-
Secure synthesis of distributed cryptographic applications
Provably secure and correct compilation to cryptographic mechanisms
IEEE Computer Security Foundations Symp. (CSF),
July 2024.
Coşku Acay, Joshua Gancher, Rolph Recto, and Andrew C. Myers.
[ ×@inproceedings{viaduct-formal,
title="Secure synthesis of distributed cryptographic applications",
author="Coşku Acay and Joshua Gancher and Rolph Recto and Andrew C. Myers",
booktitle="IEEE Computer Security Foundations Symp. (CSF)",
url="http://www.cs.cornell.edu/andru/papers/viaduct-formal",
month="July",
year="2024"} ]
-
Charlotte: reformulating blockchains into a web of composable attested data structures for cross-domain applications
A proto-blockchain for building and composing blockchain-like systems.
ACM Trans. on Computer Systems, 41(1–4):1–52,
December 2023.
Isaac Sheff, Xinwen Wang, Kushal Babel, Haobin Ni, Robbert van Renesse, and Andrew C. Myers.
[ ×@article{charlotte,
title="Charlotte: reformulating blockchains into a web of composable attested data structures for cross-domain applications",
author="Isaac Sheff and Xinwen Wang and Kushal Babel and Haobin Ni
and Robbert van Renesse and Andrew C. Myers",
journal="ACM Trans. on Computer Systems",
volume="41",
number="1–4",
url="http://www.cs.cornell.edu/andru/papers/charlotte",
pages="1–52",
month="December",
year="2023"} ]
-
SpecVerilog: Adapting information flow control for secure speculation
Enforcing secure speculation in Verilog code via information flow
30th ACM Conf. on Computer and Communications Security (CCS),
November 2023.
Distinguished paper award.
Drew Zagieboylo, Charles Sherk, Andrew C. Myers, and G. Edward Suh.
[ ×@inproceedings{specverilog,
title="SpecVerilog: Adapting information flow control for secure speculation",
author="Drew Zagieboylo and Charles Sherk and Andrew C. Myers and
G. Edward Suh",
booktitle="30th ACM Conf. on Computer and Communications Security (CCS)",
url="http://www.cs.cornell.edu/andru/papers/specverilog",
month="November",
note="Distinguished paper award.",
year="2023"} ]
-
A flexible type system for fearless concurrency
Fearless concurrent programming without restrictions of prior type-based solutions.
43rd ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
June 2022.
Mae Milano, Joshua Turcotti, and Andrew C. Myers.
[ ×@inproceedings{mtc22,
title="A flexible type system for fearless concurrency",
author="Mae Milano and Joshua Turcotti and Andrew C. Myers",
booktitle="43rd ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/gallifrey-types",
month="June",
year="2022"} ]
-
PDL: a high-level hardware design language for pipelined processors
Write sequential code for instructions, get a pipelined processor implementation.
43rd ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
June 2022.
Drew Zagieboylo, Charles Sherk, G. Edward Suh, and Andrew C. Myers.
[ ×@inproceedings{pdl22,
title="PDL: a high-level hardware design language for pipelined processors",
author="Drew Zagieboylo and Charles Sherk and G. Edward Suh and Andrew C. Myers",
booktitle="43rd ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/pdl",
month="June",
year="2022"} ]
-
Expressing information flow properties
A survey of research on information-flow properties
Foundations and Trends in Privacy and Security, 3(1):1–102,
2022.
Eliza Kozyri, Stephen Chong, and Andrew C. Myers.
[ ×@article{iflow-properties,
title="Expressing information flow properties",
author="Eliza Kozyri and Stephen Chong and Andrew C. Myers",
journal="Foundations and Trends in Privacy and Security",
volume="3",
number="1",
url="http://www.cs.cornell.edu/andru/papers/now-info-flow/now-info-flow.pdf",
pages="1–102",
year="2022"} ]
-
Viaduct: an extensible, optimizing compiler for secure distributed programs
Automatically synthesizing cryptography from information flow specifications
42nd ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
pp. 740–755,
June 2021.
Coşku Acay, Rolph Recto, Joshua Gancher, Andrew Myers, and Elaine Shi.
[ ×@inproceedings{viaduct-pldi21,
title="Viaduct: an extensible, optimizing compiler for secure distributed programs",
author="Coşku Acay and Rolph Recto and Joshua Gancher and Andrew Myers and Elaine Shi",
booktitle="42nd ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/viaduct/",
pages="740–755",
month="June",
year="2021"} ]
-
Compositional security for reentrant applications
Extending information flow control to provably handle reentrancy
IEEE Symp. on Security and Privacy,
May 2021.
