable attested data structures for cross-domain applications
A proto-blockchain for building and composing blockchain-like systems.
ACM Trans. on Computer Systems, 41(1–4):1–52,
December 2023.
Isaac Sheff, Xinwen Wang, Kushal Babel, Haobin Ni, Robbert van Renesse, and Andrew C. Myers.
[ ×@article{charlotte,
title="Charlotte: reformulating blockchains into a web of composable attested data structures for cross-domain applications",
author="Isaac Sheff and Xinwen Wang and Kushal Babel and Haobin Ni
and Robbert van Renesse and Andrew C. Myers",
journal="ACM Trans. on Computer Systems",
volume="41",
number="1–4",
url="http://www.cs.cornell.edu/andru/papers/charlotte",
pages="1–52",
month="December",
year="2023"} ]
(Also appears in Security)
-
Heterogeneous Paxos
A consensus algorithm heterogeneous on all three dimensions, like many blockchains.
OPODIS,
December 2020.
Isaac Sheff, Xinwen Wang, Robbert van Renesse, and Andrew C. Myers.
[ ×@inproceedings{hetpaxos,
title="Heterogeneous Paxos",
author="Isaac Sheff and Xinwen Wang and Robbert van Renesse and Andrew C. Myers",
booktitle="OPODIS",
url="http://www.cs.cornell.edu/andru/papers/hetcons",
month="December",
year="2020"} ]
(Also appears in Security)
-
Programming safely with weak (and strong) consistency
Ph.D. dissertation, Cornell University,
August 2020.
Mae Milano.
[ ×@phdthesis{milano-thesis,
title="Programming safely with weak (and strong) consistency",
author="Mae Milano",
url="http://languagesforsyste.ms/files/thesis.pdf",
month="August",
year="2020"} ]
-
ALSO Reference Manual
Technical memo,
November 2019.
Andrew C. Myers.
[ ×@misc{also-manual,
title="ALSO Reference Manual",
author="Andrew C. Myers",
url="http://www.cs.cornell.edu/andru/papers/also-manual.pdf",
month="November",
year="2019"}
| A-mudproject ]
-
Reduced communication for distributed transactions through time-dependent guarantees
Ph.D. dissertation, Cornell University,
August 2019.
Tom Magrino.
[ ×@phdthesis{magrino-dissertation,
title="Reduced communication for distributed transactions through time-dependent guarantees",
author="Tom Magrino",
url="https://tommagrino.com/papers/dissertation.pdf",
month="August",
year="2019"} ]
-
Serializability and heterogeneous trust from two phase commit to blockchains
Ph.D. dissertation, Cornell University,
August 2019.
Isaac Sheff.
[ ×@phdthesis{isheff-thesis,
title="Serializability and heterogeneous trust from two phase commit to blockchains",
author="Isaac Sheff",
url="http://www.cs.cornell.edu/andru/papers/isheff-thesis.pdf",
month="August",
year="2019"} ]
-
A tour of Gallifrey, a language for geodistributed programming
New mechanisms for merging, branching, and
computing on orthogonally replicated state.
3rd Summit on Advances in Programming Languages (SNAPL),
May 2019.
Mae Milano, Rolph Recto, Tom Magrino, and Andrew C. Myers.
[ ×@inproceedings{gallifrey,
title="A tour of Gallifrey, a language for geodistributed programming",
author="Mae Milano and Rolph Recto and Tom Magrino and Andrew C. Myers",
booktitle="3rd Summit on Advances in Programming Languages (SNAPL)",
url="https://drops.dagstuhl.de/storage/00lipics/lipics-vol136-snapl2019/LIPIcs.SNAPL.2019.11/LIPIcs.SNAPL.2019.11.pdf",
month="May",
year="2019"} ]
-
Efficient, consistent distributed computation with predictive treaties
Low-coordination semantic consistency via time-dependent predicates
ACM SIGOPS/EuroSys European Conference on Computer Systems,
March 2019.
Tom Magrino, Jed Liu, Nate Foster, Johannes Gehrke, and Andrew C. Myers.
[ ×@inproceedings{ptreaties,
title="Efficient, consistent distributed computation with predictive treaties",
author="Tom Magrino and Jed Liu and Nate Foster and Johannes Gehrke and Andrew C. Myers",
booktitle="ACM SIGOPS/EuroSys European Conference on Computer Systems",
url="http://www.cs.cornell.edu/andru/papers/ptreaties",
month="March",
year="2019"} ]
-
MixT: a language for mixing consistency in geodistributed transactions
Atomic, mixed-consistency transactions, checked using information flow
39th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
June 2018.
Mae Milano and Andrew C. Myers.
[ ×@inproceedings{mixt,
title="MixT: a language for mixing consistency in geodistributed transactions",
author="Mae Milano and Andrew C. Myers",
booktitle="39th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="https://dl.acm.org/doi/pdf/10.1145/3296979.3192375",
month="June",
year="2018"} ]
-
Fabric: Building open distributed systems securely by construction
A secure, decentralized, distributed programming system
based on information flow control
J. Computer Security, 25(4–5):319–321,
May 2017.
Jed Liu, Owen Arden, Michael D. George, and Andrew C. Myers.
[ ×@article{jfabric,
title="Fabric: Building open distributed systems securely by construction",
author="Jed Liu and Owen Arden and Michael D. George and Andrew C. Myers",
journal="J. Computer Security",
volume="25",
number="4–5",
url="http://www.cs.cornell.edu/andru/papers/jfabric",
pages="319–321",
month="May",
year="2017"} ]
(Also appears in Security)
-
Safe serializable secure scheduling: transactions and the trade-off between security and consistency
A side channel created by an intrinsic conflict between consistency and security, and a fix
23rd ACM Conf. on Computer and Communications Security (CCS),
pp. 229–241,
October 2016.
Isaac Sheff, Tom Magrino, Jed Liu, Andrew C. Myers, and Robbert Van Renesse.
[ ×@inproceedings{abrtchan,
title="Safe serializable secure scheduling: transactions and the trade-off between security and consistency",
author="Isaac Sheff and Tom Magrino and Jed Liu and Andrew C. Myers and Robbert Van Renesse",
booktitle="23rd ACM Conf. on Computer and Communications Security (CCS)",
url="http://www.cs.cornell.edu/andru/papers/abrtchan",
pages="229–241",
month="October",
year="2016"}
| Fabricproject ]
(Also appears in Security)
-
Mixing consistency in geodistributed transactions: technical report
Technical report 1813-44710, Cornell University Computing and Information Science,
October 2016.
Mae Milano and Andrew C. Myers.
[ ×@techreport{mm16-tr,
title="Mixing consistency in geodistributed transactions: technical report",
author="Mae Milano and Andrew C. Myers",
institution="Cornell University Computing and Information Science",
number="1813-44710",
url="http://hdl.handle.net/1813/44710",
month="October",
year="2016"} ]
-
JRIF: reactive information flow control for Java
Specifying information flow policies with reactive information-flow automata
Technical report 1813–41194, Cornell University Computing and Information Science,
February 2016.
Elisavet Kozyri, Owen Arden, Andrew C. Myers, and Fred B. Schneider.
[ ×@techreport{jrif-tr,
title="JRIF: reactive information flow control for Java",
author="Kozyri, Elisavet and Arden, Owen and Myers, Andrew C. and Schneider, Fred B.",
institution="Cornell University Computing and Information Science",
number="1813–41194",
url="https://ecommons.cornell.edu/handle/1813/41194",
month="February",
year="2016"} ]
(Also appears in Security)
-
Flow-limited authorization
Ph.D. dissertation, Cornell University,
2016.
Owen Arden.
[ ×@phdthesis{owen-thesis,
title="Flow-limited authorization",
author="Owen Arden",
url="http://www.cs.cornell.edu/andru/papers/FLA_OwenArden.pdf",
year="2016"}
| Fabricproject ]
(Also appears in Security)
-
Building distributed systems with information flow control
Ph.D. dissertation, Cornell University Department of Computer Science,
August 2015.