Best paper award.
Ethan Cecchetti, Siqiu Yao, Haobin Ni, and Andrew C. Myers.
[ ×@inproceedings{serif21,
title="Compositional security for reentrant applications",
author="Ethan Cecchetti and Siqiu Yao and Haobin Ni and Andrew C. Myers",
booktitle="IEEE Symp. on Security and Privacy",
url="http://www.cs.cornell.edu/andru/papers/oakland21",
month="May",
note="Best paper award.",
year="2021"} ]
-
Heterogeneous Paxos
A consensus algorithm heterogeneous on all three dimensions, like many blockchains.
OPODIS,
December 2020.
Isaac Sheff, Xinwen Wang, Robbert van Renesse, and Andrew C. Myers.
[ ×@inproceedings{hetpaxos,
title="Heterogeneous Paxos",
author="Isaac Sheff and Xinwen Wang and Robbert van Renesse and Andrew C. Myers",
booktitle="OPODIS",
url="http://www.cs.cornell.edu/andru/papers/hetcons",
month="December",
year="2020"} ]
-
Handling bidirectional control flow
Effectful effect handlers? Yes, with a type system to defend abstractions.
2020 ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA),
November 2020.
Yizhou Zhang, Guido Salvaneschi, and Andrew C. Myers.
[ ×@inproceedings{zsm20,
title="Handling bidirectional control flow",
author="Yizhou Zhang and Guido Salvaneschi and Andrew C. Myers",
booktitle="2020 ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA)",
url="http://www.cs.cornell.edu/andru/papers/ufo",
month="November",
year="2020"} ]
-
Stealthy tracking of autonomous vehicles with cache side channels
Cache side channels reveal where vehicles are driving.
29th USENIX Security Symp.,
August 2020.
Mulong Luo, G. Edward Suh, and Andrew C. Myers.
[ ×@inproceedings{tracking-vehicles-cache,
title="Stealthy tracking of autonomous vehicles with cache side channels",
author="Mulong Luo and G. Edward Suh and Andrew C. Myers",
booktitle="29th USENIX Security Symp.",
url="http://www.cs.cornell.edu/andru/papers/stealthy-tracking",
month="August",
year="2020"} ]
-
Securing smart contracts with information flow
Information-flow control provides compositional security for smart contracts.
3rd Int'l Symp. on Foundations and Applications of Blockchain (FAB),
April 2020.
Ethan Cecchetti, Siqiu Yao, Haobin Ni, and Andrew C. Myers.
[ ×@inproceedings{cecchetti-fab20,
title="Securing smart contracts with information flow",
author="Ethan Cecchetti and Siqiu Yao and Haobin Ni and Andrew C. Myers",
booktitle="3rd Int'l Symp. on Foundations and Applications of Blockchain (FAB)",
url="http://www.cs.cornell.edu/andru/papers/fab20",
month="April",
year="2020"} ]
-
Path planning under malicious injections and removals of perceived
obstacles: a probabilistic programming approach
Robots plan paths with both random and adversarial uncertainty.
IEEE Robotics and Automation Letters (RA-L),
2020.
Jacopo Banfi, Yizhou Zhang, G. Edward Suh, Andrew C. Myers, and Mark Campbell.
[ ×@article{bzsmc20,
title="Path planning under malicious injections and removals of perceived
obstacles: a probabilistic programming approach",
author="Jacopo Banfi and Yizhou Zhang and G. Edward Suh and Andrew C. Myers and
Mark Campbell",
journal="IEEE Robotics and Automation Letters (RA-L)",
url="https://ieeexplore.ieee.org/document/9184965",
year="2020"} ]
-
Using information flow to design an ISA that controls timing channels
Designing an instruction set for secure, timing-sensitive information flow.
32nd IEEE Computer Security Foundations Symp. (CSF),
June 2019.
Drew Zagieboylo, G. Edward Suh, and Andrew C. Myers.
[ ×@inproceedings{zsm19,
title="Using information flow to design an ISA that controls timing channels",
author="Drew Zagieboylo and G. Edward Suh and Andrew C. Myers",
booktitle="32nd IEEE Computer Security Foundations Symp. (CSF)",
url="http://www.cs.cornell.edu/andru/papers/hyperisa",
month="June",
year="2019"} ]
-
A tour of Gallifrey, a language for geodistributed programming
New mechanisms for merging, branching, and
computing on orthogonally replicated state.
3rd Summit on Advances in Programming Languages (SNAPL),
May 2019.
Mae Milano, Rolph Recto, Tom Magrino, and Andrew C. Myers.
[ ×@inproceedings{gallifrey,
title="A tour of Gallifrey, a language for geodistributed programming",
author="Mae Milano and Rolph Recto and Tom Magrino and Andrew C. Myers",
booktitle="3rd Summit on Advances in Programming Languages (SNAPL)",
url="https://drops.dagstuhl.de/storage/00lipics/lipics-vol136-snapl2019/LIPIcs.SNAPL.2019.11/LIPIcs.SNAPL.2019.11.pdf",
month="May",
year="2019"} ]
-
Efficient, consistent distributed computation with predictive treaties
Low-coordination semantic consistency via time-dependent predicates
ACM SIGOPS/EuroSys European Conference on Computer Systems,
March 2019.
Tom Magrino, Jed Liu, Nate Foster, Johannes Gehrke, and Andrew C. Myers.
[ ×@inproceedings{ptreaties,
title="Efficient, consistent distributed computation with predictive treaties",
author="Tom Magrino and Jed Liu and Nate Foster and Johannes Gehrke and Andrew C. Myers",
booktitle="ACM SIGOPS/EuroSys European Conference on Computer Systems",
url="http://www.cs.cornell.edu/andru/papers/ptreaties",
month="March",
year="2019"} ]
-
Abstraction-safe effect handlers via tunneling
Fixing the modularity of algebraic effects (and exceptions, dynamic scope, ...)
Proc. ACM on Programming Languages, 3(POPL),
January 2019.
Yizhou Zhang and Andrew C. Myers.
[ ×@article{zm18,
title="Abstraction-safe effect handlers via tunneling",
author="Yizhou Zhang and Andrew C. Myers",
journal="Proc. ACM on Programming Languages",
volume="3",
number="POPL",
url="http://www.cs.cornell.edu/andru/papers/tunnel-eff",
month="January",
year="2019"} ]
-
Secure autonomous cyber-physical systems through verifiable information flow control
Software and hardware codesign to improve assurance of cyberphysical systems
ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC),
October 2018.
Jed Liu, Joe Corbett-Davies, Andrew Ferraiuolo, Alexander Ivanov, Mulong Luo, G. Edward Suh, Andrew C. Myers, and Mark Campbell.
[ ×@inproceedings{cpsspc18,
title="Secure autonomous cyber-physical systems through verifiable information flow control",
author="Jed Liu and Joe Corbett-Davies and Andrew Ferraiuolo and Alexander Ivanov and Mulong Luo and G. Edward Suh and Andrew C. Myers and Mark Campbell",
booktitle="ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC)",
url="http://www.cs.cornell.edu/andru/papers/cpsspc18",
month="October",
year="2018"} ]
-
Hyperflow: A processor architecture for nonmalleable, timing-safe information-flow security
Information flow helps design a secure processor that controls timing channels
25th ACM Conf. on Computer and Communications Security (CCS),
October 2018.
Andrew Ferraiuolo, Mark Zhao, Andrew C. Myers, and G. Edward Suh.
[ ×@inproceedings{hyperflow,
title="Hyperflow: A processor architecture for nonmalleable, timing-safe information-flow security",
author="Andrew Ferraiuolo and Mark Zhao and Andrew C. Myers and Suh, G. Edward",
booktitle="25th ACM Conf. on Computer and Communications Security (CCS)",
url="http://www.cs.cornell.edu/andru/papers/hyperflow",
month="October",
year="2018"} ]
-
MixT: a language for mixing consistency in geodistributed transactions
Atomic, mixed-consistency transactions, checked using information flow
39th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
June 2018.
Mae Milano and Andrew C. Myers.
[ ×@inproceedings{mixt,
title="MixT: a language for mixing consistency in geodistributed transactions",
author="Mae Milano and Andrew C. Myers",
booktitle="39th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="https://dl.acm.org/doi/pdf/10.1145/3296979.3192375",
month="June",
year="2018"} ]
-
Familia: Unifying interfaces, type classes, and family polymorphism
A lot of polymorphism and extensibility in a lightweight package
2017 ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA),
October 2017.
Yizhou Zhang and Andrew C. Myers.
[ ×@inproceedings{familia,
title="Familia: Unifying interfaces, type classes, and family polymorphism",
author="Yizhou Zhang and Andrew C. Myers",
booktitle="2017 ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA)",
url="http://www.cs.cornell.edu/andru/papers/familia",
month="October",
year="2017"} ]
-
Nonmalleable information flow control
A type system enforcing a dual hyperproperty that constrains the use of endorsement
24th ACM Conf. on Computer and Communications Security (CCS),
pp. 1875–1891,
October 2017.