K. Vikram.
[ ×@phdthesis{vikram-thesis,
title="Building distributed systems with information flow control",
author="K. Vikram",
url="http://www.cs.cornell.edu/andru/papers/kv-thesis.pdf",
month="August",
year="2015"}
| Fabricproject ]
(Also appears in Security)
-
Distributed protocols and heterogeneous trust: technical report
Technical report arXiv:1412.3136, Cornell University Computer and Information Science,
December 2014.
Isaac C. Sheff, Robbert van Renesse, and Andrew C. Myers.
[ ×@techreport{hetconstechreport,
title="Distributed protocols and heterogeneous trust: technical report",
author="Isaac C. Sheff and
Robbert van Renesse and
Andrew C. Myers",
institution="Cornell University Computer and Information Science",
volume="abs/1412.3136",
number=" arXiv:1412.3136",
url="http://arxiv.org/abs/1412.3136",
month="December",
year="2014"} ]
(Also appears in Security)
-
Defining and enforcing referential security
New security properties related to referential integrity and persistence can be soundly enforced by a type system.
3rd Conf. on Principles of Security and Trust (POST),
pp. 199–219,
April 2014.
Jed Liu and Andrew C. Myers.
[ ×@inproceedings{persist,
title="Defining and enforcing referential security",
author="Liu, Jed and Myers, Andrew C.",
booktitle="3rd Conf. on Principles of Security and Trust (POST)",
url="http://www.cs.cornell.edu/andru/papers/persist",
pages="199–219",
month="April",
year="2014"}| TR ]
(Also appears in Security)
-
Warranties for faster strong consistency
Distributed transactions can be sped up by giving clients
time-limited invariants on state and computation.
11th USENIX Symp. on Networked Systems Design and Implementation (NSDI),
pp. 513–517,
April 2014.
Jed Liu, Tom Magrino, Owen Arden, Michael D. George, and Andrew C. Myers.
[ ×@inproceedings{warranties,
title="Warranties for faster strong consistency",
author="Jed Liu and Tom Magrino and Owen Arden and Michael D. George and Andrew C. Myers",
booktitle="11th USENIX Symp. on Networked Systems Design and Implementation (NSDI)",
url="http://www.cs.cornell.edu/andru/papers/warranties",
pages="513–517",
month="April",
year="2014"}
| Fabricproject ]
-
Using program analysis to improve database applications
IEEE Data Bulletin, 37(1):48–59,
March 2014.
Alvin Cheung, Samuel Madden, Armando Solar-Lezama, Owen Arden, and Andrew C. Myers.
[ ×@article{pyxis2,
title="Using program analysis to improve database applications",
author="Alvin Cheung and Samuel Madden and Armando Solar-Lezama and Owen Arden and Andrew C. Myers",
journal="IEEE Data Bulletin",
volume="37",
number="1",
url="http://sites.computer.org/debull/A14mar/p48.pdf",
pages="48–59",
month="March",
year="2014"} ]
-
A language for securely referencing
persistent information in a federated system
Technical report 1813–35150, Cornell University Computing and Information Science,
January 2014.
Jed Liu and Andrew C. Myers.
[ ×@techreport{persist-TR,
title="A language for securely referencing
persistent information in a federated system",
author="Jed Liu and Andrew C. Myers",
institution="Cornell University Computing and Information Science",
number="1813–35150",
url="http://hdl.handle.net/1813/35150",
month="January",
year="2014"} ]
(Also appears in Security)
-
How Languages Can Save Distributed Computing
ACM Principles of Programming Languages,
January 2013.
Keynote talk.
Andrew C. Myers.
[ ×@misc{popl13-talk,
title="How Languages Can Save Distributed Computing",
author="Andrew C. Myers",
url="https://dl.acm.org/citation.cfm?id=2429107",
pages="315–316",
month="January",
note="Keynote talk.",
year="2013"} ]
(Also appears in Security)
-
StatusQuo: making familiar abstractions perform using program analysis
Program analysis and synthesis enable seamlessly moving data and
functionality between app and database servers.
Conference on Innovative Data Systems Research (CIDR),
January 2013.
(CIDR Best Paper Award.)
Alvin Cheung, Samuel Madden, Armando Solar-Lezama, Owen Arden, and Andrew C. Myers.
[ ×@inproceedings{StatusQuo,
title="StatusQuo: making familiar abstractions perform using program analysis",
author="Alvin Cheung and Samuel Madden and Armando Solar-Lezama and Owen Arden and Andrew C. Myers",
booktitle="Conference on Innovative Data Systems Research (CIDR)",
url="http://www.cidrdb.org/cidr2013/Papers/CIDR13_Paper117.pdf",
month="January",
year="2013"} ]
-
Speeding up database applications with Pyxis
Int'l Conference on Management of Data,
pp. 969–972,
2013.
Alvin Cheung, Owen Arden, Samuel Madden, and Andrew C. Myers.
[ ×@inproceedings{pyxis-2013,
title="Speeding up database applications with Pyxis",
author="Alvin Cheung and Owen Arden and Samuel Madden and Andrew C. Myers",
booktitle="Int'l Conference on Management of Data",
pages="969–972",
year="2013"} ]
-
Automatic partitioning of database applications
PVLDB, 5(11):1471–1482,
August 2012.
Alvin Cheung, Samuel Madden, Owen Arden, and Andrew C. Myers.
[ ×@article{pyxis,
title="Automatic partitioning of database applications",
author="Alvin Cheung and Samuel Madden and Owen Arden and Andrew C. Myers",
journal="PVLDB",
volume="5",
number="11",
url="http://vldb.org/pvldb/vol5/p1471_alvincheung_vldb2012.pdf",
pages="1471–1482",
month="August",
year="2012"} ]
-
Sharing mobile code securely with information flow control
IEEE Symp. on Security and Privacy,
pp. 191–205,
May 2012.
Owen Arden, Michael D. George, Jed Liu, K. Vikram, Aslan Askarov, and Andrew C. Myers.
[ ×@inproceedings{oakland12,
title="Sharing mobile code securely with information flow control",
author="Owen Arden and Michael D. George and Jed Liu and K. Vikram
and Aslan Askarov and Andrew C. Myers",
booktitle="IEEE Symp. on Security and Privacy",
url="http://www.cs.cornell.edu/andru/papers/mobile.html",
pages="191–205",
month="May",
year="2012"}
| Fabricproject ]
(Also appears in Security)
-
Fabric: a platform for secure distributed computation and storage
22nd ACM Symp. on Operating System Principles (SOSP),
pp. 321–334,
October 2009.
Jed Liu, Michael D. George, K. Vikram, Xin Qi, Lucas Waye, and Andrew C. Myers.
[ ×@inproceedings{fabric09,
title="Fabric: a platform for secure distributed computation and storage",
author="Jed Liu and Michael D. George and K. Vikram and Xin Qi
and Lucas Waye and Andrew C. Myers",
booktitle="22nd ACM Symp. on Operating System Principles (SOSP)",
url="http://www.cs.cornell.edu/andru/papers/fabric-sosp09.html",
pages="321–334",
month="October",
year="2009"}
| Fabricproject ]
(Also appears in Security)
-
Building secure web applications with automatic partitioning
Comm. of the ACM, 52(2):79–87,
February 2009.
Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, and Xin Zheng.
[ ×@article{swift09,
title="Building secure web applications with automatic partitioning",
author="Stephen Chong and Jed Liu and Andrew C. Myers and
Xin Qi and K. Vikram and Lantian Zheng and Xin Zheng",
journal="Comm. of the ACM",
volume="52",
number="2",
url="http://portal.acm.org/citation.cfm?id=1461949",
pages="79–87",
month="February",
year="2009"} ]
(Also appears in Security)
-
Secure web applications via automatic partitioning
21st ACM Symp. on Operating System Principles (SOSP),
pp. 31–44,
October 2007.
(SOSP Best Paper Award.)
Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, and Xin Zheng.
[ ×@inproceedings{swift07,
title="Secure web applications via automatic partitioning",
author="Stephen Chong and Jed Liu and Andrew C. Myers and
Xin Qi and K. Vikram and Lantian Zheng and Xin Zheng",
booktitle="21st ACM Symp. on Operating System Principles (SOSP)",
url="http://www.cs.cornell.edu/andru/papers/swift-sosp07.pdf",
pages="31–44",
month="October",
year="2007"} ]
(Also appears in Security)
-
SIF: Enforcing confidentiality and
integrity in web applications
16th USENIX Security Symp.,
August 2007.
Stephen Chong, K. Vikram, and Andrew C. Myers.
[ ×@inproceedings{sif07,
title="SIF: Enforcing confidentiality and
integrity in web applications",
author="Stephen Chong and K. Vikram and Andrew C. Myers",
booktitle="16th USENIX Security Symp.",
url="http://www.cs.cornell.edu/andru/papers/sif.pdf",
month="August",
year="2007"}
| SIFproject ]
(Also appears in Security)
-
Using replication and partitioning to build secure distributed systems
IEEE Symp. on Security and Privacy,
pp. 236–250,
May 2003.
Lantian Zheng, Stephen Chong, Andrew C. Myers, and Steve Zdancewic.
[ ×@inproceedings{zcmz03,
title="Using replication and partitioning to build secure distributed systems",
author="Lantian Zheng and Stephen Chong and Andrew C. Myers and Steve Zdancewic",
booktitle="IEEE Symp. on Security and Privacy",
url="http://www.cs.cornell.edu/andru/papers/sp03.pdf",
pages="236–250",
month="May",
year="2003"} ]
(Also appears in Security)
-
Secure program partitioning
ACM Trans. on Computer Systems, 20(3):283–328,
August 2002.
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers.
[ ×@article{zznm02,
title="Secure program partitioning",
author="Steve Zdancewic and Lantian Zheng and Nathaniel Nystrom and
Andrew C. Myers",
journal="ACM Trans. on Computer Systems",
volume="20",
number="3",
url="http://www.cs.cornell.edu/andru/papers/sosp01/spp-tr.pdf",
pages="283–328",
month="August",
year="2002"} ]
(Also appears in Security)
-
Untrusted hosts and confidentiality: secure program partitioning
18th ACM Symp. on Operating System Principles (SOSP),
pp. 1–14,
October 2001.
(SOSP Best Paper Award.)
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers.
[ ×@inproceedings{zznm01,
title="Untrusted hosts and confidentiality: secure program partitioning",
author="Steve Zdancewic and Lantian Zheng and Nathaniel Nystrom and
Andrew C. Myers",
booktitle="18th ACM Symp. on Operating System Principles (SOSP)",
url="http://www.cs.cornell.edu/andru/papers/sosp01/zznm01.pdf",
pages="1–14",
month="October",
year="2001"} ]
(Also appears in Security)
-
Secure program partitioning
Technical report 2001–1846, Cornell University Department of Computer Science,
2001.
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers.
[ ×@techreport{zznm01-tr,
title="Secure program partitioning",
author="Steve Zdancewic and Lantian Zheng and Nathaniel Nystrom and
Andrew C. Myers",
institution="Cornell University Department of Computer Science",
number="2001–1846",
url="http://www.cs.cornell.edu/andru/papers/sosp01/spp-tr.pdf",
year="2001"} ]
(Also appears in Security)
-
Confidentiality and integrity with untrusted hosts
Technical report 2000–1810, Computer Science Dept., Cornell University,
August 2000.
Steve Zdancewic and Andrew C. Myers.
[ ×@techreport{zm00TR,
title="Confidentiality and integrity with untrusted hosts",
author="Steve Zdancewic and Andrew C. Myers",
institution="Computer Science Dept., Cornell University",
number="2000–1810",
url="http://hdl.handle.net/1813/5800",
month="August",
year="2000"} ]
(Also appears in Security)
-
HAC: Hybrid adaptive caching for distributed storage systems
16th ACM Symp. on Operating System Principles (SOSP),
pp. 102–115,
October 1997.
Miguel Castro, Atul Adya, Barbara Liskov, and Andrew C. Myers.
[ ×@inproceedings{castro-sosp97,
title="HAC: Hybrid adaptive caching for distributed storage systems",
author="Miguel Castro and Atul Adya and Barbara Liskov and Andrew C. Myers",
booktitle="16th ACM Symp. on Operating System Principles (SOSP)",
url="http://www.cs.cornell.edu/andru/papers/hac-sosp97/published.html",
pages="102–115",
month="October",
year="1997"} ]
-
ALSO: a language for extensible multi-user systems
1996 MIT Student Workshop on Scalable Computing,
August 1996.
Andrew C. Myers.
[ ×@misc{ALSO,
title="ALSO: a language for extensible multi-user systems",
author="Andrew C. Myers",
url="http://www.cs.cornell.edu/andru/papers/myers-mitsw96.pdf",
month="August",
year="1996"}
| A-mudproject| Manual ]
-
Safe and efficient sharing of persistent objects in Thor
ACM SIGMOD International Conference on Management
of Data (SIGMOD),
pp. 318–329,
June 1996.
B. Liskov, A. Adya, M. Castro, M. Day, S. Ghemawat, R. Gruber, U. Maheshwari, A. C. Myers, and L. Shrira.
[ ×@inproceedings{sigmod96,
title="Safe and efficient sharing of persistent objects in Thor",
author="B. Liskov and A. Adya and M. Castro and M. Day and
S. Ghemawat and R. Gruber and U. Maheshwari and
A. C. Myers and L. Shrira",
booktitle="ACM SIGMOD International Conference on Management
of Data (SIGMOD)",
url="http://www.cs.cornell.edu/andru/papers/safe-sharing.pdf",
pages="318–329",
month="June",
year="1996"} ]
-
The language-independent interface of the Thor persistent object system
Object-Oriented Multidatabase Systems,
pp. 570–588,
1996.
Barbara Liskov, Mark Day, Sanjay Ghemawat, Robert Gruber, Umesh Maheshwari, Andrew C. Myers, and Liuba Shrira.
[ ×@inproceedings{thor-interface,
title="The language-independent interface of the Thor persistent object system",
author="Barbara Liskov and Mark Day and Sanjay Ghemawat and
Robert Gruber and Umesh Maheshwari and Andrew C. Myers and
Liuba Shrira",
booktitle="Object-Oriented Multidatabase Systems",
url="http://www.cs.cornell.edu/andru/papers/thor-interface.pdf",
pages="570–588",
year="1996"} ]
-
References to remote mobile objects in Thor
ACM Letters on Programming Languages and Systems,
March 1994.
Mark Day, Barbara Liskov, Umesh Maheshwari, and Andrew C. Myers.
[ ×@article{loplas,
title="References to remote mobile objects in Thor",
author="Mark Day and Barbara Liskov and Umesh Maheshwari and Andrew C. Myers",
journal="ACM Letters on Programming Languages and Systems",
url="http://www.cs.cornell.edu/andru/papers/mobile-refs.pdf",
month="March",
year="1994"} ]
-
Fast object operations in a persistent programming system
Technical report MIT/LCS/TR-599, Laboratory for Computer Science, MIT,
January 1994.
Andrew C. Myers.
[ ×@techreport{myers-thesis,
title="Fast object operations in a persistent programming system",
author="Andrew C. Myers",
institution="Laboratory for Computer Science, MIT",
number="MIT/LCS/TR-599",
url="http://www.cs.cornell.edu/andru/release/myers-sm-thesis.ps.gz",
month="January",
year="1994"} ]
-
Resolving the integrity/performance conflict
Fourth Workshop on Workstation Operating Systems,
pp. 156–159,
October 1993.
Andrew C. Myers.
[ ×@inproceedings{myers-wwos4,
title="Resolving the integrity/performance conflict",
author="Andrew C. Myers",
booktitle="Fourth Workshop on Workstation Operating Systems",
url="http://www.cs.cornell.edu/andru/papers/integrity-perf.pdf",
pages="156–159",
month="October",
year="1993"} ]
-
Secure synthesis of distributed cryptographic applications
Provably secure and correct compilation to cryptographic mechanisms
IEEE Computer Security Foundations Symp. (CSF),
July 2024.