Ethan Cecchetti, Andrew C. Myers, and Owen Arden.
[ ×@inproceedings{nmifc,
title="Nonmalleable information flow control",
author="Ethan Cecchetti and Andrew C. Myers and Owen Arden",
booktitle="24th ACM Conf. on Computer and Communications Security (CCS)",
url="http://www.cs.cornell.edu/andru/papers/nmifc",
pages="1875–1891",
month="October",
year="2017"}| TR ]
-
SHErrLoc: A static holistic error locator
Using Bayesian principles to accurately localize errors reported by type systems and program analyses
ACM Trans. on Programming Languages and Systems, 39(4):18,
August 2017.
Danfeng Zhang, Andrew C. Myers, Dimitrios Vytiniotis, and Simon Peyton Jones.
[ ×@article{sherrloc,
title="SHErrLoc: A static holistic error locator",
author="Danfeng Zhang and Andrew C. Myers and Dimitrios Vytiniotis
and Peyton Jones, Simon",
journal="ACM Trans. on Programming Languages and Systems",
volume="39",
number="4",
url="https://www.cs.cornell.edu/andru/papers/sherrloc/sherrloc-toplas.pdf",
pages="18",
month="August",
year="2017"} ]
-
Secure information flow verification with mutable dependent types
Fully compile-time enforcement of dependent labels in a security-typed HDL
54th Design Automation Conference (DAC),
June 2017.
Andrew Ferraiuolo, Weizhe Hua, Andrew C. Myers, and G. Edward Suh.
[ ×@inproceedings{FHMS17,
title="Secure information flow verification with mutable dependent types",
author="Andrew Ferraiuolo and Weizhe Hua and Andrew C. Myers and G. Edward Suh",
booktitle="54th Design Automation Conference (DAC)",
url="https://people.ece.cornell.edu/af433/pdf/ferraiuolo-dac-17.pdf",
month="June",
year="2017"} ]
-
Teaching programming with gamified semantics
A game for teaching programming, based on small-step operational semantics
ACM CHI Conf. on Human Factors in Computing Systems,
May 2017.
Ian Arawjo, Cheng-Yao Wang, Andrew C. Myers, Erik Andersen, and François Guimbretière.
[ ×@inproceedings{reduct-chi17,
title="Teaching programming with gamified semantics",
author="Ian Arawjo and Cheng-Yao Wang and Andrew C. Myers and Erik Andersen and François Guimbretière",
booktitle="ACM CHI Conf. on Human Factors in Computing Systems",
url="http://www.cs.cornell.edu/andru/papers/reduct-chi17",
month="May",
year="2017"} ]
-
Fabric: Building open distributed systems securely by construction
A secure, decentralized, distributed programming system
based on information flow control
J. Computer Security, 25(4–5):319–321,
May 2017.
Jed Liu, Owen Arden, Michael D. George, and Andrew C. Myers.
[ ×@article{jfabric,
title="Fabric: Building open distributed systems securely by construction",
author="Jed Liu and Owen Arden and Michael D. George and Andrew C. Myers",
journal="J. Computer Security",
volume="25",
number="4–5",
url="http://www.cs.cornell.edu/andru/papers/jfabric",
pages="319–321",
month="May",
year="2017"} ]
-
Verification of a practical hardware security architecture through static information flow analysis
Verifying information flow in an implementation of the TrustZone architecture
Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS),
April 2017.
Andrew Ferraiuolo, Rui Xu, Danfeng Zhang, Andrew C. Myers, and G. Edward Suh.
[ ×@inproceedings{trustzone-secverilog,
title="Verification of a practical hardware security architecture through static information flow analysis",
author="Andrew Ferraiuolo and Rui Xu and Danfeng Zhang and Andrew C. Myers and
G. Edward Suh",
booktitle="Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS)",
url="http://www.cs.cornell.edu/andru/papers/trustzone",
month="April",
year="2017"}
| SecVerilogproject| TR ]
-
Safe serializable secure scheduling: transactions and the trade-off between security and consistency
A side channel created by an intrinsic conflict between consistency and security, and a fix
23rd ACM Conf. on Computer and Communications Security (CCS),
pp. 229–241,
October 2016.
Isaac Sheff, Tom Magrino, Jed Liu, Andrew C. Myers, and Robbert Van Renesse.