Coşku Acay, Joshua Gancher, Rolph Recto, and Andrew C. Myers.
[ ×@inproceedings{viaduct-formal,
title="Secure synthesis of distributed cryptographic applications",
author="Coşku Acay and Joshua Gancher and Rolph Recto and Andrew C. Myers",
booktitle="IEEE Computer Security Foundations Symp. (CSF)",
url="http://www.cs.cornell.edu/andru/papers/viaduct-formal",
month="July",
year="2024"} ]
(Also appears in Security)
-
An array intermediate language for mixed cryptography
Workshop on Foundations of Computer Security,
July 2023.
Vivian Ding, Coşku Acay, and Andrew C. Myers.
[ ×@misc{fcs23,
title="An array intermediate language for mixed cryptography",
author="Vivian Ding and Coşku Acay and Andrew C. Myers",
url="https://squera.github.io/fcs-pdf/dingFCS2023.pdf",
month="July",
year="2023"} ]
(Also appears in Security)
-
Compilers for secure computation
Ph.D. dissertation, Cornell University,
2023.
Rolph Recto.
[ ×@phdthesis{recto-thesis,
title="Compilers for secure computation",
author="Rolph Recto",
url="http://www.cs.cornell.edu/andru/papers/recto-dissertation.pdf",
year="2023"} ]
(Also appears in Security)
-
Provably correct compilation for distributed cryptographic applications
Ph.D. dissertation, Cornell University,
2023.
Coşku Acay.
[ ×@phdthesis{acay-thesis,
title="Provably correct compilation for distributed cryptographic applications",
author="Coşku Acay",
url="http://www.cs.cornell.edu/andru/papers/acay-thesis.pdf",
year="2023"} ]
(Also appears in Security)
-
A flexible type system for fearless concurrency
Fearless concurrent programming without restrictions of prior type-based solutions.
43rd ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
June 2022.
Mae Milano, Joshua Turcotti, and Andrew C. Myers.
[ ×@inproceedings{mtc22,
title="A flexible type system for fearless concurrency",
author="Mae Milano and Joshua Turcotti and Andrew C. Myers",
booktitle="43rd ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/gallifrey-types",
month="June",
year="2022"} ]
-
PDL: a high-level hardware design language for pipelined processors
Write sequential code for instructions, get a pipelined processor implementation.
43rd ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
June 2022.
Drew Zagieboylo, Charles Sherk, G. Edward Suh, and Andrew C. Myers.
[ ×@inproceedings{pdl22,
title="PDL: a high-level hardware design language for pipelined processors",
author="Drew Zagieboylo and Charles Sherk and G. Edward Suh and Andrew C. Myers",
booktitle="43rd ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/pdl",
month="June",
year="2022"} ]
-
Mechanisms for provable integrity protection in decentralized systems
Ph.D. dissertation, Cornell University,
August 2021.
Ethan Cecchetti.
[ ×@phdthesis{cecchetti-thesis,
title="Mechanisms for provable integrity protection in decentralized systems",
author="Ethan Cecchetti",
url="https://www.cs.cornell.edu/&etilde;than/papers/EthanCecchettiDissertation.pdf",
month="August",
year="2021"} ]
(Also appears in Security)
-
Viaduct: an extensible, optimizing compiler for secure distributed programs
Automatically synthesizing cryptography from information flow specifications
42nd ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
pp. 740–755,
June 2021.
Coşku Acay, Rolph Recto, Joshua Gancher, Andrew Myers, and Elaine Shi.
[ ×@inproceedings{viaduct-pldi21,
title="Viaduct: an extensible, optimizing compiler for secure distributed programs",
author="Coşku Acay and Rolph Recto and Joshua Gancher and Andrew Myers and Elaine Shi",
booktitle="42nd ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/viaduct/",
pages="740–755",
month="June",
year="2021"} ]
(Also appears in Security)
-
Compositional security for reentrant applications
Extending information flow control to provably handle reentrancy
IEEE Symp. on Security and Privacy,
May 2021.
Best paper award.
Ethan Cecchetti, Siqiu Yao, Haobin Ni, and Andrew C. Myers.
[ ×@inproceedings{serif21,
title="Compositional security for reentrant applications",
author="Ethan Cecchetti and Siqiu Yao and Haobin Ni and Andrew C. Myers",
booktitle="IEEE Symp. on Security and Privacy",
url="http://www.cs.cornell.edu/andru/papers/oakland21",
month="May",
note="Best paper award.",
year="2021"} ]
(Also appears in Security)
-
Handling bidirectional control flow
Effectful effect handlers? Yes, with a type system to defend abstractions.
2020 ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA),
November 2020.
Yizhou Zhang, Guido Salvaneschi, and Andrew C. Myers.
[ ×@inproceedings{zsm20,
title="Handling bidirectional control flow",
author="Yizhou Zhang and Guido Salvaneschi and Andrew C. Myers",
booktitle="2020 ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA)",
url="http://www.cs.cornell.edu/andru/papers/ufo",
month="November",
year="2020"} ]
-
Trust, authority, and information flow in secure distributed systems
Ph.D. dissertation, Cornell University,
October 2020.
Michael D. George.
[ ×@phdthesis{mdg-thesis,
title="Trust, authority, and information flow in secure distributed systems",
author="Michael D. George",
url="http://www.cs.cornell.edu/andru/papers/mdg-thesis.pdf",
month="October",
year="2020"} ]
(Also appears in Security)
-
Programming safely with weak (and strong) consistency
Ph.D. dissertation, Cornell University,
August 2020.
Mae Milano.
[ ×@phdthesis{milano-thesis,
title="Programming safely with weak (and strong) consistency",
author="Mae Milano",
url="http://languagesforsyste.ms/files/thesis.pdf",
month="August",
year="2020"} ]
(Also appears in Distribution and Persistence)
-
Securing smart contracts with information flow
Information-flow control provides compositional security for smart contracts.
3rd Int'l Symp. on Foundations and Applications of Blockchain (FAB),
April 2020.
Ethan Cecchetti, Siqiu Yao, Haobin Ni, and Andrew C. Myers.
[ ×@inproceedings{cecchetti-fab20,
title="Securing smart contracts with information flow",
author="Ethan Cecchetti and Siqiu Yao and Haobin Ni and Andrew C. Myers",
booktitle="3rd Int'l Symp. on Foundations and Applications of Blockchain (FAB)",
url="http://www.cs.cornell.edu/andru/papers/fab20",
month="April",
year="2020"} ]
(Also appears in Security)
-
ALSO Reference Manual
Technical memo,
November 2019.
Andrew C. Myers.
[ ×@misc{also-manual,
title="ALSO Reference Manual",
author="Andrew C. Myers",
url="http://www.cs.cornell.edu/andru/papers/also-manual.pdf",
month="November",
year="2019"}
| A-mudproject ]
(Also appears in Distribution and Persistence)
-
Designing flexible, modular linguistic abstractions
Ph.D. dissertation, Cornell University,
August 2019.
Yizhou Zhang.
[ ×@phdthesis{yizhou-dissertation,
title="Designing flexible, modular linguistic abstractions",
author="Yizhou Zhang",
url="http://www.cs.cornell.edu/andru/papers/yizhou-dissertation.pdf",
month="August",
year="2019"} ]
-
A tour of Gallifrey, a language for geodistributed programming
New mechanisms for merging, branching, and
computing on orthogonally replicated state.
3rd Summit on Advances in Programming Languages (SNAPL),
May 2019.
Mae Milano, Rolph Recto, Tom Magrino, and Andrew C. Myers.
[ ×@inproceedings{gallifrey,
title="A tour of Gallifrey, a language for geodistributed programming",
author="Mae Milano and Rolph Recto and Tom Magrino and Andrew C. Myers",
booktitle="3rd Summit on Advances in Programming Languages (SNAPL)",
url="https://drops.dagstuhl.de/storage/00lipics/lipics-vol136-snapl2019/LIPIcs.SNAPL.2019.11/LIPIcs.SNAPL.2019.11.pdf",
month="May",
year="2019"} ]
(Also appears in Distribution and Persistence)
-
Abstraction-safe effect handlers via tunneling
Fixing the modularity of algebraic effects (and exceptions, dynamic scope, ...)
Proc. ACM on Programming Languages, 3(POPL),
January 2019.
Yizhou Zhang and Andrew C. Myers.
[ ×@article{zm18,
title="Abstraction-safe effect handlers via tunneling",
author="Yizhou Zhang and Andrew C. Myers",
journal="Proc. ACM on Programming Languages",
volume="3",
number="POPL",
url="http://www.cs.cornell.edu/andru/papers/tunnel-eff",
month="January",
year="2019"} ]
-
Familia: Unifying interfaces, type classes, and family polymorphism
A lot of polymorphism and extensibility in a lightweight package
2017 ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA),
October 2017.
Yizhou Zhang and Andrew C. Myers.
[ ×@inproceedings{familia,
title="Familia: Unifying interfaces, type classes, and family polymorphism",
author="Yizhou Zhang and Andrew C. Myers",
booktitle="2017 ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA)",
url="http://www.cs.cornell.edu/andru/papers/familia",
month="October",
year="2017"} ]
-
SHErrLoc: A static holistic error locator
Using Bayesian principles to accurately localize errors reported by type systems and program analyses
ACM Trans. on Programming Languages and Systems, 39(4):18,
August 2017.
Danfeng Zhang, Andrew C. Myers, Dimitrios Vytiniotis, and Simon Peyton Jones.
[ ×@article{sherrloc,
title="SHErrLoc: A static holistic error locator",
author="Danfeng Zhang and Andrew C. Myers and Dimitrios Vytiniotis
and Peyton Jones, Simon",
journal="ACM Trans. on Programming Languages and Systems",
volume="39",
number="4",
url="https://www.cs.cornell.edu/andru/papers/sherrloc/sherrloc-toplas.pdf",
pages="18",
month="August",
year="2017"} ]
-
Composable compilers: evolution toward a practical reality
Ph.D. dissertation, Cornell University,
August 2017.
Chinawat Isradisaikul.
[ ×@phdthesis{chin-dissertation,
title="Composable compilers: evolution toward a practical reality",
author="Chinawat Isradisaikul",
url="https://www.cs.cornell.edu/andru/papers/chin-dissert.pdf",
month="August",
year="2017"} ]
-
Secure information flow verification with mutable dependent types
Fully compile-time enforcement of dependent labels in a security-typed HDL
54th Design Automation Conference (DAC),
June 2017.
Andrew Ferraiuolo, Weizhe Hua, Andrew C. Myers, and G. Edward Suh.
[ ×@inproceedings{FHMS17,
title="Secure information flow verification with mutable dependent types",
author="Andrew Ferraiuolo and Weizhe Hua and Andrew C. Myers and G. Edward Suh",
booktitle="54th Design Automation Conference (DAC)",
url="https://people.ece.cornell.edu/af433/pdf/ferraiuolo-dac-17.pdf",
month="June",
year="2017"} ]
(Also appears in Security)
-
Fabric: Building open distributed systems securely by construction
A secure, decentralized, distributed programming system
based on information flow control
J. Computer Security, 25(4–5):319–321,
May 2017.
Jed Liu, Owen Arden, Michael D. George, and Andrew C. Myers.
[ ×@article{jfabric,
title="Fabric: Building open distributed systems securely by construction",
author="Jed Liu and Owen Arden and Michael D. George and Andrew C. Myers",
journal="J. Computer Security",
volume="25",
number="4–5",
url="http://www.cs.cornell.edu/andru/papers/jfabric",
pages="319–321",
month="May",
year="2017"} ]
(Also appears in Security)
-
Teaching programming with gamified semantics
A game for teaching programming, based on small-step operational semantics
ACM CHI Conf. on Human Factors in Computing Systems,
May 2017.
Ian Arawjo, Cheng-Yao Wang, Andrew C. Myers, Erik Andersen, and François Guimbretière.
[ ×@inproceedings{reduct-chi17,
title="Teaching programming with gamified semantics",
author="Ian Arawjo and Cheng-Yao Wang and Andrew C. Myers and Erik Andersen and François Guimbretière",
booktitle="ACM CHI Conf. on Human Factors in Computing Systems",
url="http://www.cs.cornell.edu/andru/papers/reduct-chi17",
month="May",
year="2017"} ]
-
Verification of a practical hardware security architecture through static information flow analysis
Verifying information flow in an implementation of the TrustZone architecture
Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS),
April 2017.
Andrew Ferraiuolo, Rui Xu, Danfeng Zhang, Andrew C. Myers, and G. Edward Suh.
[ ×@inproceedings{trustzone-secverilog,
title="Verification of a practical hardware security architecture through static information flow analysis",
author="Andrew Ferraiuolo and Rui Xu and Danfeng Zhang and Andrew C. Myers and
G. Edward Suh",
booktitle="Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS)",
url="http://www.cs.cornell.edu/andru/papers/trustzone",
month="April",
year="2017"}
| SecVerilogproject| TR ]
(Also appears in Security)
-
Safe serializable secure scheduling: transactions and the trade-off between security and consistency
A side channel created by an intrinsic conflict between consistency and security, and a fix
23rd ACM Conf. on Computer and Communications Security (CCS),
pp. 229–241,
October 2016.
Isaac Sheff, Tom Magrino, Jed Liu, Andrew C. Myers, and Robbert Van Renesse.
[ ×@inproceedings{abrtchan,
title="Safe serializable secure scheduling: transactions and the trade-off between security and consistency",
author="Isaac Sheff and Tom Magrino and Jed Liu and Andrew C. Myers and Robbert Van Renesse",
booktitle="23rd ACM Conf. on Computer and Communications Security (CCS)",
url="http://www.cs.cornell.edu/andru/papers/abrtchan",
pages="229–241",
month="October",
year="2016"}
| Fabricproject ]
(Also appears in Security)
-
Mixing consistency in geodistributed transactions: technical report
Technical report 1813-44710, Cornell University Computing and Information Science,
October 2016.
Mae Milano and Andrew C. Myers.
[ ×@techreport{mm16-tr,
title="Mixing consistency in geodistributed transactions: technical report",
author="Mae Milano and Andrew C. Myers",
institution="Cornell University Computing and Information Science",
number="1813-44710",
url="http://hdl.handle.net/1813/44710",
month="October",
year="2016"} ]
(Also appears in Distribution and Persistence)
-
Accepting blame for safe tunneled exceptions
The flexibility of unchecked exceptions, the static guarantees of
checked exceptions, and good performance too.
37th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
pp. 281–295,
June 2016.
Yizhou Zhang, Guido Salvaneschi, Quinn Beightol, Barbara Liskov, and Andrew C. Myers.
[ ×@inproceedings{exceptions-pldi16,
title="Accepting blame for safe tunneled exceptions",
author="Yizhou Zhang and Guido Salvaneschi and Quinn Beightol and Barbara Liskov and Andrew C. Myers",
booktitle="37th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/exceptions",
pages="281–295",
month="June",
year="2016"}
| Genusproject| TR ]
-
A calculus for flow-limited authorization
A language that uses information flow to check the code of authorization mechanisms.
29th IEEE Computer Security Foundations Symp. (CSF),
pp. 135–147,
June 2016.
Owen Arden and Andrew C. Myers.
[ ×@inproceedings{flac,
title="A calculus for flow-limited authorization",
author="Owen Arden and Andrew C. Myers",
booktitle="29th IEEE Computer Security Foundations Symp. (CSF)",
url="http://www.cs.cornell.edu/andru/papers/flac",
pages="135–147",
month="June",
year="2016"}| TR ]
(Also appears in Security)
-
Accepting blame: expressive checked exceptions
Technical report 1813–43784, Cornell University Computing and Information Science,
April 2016.
Yizhou Zhang, Guido Salvaneschi, Quinn Beightol, Barbara Liskov, and Andrew C. Myers.