[ ×@inproceedings{abrtchan,
title="Safe serializable secure scheduling: transactions and the trade-off between security and consistency",
author="Isaac Sheff and Tom Magrino and Jed Liu and Andrew C. Myers and Robbert Van Renesse",
booktitle="23rd ACM Conf. on Computer and Communications Security (CCS)",
url="http://www.cs.cornell.edu/andru/papers/abrtchan",
pages="229–241",
month="October",
year="2016"}
| Fabricproject ]
-
SecDCP: Secure dynamic cache partitioning for efficient timing channel protection
Timing channels can be prevented efficiently by
dynamically partitioning caches.
53rd Design Automation Conference (DAC),
pp. 74:1–74:6,
June 2016.
Yao Wang, Andrew Ferraiuolo, Danfeng Zhang, Andrew C. Myers, and G. Edward Suh.
[ ×@inproceedings{WFZMS16,
title="SecDCP: Secure dynamic cache partitioning for efficient timing channel protection",
author="Yao Wang and Andrew Ferraiuolo and Danfeng Zhang and Andrew C. Myers and G. Edward Suh",
booktitle="53rd Design Automation Conference (DAC)",
url="http://www.cs.cornell.edu/andru/papers/dac16",
pages="74:1–74:6",
month="June",
year="2016"} ]
-
Accepting blame for safe tunneled exceptions
The flexibility of unchecked exceptions, the static guarantees of
checked exceptions, and good performance too.
37th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
pp. 281–295,
June 2016.
Yizhou Zhang, Guido Salvaneschi, Quinn Beightol, Barbara Liskov, and Andrew C. Myers.
[ ×@inproceedings{exceptions-pldi16,
title="Accepting blame for safe tunneled exceptions",
author="Yizhou Zhang and Guido Salvaneschi and Quinn Beightol and Barbara Liskov and Andrew C. Myers",
booktitle="37th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/exceptions",
pages="281–295",
month="June",
year="2016"}
| Genusproject| TR ]
-
A calculus for flow-limited authorization
A language that uses information flow to check the code of authorization mechanisms.
29th IEEE Computer Security Foundations Symp. (CSF),
pp. 135–147,
June 2016.
Owen Arden and Andrew C. Myers.
[ ×@inproceedings{flac,
title="A calculus for flow-limited authorization",
author="Owen Arden and Andrew C. Myers",
booktitle="29th IEEE Computer Security Foundations Symp. (CSF)",
url="http://www.cs.cornell.edu/andru/papers/flac",
pages="135–147",
month="June",
year="2016"}| TR ]
-
Lattice priority scheduling: low-overhead timing channel
protection for a shared memory controller
Using lattice policies to design a low-overhead memory controller that does not leak information via timing channels.
22nd IEEE Symp. on High Performance Computer Architecture (HPCA),
pp. 382–393,
March 2016.
Andrew Ferraiuolo, Yao Wang, Danfeng Zhang, Andrew C.
Myers, and G. Edward Suh.
[ ×@inproceedings{Ferraiuolo16,
title="Lattice priority scheduling: low-overhead timing channel
protection for a shared memory controller",
author="Andrew Ferraiuolo and Yao Wang and Danfeng Zhang and Andrew C.
Myers and Suh, G. Edward",
booktitle="22nd IEEE Symp. on High Performance Computer Architecture (HPCA)",
url="http://www.cs.cornell.edu/andru/papers/hpca16",
pages="382–393",
month="March",
year="2016"} ]
-
Flow-limited authorization
An expressive logic for reasoning about the interaction between
authorization and information flow.
28th IEEE Computer Security Foundations Symp. (CSF),
pp. 569–583,
July 2015.
Owen Arden, Jed Liu, and Andrew C. Myers.
[ ×@inproceedings{flam,
title="Flow-limited authorization",
author="Owen Arden and Jed Liu and Andrew C. Myers",
booktitle="28th IEEE Computer Security Foundations Symp. (CSF)",
url="http://www.cs.cornell.edu/andru/papers/flam",
pages="569–583",
month="July",
year="2015"}| TR| slides ]
-
Diagnosing type errors with class
SHErrLoc can effectively localize type errors in the rich type system of Haskell, despite type classes and quantification.
36th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
pp. 12–21,
June 2015.
(ACM SIGPLAN Distinguished Paper Award.)
Danfeng Zhang, Andrew C. Myers, Dimitrios Vytiniotis, and Simon Peyton Jones.