[ ×@techreport{exceptions-TR,
title="Accepting blame: expressive checked exceptions",
author="Yizhou Zhang and Guido Salvaneschi and Quinn Beightol and Barbara Liskov and Andrew C. Myers",
institution="Cornell University Computing and Information Science",
number="1813–43784",
url="http://hdl.handle.net/1813/43784",
month="April",
year="2016"} ]
-
JRIF: reactive information flow control for Java
Specifying information flow policies with reactive information-flow automata
Technical report 1813–41194, Cornell University Computing and Information Science,
February 2016.
Elisavet Kozyri, Owen Arden, Andrew C. Myers, and Fred B. Schneider.
[ ×@techreport{jrif-tr,
title="JRIF: reactive information flow control for Java",
author="Kozyri, Elisavet and Arden, Owen and Myers, Andrew C. and Schneider, Fred B.",
institution="Cornell University Computing and Information Science",
number="1813–41194",
url="https://ecommons.cornell.edu/handle/1813/41194",
month="February",
year="2016"} ]
(Also appears in Security)
-
Flow-limited authorization
Ph.D. dissertation, Cornell University,
2016.
Owen Arden.
[ ×@phdthesis{owen-thesis,
title="Flow-limited authorization",
author="Owen Arden",
url="http://www.cs.cornell.edu/andru/papers/FLA_OwenArden.pdf",
year="2016"}
| Fabricproject ]
(Also appears in Security)
-
Sound and practical methods for full-system timing channel control
Ph.D. dissertation, Cornell University Department of Computer Science,
August 2015.
Danfeng Zhang.
[ ×@phdthesis{zhangdf-thesis,
title="Sound and practical methods for full-system timing channel control",
author="Danfeng Zhang",
url="http://www.cs.cornell.edu/andru/papers/zhangdf-thesis.pdf",
month="August",
year="2015"}
| SecVerilogproject ]
(Also appears in Security)
-
Building distributed systems with information flow control
Ph.D. dissertation, Cornell University Department of Computer Science,
August 2015.
K. Vikram.
[ ×@phdthesis{vikram-thesis,
title="Building distributed systems with information flow control",
author="K. Vikram",
url="http://www.cs.cornell.edu/andru/papers/kv-thesis.pdf",
month="August",
year="2015"}
| Fabricproject ]
(Also appears in Security)
-
Flow-limited authorization
An expressive logic for reasoning about the interaction between
authorization and information flow.
28th IEEE Computer Security Foundations Symp. (CSF),
pp. 569–583,
July 2015.
Owen Arden, Jed Liu, and Andrew C. Myers.
[ ×@inproceedings{flam,
title="Flow-limited authorization",
author="Owen Arden and Jed Liu and Andrew C. Myers",
booktitle="28th IEEE Computer Security Foundations Symp. (CSF)",
url="http://www.cs.cornell.edu/andru/papers/flam",
pages="569–583",
month="July",
year="2015"}| TR| slides ]
(Also appears in Security)
-
Diagnosing type errors with class
SHErrLoc can effectively localize type errors in the rich type system of Haskell, despite type classes and quantification.
36th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
pp. 12–21,
June 2015.
(ACM SIGPLAN Distinguished Paper Award.)
Danfeng Zhang, Andrew C. Myers, Dimitrios Vytiniotis, and Simon Peyton Jones.
[ ×@inproceedings{zmvp15,
title="Diagnosing type errors with class",
author="Danfeng Zhang and Andrew C. Myers and Dimitrios Vytiniotis and Simon Peyton Jones",
booktitle="36th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/tc_diagnost",
pages="12–21",
month="June",
year="2015"}
| SHErrLocproject| TR ]
-
Finding counterexamples from parsing conflicts
A practical way for LALR parsers to illustrate parsing conflicts with counterexamples.
36th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
pp. 555–564,
June 2015.
Chinawat Isradisaikul and Andrew C. Myers.
[ ×@inproceedings{im15,
title="Finding counterexamples from parsing conflicts",
author="Chinawat Isradisaikul and Andrew C. Myers",
booktitle="36th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/cupex",
pages="555–564",
month="June",
year="2015"}
| Polyglotproject ]
-
Genus: making generics object-oriented, expressive, and lightweight
Technical report 1813–39910, Cornell University Computing and Information Science,
June 2015.
Yizhou Zhang, Matthew C. Loring, Guido Salvaneschi, Barbara Liskov, and Andrew C. Myers.
[ ×@techreport{genus-TR,
title="Genus: making generics object-oriented, expressive, and lightweight",
author="Yizhou Zhang and Matthew C. Loring and Guido Salvaneschi and Barbara Liskov and Andrew C. Myers",
institution="Cornell University Computing and Information Science",
number="1813–39910",
url="http://hdl.handle.net/1813/39910",
month="June",
year="2015"}
| Genusproject ]
-
Lightweight, flexible object-oriented generics
An expressive, lightweight genericity mechanism with better code reuse and stronger static checking.
36th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
pp. 436–445,
June 2015.
Yizhou Zhang, Matthew C. Loring, Guido Salvaneschi, Barbara Liskov, and Andrew C. Myers.
[ ×@inproceedings{genus-pldi15,
title="Lightweight, flexible object-oriented generics",
author="Yizhou Zhang and Matthew C. Loring and Guido Salvaneschi and Barbara Liskov and Andrew C. Myers",
booktitle="36th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/genus",
pages="436–445",
month="June",
year="2015"}
| Genusproject| TR ]
-
Diagnosing Haskell type errors
Technical report 1813–39907, Cornell University Computing and Information Science,
April 2015.
Danfeng Zhang, Andrew C. Myers, Dimitrios Vytiniotis, and Simon Peyton Jones.
[ ×@techreport{zmvp15tr,
title="Diagnosing Haskell type errors",
author="Danfeng Zhang and Andrew C. Myers and Dimitrios Vytiniotis and Simon Peyton Jones",
institution="Cornell University Computing and Information Science",
number="1813–39907",
url="http://hdl.handle.net/1813/39907",
month="April",
year="2015"}
| SHErrLocproject ]
-
A hardware design language for timing-sensitive information-flow security
SecVerilog: a security-typed hardware design language for building hardware without leaks or timing channels.
Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS),
pp. 503–516,
March 2015.
Danfeng Zhang, Yao Wang, G. Edward Suh, and Andrew C. Myers.
[ ×@inproceedings{zwsm15,
title="A hardware design language for timing-sensitive information-flow security",
author="Danfeng Zhang and Yao Wang and G. Edward Suh and Andrew C. Myers",
booktitle="Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS)",
url="http://www.cs.cornell.edu/andru/papers/asplos15",
pages="503–516",
month="March",
year="2015"}
| SecVerilogproject| TR ]
(Also appears in Security)
-
A calculus for flow-limited authorization: technical report
Technical report 1813–42406, Cornell University Computing and Information Science,
February 2015.
Owen Arden and Andrew C. Myers.
[ ×@techreport{flac-tr,
title="A calculus for flow-limited authorization: technical report",
author="Owen Arden and Andrew C. Myers",
institution="Cornell University Computing and Information Science",
number="1813–42406",
url="http://hdl.handle.net/1813/42406",
month="February",
year="2015"} ]
(Also appears in Security)
-
Toward general diagnosis of static errors: technical report
Technical report 1813–33742, Cornell University,
August 2014.
Danfeng Zhang and Andrew C. Myers.
[ ×@techreport{zm14-popl-TR,
title="Toward general diagnosis of static errors: technical report",
author="Danfeng Zhang and Andrew C. Myers",
institution="Cornell University",
number="1813–33742",
url="http://hdl.handle.net/1813/33742",
month="August",
year="2014"} ]
-
Toward general diagnosis of static errors
Diagnosing maximum-likelihood program error locations from constraint system failures.
41st ACM Symp. on Principles of Programming Languages (POPL),
pp. 569–581,
January 2014.
Danfeng Zhang and Andrew C. Myers.
[ ×@inproceedings{zm14,
title="Toward general diagnosis of static errors",
author="Danfeng Zhang and Andrew C. Myers",
booktitle="41st ACM Symp. on Principles of Programming Languages (POPL)",
url="http://www.cs.cornell.edu/andru/papers/diagnostic",
pages="569–581",
month="January",
year="2014"}
| SHErrLocproject ]
-
Reconciling exhaustive pattern matching with objects
Pattern matching that verifies exhaustiveness and redundancy can
coexist with data abstraction and subtyping.
34th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
pp. 343–354,
June 2013.
(ACM SIGPLAN Distinguished Paper Award.)
Chinawat Isradisaikul and Andrew C. Myers.
[ ×@inproceedings{jmatch3,
title="Reconciling exhaustive pattern matching with objects",
author="Chinawat Isradisaikul and Andrew C. Myers",
booktitle="34th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/jmatch3",
pages="343–354",
month="June",
year="2013"}
| Project| TR ]
-
Reconciling exhaustive pattern matching with objects
Technical report 1813–33123, Computing and Information Science, Cornell University,
March 2013.
Chinawat Isradisaikul and Andrew C. Myers.
[ ×@techreport{jmatch3-tr,
title="Reconciling exhaustive pattern matching with objects",
author="Chinawat Isradisaikul and Andrew C. Myers",
institution="Computing and Information Science, Cornell University",
number="1813–33123",
url="http://hdl.handle.net/1813/33123",
month="March",
year="2013"} ]
-
Homogeneous family sharing
25th ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA),
pp. 520–538,
October 2010.
Xin Qi and Andrew C. Myers.
[ ×@inproceedings{jhs,
title="Homogeneous family sharing",
author="Xin Qi and Andrew C. Myers",
booktitle="25th ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA)",
url="http://www.cs.cornell.edu/andru/papers/fam-sharing.html",
pages="520–538",
month="October",
year="2010"}
| J&project| TR ]
-
Homogeneous family sharing: technical report
Technical report 1813–15845, Computing and Information Science, Cornell University,
July 2010.
Xin Qi and Andrew C. Myers.
[ ×@techreport{jhs-techreport,
title="Homogeneous family sharing: technical report",
author="Xin Qi and Andrew C. Myers",
institution="Computing and Information Science, Cornell University",
number="1813–15845",
url="http://hdl.handle.net/1813/15845",
month="July",
year="2010"}
| J&project ]
-
Language support for reliable, extensible large-scale software systems
Ph.D. dissertation, Cornell University Department of Computer Science,
January 2010.
Xin Qi.
[ ×@phdthesis{qi-thesis,
title="Language support for reliable, extensible large-scale software systems",
author="Xin Qi",
url="http://www.cs.cornell.edu/andru/papers/qixin-thesis.pdf",
month="January",
year="2010"} ]
-
Sharing classes between families: technical report
Technical report 1813–12141, Computing and Information Science, Cornell University,
March 2009.
Xin Qi and Andrew C. Myers.
[ ×@techreport{jets-techreport,
title="Sharing classes between families: technical report",
author="Xin Qi and Andrew C. Myers",
institution="Computing and Information Science, Cornell University",
number="1813–12141",
url="http://hdl.handle.net/1813/12141",
month="March",
year="2009"} ]
-
Masked types for sound object initialization
36th ACM Symp. on Principles of Programming Languages (POPL),
pp. 53–65,
January 2009.
Xin Qi and Andrew C. Myers.
[ ×@inproceedings{jmask,
title="Masked types for sound object initialization",
author="Xin Qi and Andrew C. Myers",
booktitle="36th ACM Symp. on Principles of Programming Languages (POPL)",
url="http://www.cs.cornell.edu/andru/papers/masked-types.html",
pages="53–65",
month="January",
year="2009"}
| J\maskproject| TR| slides ]
-
Sharing classes between families
ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
pp. 281–292,
2009.
Xin Qi and Andrew C. Myers.
[ ×@inproceedings{jets,
title="Sharing classes between families",
author="Xin Qi and Andrew C. Myers",
booktitle="ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/class-sharing.html",
pages="281–292",
year="2009"} ]
-
Masked types
Technical report http://hdl.handle.net/1813/11563, Computing and Information Science, Cornell University,
October 2008.
Xin Qi and Andrew C. Myers.
[ ×@techreport{jmask-techreport,
title="Masked types",
author="Xin Qi and Andrew C. Myers",
institution="Computing and Information Science, Cornell University",
number="http://hdl.handle.net/1813/11563",
url="http://hdl.handle.net/1813/11563",
month="October",
year="2008"}
| J\maskproject ]
-
Expressive and enforceable information security policies
Ph.D. dissertation, Cornell University Department of Computer Science,
August 2008.
Stephen Chong.
[ ×@phdthesis{chong-thesis,
title="Expressive and enforceable information security policies",
author="Stephen Chong",
url="http://people.seas.harvard.edu/don't know how to expand macro hong/pubs/chong_dissertation.pdf",
month="August",
year="2008"} ]
(Also appears in Security)
-
Making distributed computation secure by construction
Ph.D. dissertation, Cornell University Department of Computer Science,
January 2007.
Lantian Zheng.
[ ×@phdthesis{zheng-thesis,
title="Making distributed computation secure by construction",
author="Lantian Zheng",
url="http://www.cs.cornell.edu/andru/papers/lantian-thesis.pdf",
month="January",
year="2007"} ]
(Also appears in Security)
-
Programming languages for scalable software extension and
composition
Ph.D. dissertation, Cornell University Department of Computer Science,
October 2006.
Nathaniel Nystrom.
[ ×@phdthesis{nystrom-phdthesis,
title="Programming languages for scalable software extension and
composition",
author="Nathaniel Nystrom",
url="http://ecommons.library.cornell.edu/handle/1813/3726",
month="October",
year="2006"} ]
-
J&: nested intersection for scalable software composition
21st ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA),
pp. 21–36,
October 2006.
Nathaniel Nystrom, Xin Qi, and Andrew C. Myers.
[ ×@inproceedings{nqm06,
title="J&: nested intersection for scalable software composition",
author="Nathaniel Nystrom and Xin Qi and Andrew C. Myers",
booktitle="21st ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA)",
url="http://www.cs.cornell.edu/andru/papers/compose.pdf",
pages="21–36",
month="October",
year="2006"}
| J&project ]
-
Nested intersection for scalable software composition
Technical report , Computer Science Dept., Cornell University,
September 2006.
Nathaniel Nystrom, Xin Qi, and Andrew C. Myers.
[ ×@techreport{jxmi-techreport,
title="Nested intersection for scalable software composition",
author="Nathaniel Nystrom and Xin Qi and Andrew C. Myers",
institution="Computer Science Dept., Cornell University",
number="",
url="http://www.cs.cornell.edu/andru/papers/jet-tr.pdf",
month="September",
year="2006"} ]
-
Jif 3.0: Java information flow
Software release,
July 2006.
Andrew C. Myers, Lantian Zheng, Steve Zdancewic, Stephen Chong, and Nathaniel Nystrom.
[ ×@software{jif,
title="Jif 3.0: Java information flow",
author="Andrew C. Myers and Lantian Zheng and Steve Zdancewic and
Stephen Chong and Nathaniel Nystrom",
url="http://www.cs.cornell.edu/jif",
month="July",
year="2006"}
| Jifproject ]
(Also appears in Security)
-
Interruptible iterators
33rd ACM Symp. on Principles of Programming Languages (POPL),
pp. 283–294,
January 2006.
Jed Liu, Aaron Kimball, and Andrew C. Myers.
[ ×@inproceedings{jmatch2,
title="Interruptible iterators",
author="Liu, Jed and Kimball, Aaron and Myers, Andrew C.",
booktitle="33rd ACM Symp. on Principles of Programming Languages (POPL)",
url="http://www.cs.cornell.edu/andru/papers/jmatch2.pdf",
pages="283–294",
month="January",
year="2006"} ]
-
Scalable extensibility via nested inheritance
19th ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA),
pp. 99–115,
October 2004.
Nathaniel Nystrom, Stephen Chong, and Andrew C. Myers.