[ ×@inproceedings{zmvp15,
title="Diagnosing type errors with class",
author="Danfeng Zhang and Andrew C. Myers and Dimitrios Vytiniotis and Simon Peyton Jones",
booktitle="36th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/tc_diagnost",
pages="12–21",
month="June",
year="2015"}
| SHErrLocproject| TR ]
-
Finding counterexamples from parsing conflicts
A practical way for LALR parsers to illustrate parsing conflicts with counterexamples.
36th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
pp. 555–564,
June 2015.
Chinawat Isradisaikul and Andrew C. Myers.
[ ×@inproceedings{im15,
title="Finding counterexamples from parsing conflicts",
author="Chinawat Isradisaikul and Andrew C. Myers",
booktitle="36th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/cupex",
pages="555–564",
month="June",
year="2015"}
| Polyglotproject ]
-
Lightweight, flexible object-oriented generics
An expressive, lightweight genericity mechanism with better code reuse and stronger static checking.
36th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
pp. 436–445,
June 2015.
Yizhou Zhang, Matthew C. Loring, Guido Salvaneschi, Barbara Liskov, and Andrew C. Myers.
[ ×@inproceedings{genus-pldi15,
title="Lightweight, flexible object-oriented generics",
author="Yizhou Zhang and Matthew C. Loring and Guido Salvaneschi and Barbara Liskov and Andrew C. Myers",
booktitle="36th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/genus",
pages="436–445",
month="June",
year="2015"}
| Genusproject| TR ]
-
A hardware design language for timing-sensitive information-flow security
SecVerilog: a security-typed hardware design language for building hardware without leaks or timing channels.
Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS),
pp. 503–516,
March 2015.
Danfeng Zhang, Yao Wang, G. Edward Suh, and Andrew C. Myers.
[ ×@inproceedings{zwsm15,
title="A hardware design language for timing-sensitive information-flow security",
author="Danfeng Zhang and Yao Wang and G. Edward Suh and Andrew C. Myers",
booktitle="Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS)",
url="http://www.cs.cornell.edu/andru/papers/asplos15",
pages="503–516",
month="March",
year="2015"}
| SecVerilogproject| TR ]
-
A language-based approach to secure quorum replication
Quorum replication with information flow control can simultaneously enforce all three core
security properties: confidentiality, integrity, and availability.
9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS),
August 2014.
Lantian Zheng and Andrew C. Myers.
[ ×@inproceedings{zm14-plas,
title="A language-based approach to secure quorum replication",
author="Lantian Zheng and Andrew C. Myers",
booktitle="9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS)",
url="http://www.cs.cornell.edu/andru/papers/plas14",
month="August",
year="2014"} ]
-
Defining and enforcing referential security
New security properties related to referential integrity and persistence can be soundly enforced by a type system.
3rd Conf. on Principles of Security and Trust (POST),
pp. 199–219,
April 2014.
Jed Liu and Andrew C. Myers.
[ ×@inproceedings{persist,
title="Defining and enforcing referential security",
author="Liu, Jed and Myers, Andrew C.",
booktitle="3rd Conf. on Principles of Security and Trust (POST)",
url="http://www.cs.cornell.edu/andru/papers/persist",
pages="199–219",
month="April",
year="2014"}| TR ]
-
Warranties for faster strong consistency
Distributed transactions can be sped up by giving clients
time-limited invariants on state and computation.
11th USENIX Symp. on Networked Systems Design and Implementation (NSDI),
pp. 513–517,
April 2014.
Jed Liu, Tom Magrino, Owen Arden, Michael D. George, and Andrew C. Myers.
[ ×@inproceedings{warranties,
title="Warranties for faster strong consistency",
author="Jed Liu and Tom Magrino and Owen Arden and Michael D. George and Andrew C. Myers",
booktitle="11th USENIX Symp. on Networked Systems Design and Implementation (NSDI)",
url="http://www.cs.cornell.edu/andru/papers/warranties",
pages="513–517",
month="April",
year="2014"}
| Fabricproject ]
-
Using program analysis to improve database applications
IEEE Data Bulletin, 37(1):48–59,
March 2014.
Alvin Cheung, Samuel Madden, Armando Solar-Lezama, Owen Arden, and Andrew C. Myers.
[ ×@article{pyxis2,
title="Using program analysis to improve database applications",
author="Alvin Cheung and Samuel Madden and Armando Solar-Lezama and Owen Arden and Andrew C. Myers",
journal="IEEE Data Bulletin",
volume="37",
number="1",
url="http://sites.computer.org/debull/A14mar/p48.pdf",
pages="48–59",
month="March",
year="2014"} ]
-
Toward general diagnosis of static errors
Diagnosing maximum-likelihood program error locations from constraint system failures.