[ ×@inproceedings{ncm04,
title="Scalable extensibility via nested inheritance",
author="Nathaniel Nystrom and Stephen Chong and Andrew C. Myers",
booktitle="19th ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA)",
url="http://www.cs.cornell.edu/andru/papers/ncm04.pdf",
pages="99–115",
month="October",
year="2004"} ]
-
Scalable extensibility via nested inheritance
Technical report 2004–1940, Computer Science Dept., Cornell University,
June 2004.
Nathaniel Nystrom, Stephen Chong, and Andrew C. Myers.
[ ×@techreport{nestinh-soundness,
title="Scalable extensibility via nested inheritance",
author="Nathaniel Nystrom and Stephen Chong and Andrew C. Myers",
institution="Computer Science Dept., Cornell University",
number="2004–1940",
url="http://techreports.library.cornell.edu:8081/Dienst/UI/1.0/Display/cul.cis/TR2004-1940",
month="June",
year="2004"} ]
-
Polyglot: an extensible compiler framework for Java
12th Int'l Conf. on Compiler Construction (CC'03),
pp. 138–152,
April 2003.
Nathaniel Nystrom, Michael R. Clarkson, and Andrew C. Myers.
[ ×@inproceedings{ncm03,
title="Polyglot: an extensible compiler framework for Java",
author="Nathaniel Nystrom and Michael R. Clarkson and Andrew C. Myers",
booktitle="12th Int'l Conf. on Compiler Construction (CC'03)",
url="http://www.cs.cornell.edu/andru/papers/polyglot.pdf",
pages="138–152",
month="April",
year="2003"}
| Polyglotproject ]
-
JMatch: iterable abstract pattern matching for Java
5th International Symposium on Practical Aspects of Declarative Languages,
pp. 110–127,
January 2003.
Jed Liu and Andrew C. Myers.
[ ×@inproceedings{jmatch-padl03,
title="JMatch: iterable abstract pattern matching for Java",
author="Jed Liu and Andrew C. Myers",
booktitle="5th International Symposium on Practical Aspects of Declarative Languages",
url="http://www.cs.cornell.edu/andru/papers/padl03.pdf",
pages="110–127",
month="January",
year="2003"}
| JMatchproject ]
-
JMatch: Java plus pattern matching
Technical report 2002-1878, Computer Science Department, Cornell University,
October 2002.
Jed Liu and Andrew C. Myers.
[ ×@techreport{jmatch-tr,
title="JMatch: Java plus pattern matching",
author="Jed Liu and Andrew C. Myers",
institution="Computer Science Department, Cornell University",
number="2002-1878",
url="http://www.cs.cornell.edu/projects/jmatch/jmatch.pdf",
month="October",
year="2002"}
| JMatchproject ]
-
Programming languages for information security
Ph.D. dissertation, Cornell University Department of Computer Science,
August 2002.
Steve Zdancewic.
[ ×@phdthesis{zdance-thesis,
title="Programming languages for information security",
author="Steve Zdancewic",
url="http://www.cis.upenn.edu/don't know how to expand macro tevez/papers/Zda02.pdf",
month="August",
year="2002"} ]
(Also appears in Security)
-
JFlow: practical mostly-static information flow control
26th ACM Symp. on Principles of Programming Languages (POPL),
pp. 228–241,
January 1999.
(ACM POPL Most Influential Paper Award, 2009.)
Andrew C. Myers.
[ ×@inproceedings{myers-popl99,
title="JFlow: practical mostly-static information flow control",
author="Andrew C. Myers",
booktitle="26th ACM Symp. on Principles of Programming Languages (POPL)",
url="http://www.cs.cornell.edu/andru/papers/popl99/popl99.pdf",
pages="228–241",
month="January",
year="1999"}| slides ]
(Also appears in Security)
-
PolyJ: Parameterized types for Java
Software release,
July 1998.
Andrew C. Myers, Barbara Liskov, and Nicholas Mathewson.
[ ×@software{polyj,
title="PolyJ: Parameterized types for Java",
author="Andrew C. Myers and Barbara Liskov and Nicholas Mathewson",
url="http://www.cs.cornell.edu/polyj",
month="July",
year="1998"}
| PolyJproject ]
-
Parameterized types for Java
24th ACM Symp. on Principles of Programming Languages (POPL),
pp. 132–145,
January 1997.
Andrew C. Myers, Joseph A. Bank, and Barbara Liskov.
[ ×@inproceedings{java-popl97,
title="Parameterized types for Java",
author="Andrew C. Myers and Joseph A. Bank and Barbara Liskov",
booktitle="24th ACM Symp. on Principles of Programming Languages (POPL)",
url="http://www.cs.cornell.edu/andru/papers/popl97/popl97.html",
pages="132–145",
month="January",
year="1997"}
| Project ]
-
ALSO: a language for extensible multi-user systems
1996 MIT Student Workshop on Scalable Computing,
August 1996.
Andrew C. Myers.
[ ×@misc{ALSO,
title="ALSO: a language for extensible multi-user systems",
author="Andrew C. Myers",
url="http://www.cs.cornell.edu/andru/papers/myers-mitsw96.pdf",
month="August",
year="1996"}
| A-mudproject| Manual ]
(Also appears in Distribution and Persistence)
-
Subtypes vs. where clauses: constraining parametric polymorphism
10th ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA),
pp. 156–168,
October 1995.
Mark Day, Robert Gruber, Barbara Liskov, and Andrew C. Myers.
[ ×@inproceedings{where-clauses,
title="Subtypes vs. where clauses: constraining parametric polymorphism",
author="Mark Day and Robert Gruber and
Barbara Liskov and Andrew C. Myers",
booktitle="10th ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA)",
url="http://www.cs.cornell.edu/andru/papers/where-clauses.pdf",
pages="156–168",
month="October",
year="1995"} ]
-
Bidirectional object layout for separate compilation
10th ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA),
pp. 124–139,
October 1995.
Andrew C. Myers.
[ ×@inproceedings{bidirectional,
title="Bidirectional object layout for separate compilation",
author="Andrew C. Myers",
booktitle="10th ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA)",
url="http://www.cs.cornell.edu/andru/papers/bidirectional/bidirectional.pdf",
pages="124–139",
month="October",
year="1995"} ]
-
Efficient implementation of parameterized types despite subtyping
Thor Design Note 9,
June 1994.
Andrew C. Myers and Barbara Liskov.
[ ×@misc{ptypes94,
title="Efficient implementation of parameterized types despite subtyping",
author="Andrew C. Myers and Barbara Liskov",
url="http://www.cs.cornell.edu/andru/papers/ptypes.pdf",
month="June",
year="1994"} ]
-
Abstraction mechanisms in Theta
Programming Methodology Group Memo 81,
February 1994.
Mark Day, Robert Gruber, Barbara Liskov, and Andrew C. Myers.
[ ×@misc{theta-abstraction,
title="Abstraction mechanisms in Theta",
author="Mark Day and Robert Gruber and Barbara Liskov and Andrew C. Myers",
url="http://www.cs.cornell.edu/andru/papers/theta-abstractions.pdf",
month="February",
year="1994"} ]
-
Theta reference manual
Technical report 88, MIT Laboratory for Computer Science Programming Methodology Group,
February 1994.
Barbara Liskov, Dorothy Curtis, Mark Day, Sanjay Ghemawat, Robert Gruber, Paul Johnson, and Andrew C. Myers.
[ ×@techreport{theta,
title="Theta reference manual",
author="Barbara Liskov and Dorothy Curtis and Mark Day and
Sanjay Ghemawat and Robert Gruber and Paul Johnson and
Andrew C. Myers",
institution="MIT Laboratory for Computer Science Programming Methodology Group",
number="88",
url="http://www.cs.cornell.edu/andru/papers/thetaref.pdf",
month="February",
year="1994"} ]
-
A meta-object protocol for parameterized types
Presented at the OOPSLA '94 Multi-Language Object Models Workshop,
1994.
Andrew C. Myers.
[ ×@unpublished{myers-metaobj,
title="A meta-object protocol for parameterized types",
author="Andrew C. Myers",
url="http://www.pmg.lcs.mit.edu/papers/typeobj-param.pdf",
year="1994"} ]
The papers distributed here have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.