41st ACM Symp. on Principles of Programming Languages (POPL),
pp. 569–581,
January 2014.
Danfeng Zhang and Andrew C. Myers.
[ ×@inproceedings{zm14,
title="Toward general diagnosis of static errors",
author="Danfeng Zhang and Andrew C. Myers",
booktitle="41st ACM Symp. on Principles of Programming Languages (POPL)",
url="http://www.cs.cornell.edu/andru/papers/diagnostic",
pages="569–581",
month="January",
year="2014"}
| SHErrLocproject ]
-
Reconciling exhaustive pattern matching with objects
Pattern matching that verifies exhaustiveness and redundancy can
coexist with data abstraction and subtyping.
34th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
pp. 343–354,
June 2013.
(ACM SIGPLAN Distinguished Paper Award.)
Chinawat Isradisaikul and Andrew C. Myers.
[ ×@inproceedings{jmatch3,
title="Reconciling exhaustive pattern matching with objects",
author="Chinawat Isradisaikul and Andrew C. Myers",
booktitle="34th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/jmatch3",
pages="343–354",
month="June",
year="2013"}
| Project| TR ]
-
StatusQuo: making familiar abstractions perform using program analysis
Program analysis and synthesis enable seamlessly moving data and
functionality between app and database servers.
Conference on Innovative Data Systems Research (CIDR),
January 2013.
(CIDR Best Paper Award.)
Alvin Cheung, Samuel Madden, Armando Solar-Lezama, Owen Arden, and Andrew C. Myers.
[ ×@inproceedings{StatusQuo,
title="StatusQuo: making familiar abstractions perform using program analysis",
author="Alvin Cheung and Samuel Madden and Armando Solar-Lezama and Owen Arden and Andrew C. Myers",
booktitle="Conference on Innovative Data Systems Research (CIDR)",
url="http://www.cidrdb.org/cidr2013/Papers/CIDR13_Paper117.pdf",
month="January",
year="2013"} ]
-
Speeding up database applications with Pyxis
Int'l Conference on Management of Data,
pp. 969–972,
2013.
Alvin Cheung, Owen Arden, Samuel Madden, and Andrew C. Myers.
[ ×@inproceedings{pyxis-2013,
title="Speeding up database applications with Pyxis",
author="Alvin Cheung and Owen Arden and Samuel Madden and Andrew C. Myers",
booktitle="Int'l Conference on Management of Data",
pages="969–972",
year="2013"} ]
-
Automatic partitioning of database applications
PVLDB, 5(11):1471–1482,
August 2012.
Alvin Cheung, Samuel Madden, Owen Arden, and Andrew C. Myers.
[ ×@article{pyxis,
title="Automatic partitioning of database applications",
author="Alvin Cheung and Samuel Madden and Owen Arden and Andrew C. Myers",
journal="PVLDB",
volume="5",
number="11",
url="http://vldb.org/pvldb/vol5/p1471_alvincheung_vldb2012.pdf",
pages="1471–1482",
month="August",
year="2012"} ]
-
Language-based control and mitigation of timing channels
A type system bounds timing leakage when programs are run on hardware obeying the right contract.
ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
pp. 99–110,
June 2012.
Danfeng Zhang, Aslan Askarov, and Andrew C. Myers.
[ ×@inproceedings{pldi12,
title="Language-based control and mitigation of timing channels",
author="Danfeng Zhang and Aslan Askarov and Andrew C. Myers",
booktitle="ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="https://www.cs.cornell.edu/andru/papers/pltiming.html",
pages="99–110",
month="June",
year="2012"}
| SecVerilogproject ]
-
Sharing mobile code securely with information flow control
IEEE Symp. on Security and Privacy,
pp. 191–205,
May 2012.
Owen Arden, Michael D. George, Jed Liu, K. Vikram, Aslan Askarov, and Andrew C. Myers.
[ ×@inproceedings{oakland12,
title="Sharing mobile code securely with information flow control",
author="Owen Arden and Michael D. George and Jed Liu and K. Vikram
and Aslan Askarov and Andrew C. Myers",
booktitle="IEEE Symp. on Security and Privacy",
url="http://www.cs.cornell.edu/andru/papers/mobile.html",
pages="191–205",
month="May",
year="2012"}
| Fabricproject ]
-
Predictive mitigation of timing channels in interactive systems
18th ACM Conf. on Computer and Communications Security (CCS),
pp. 563–574,
October 2011.
Danfeng Zhang, Aslan Askarov, and Andrew C. Myers.
[ ×@inproceedings{zam11,
title="Predictive mitigation of timing channels in interactive systems",
author="Danfeng Zhang and Aslan Askarov and Andrew C. Myers",
booktitle="18th ACM Conf. on Computer and Communications Security (CCS)",
url="http://www.cs.cornell.edu/andru/papers/gentiming.html",
pages="563–574",
month="October",
year="2011"} ]
-
Attacker control and impact for confidentiality and integrity
Logical Methods in Computer Science, 7(3),
September 2011.
Aslan Askarov and Andrew C. Myers.
[ ×@article{am11,
title="Attacker control and impact for confidentiality and integrity",
author="Aslan Askarov and Andrew C. Myers",
journal="Logical Methods in Computer Science",
volume="7",
number="3",
url="http://www.cs.cornell.edu/andru/papers/robknowledge-lmcs.pdf",
month="September",
year="2011"} ]
-
Predictive black-box mitigation of timing channels
17th ACM Conf. on Computer and Communications Security (CCS),
pp. 297–307,
October 2010.
Aslan Askarov, Danfeng Zhang, and Andrew C. Myers.
[ ×@inproceedings{azm10,
title="Predictive black-box mitigation of timing channels",
author="Aslan Askarov and Danfeng Zhang and Andrew C. Myers",
booktitle="17th ACM Conf. on Computer and Communications Security (CCS)",
url="http://www.cs.cornell.edu/andru/papers/timing.html",
pages="297–307",
month="October",
year="2010"} ]
-
Homogeneous family sharing
25th ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA),
pp. 520–538,
October 2010.
Xin Qi and Andrew C. Myers.
[ ×@inproceedings{jhs,
title="Homogeneous family sharing",
author="Xin Qi and Andrew C. Myers",
booktitle="25th ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA)",
url="http://www.cs.cornell.edu/andru/papers/fam-sharing.html",
pages="520–538",
month="October",
year="2010"}
| J&project| TR ]
-
A semantic framework for declassification and endorsement
19th European Symposium on Programming,
pp. 64–84,
March 2010.
Aslan Askarov and Andrew C. Myers.
[ ×@inproceedings{am10,
title="A semantic framework for declassification and endorsement",
author="Aslan Askarov and Andrew C. Myers",
booktitle="19th European Symposium on Programming",
url="http://www.cs.cornell.edu/andru/papers/robknowledge.pdf",
pages="64–84",
month="March",
year="2010"} ]
-
Quantifying information flow with beliefs
Journal of Computer Security, 17(5):655–701,
October 2009.
Michael R. Clarkson, Andrew C. Myers, and Fred B. Schneider.
[ ×@article{cms09,
title="Quantifying information flow with beliefs",
author="Michael R. Clarkson and Andrew C. Myers and Fred B. Schneider",
journal="Journal of Computer Security",
volume="17",
number="5",
url="http://www.cs.cornell.edu/andru/papers/jbelief.pdf",
pages="655–701",
month="October",
year="2009"}| TR ]
-
Fabric: a platform for secure distributed computation and storage
22nd ACM Symp. on Operating System Principles (SOSP),
pp. 321–334,
October 2009.
Jed Liu, Michael D. George, K. Vikram, Xin Qi, Lucas Waye, and Andrew C. Myers.
[ ×@inproceedings{fabric09,
title="Fabric: a platform for secure distributed computation and storage",
author="Jed Liu and Michael D. George and K. Vikram and Xin Qi
and Lucas Waye and Andrew C. Myers",
booktitle="22nd ACM Symp. on Operating System Principles (SOSP)",
url="http://www.cs.cornell.edu/andru/papers/fabric-sosp09.html",
pages="321–334",
month="October",
year="2009"}
| Fabricproject ]
-
Building secure web applications with automatic partitioning
Comm. of the ACM, 52(2):79–87,
February 2009.
Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, and Xin Zheng.
[ ×@article{swift09,
title="Building secure web applications with automatic partitioning",
author="Stephen Chong and Jed Liu and Andrew C. Myers and
Xin Qi and K. Vikram and Lantian Zheng and Xin Zheng",
journal="Comm. of the ACM",
volume="52",
number="2",
url="http://portal.acm.org/citation.cfm?id=1461949",
pages="79–87",
month="February",
year="2009"} ]
-
Masked types for sound object initialization
36th ACM Symp. on Principles of Programming Languages (POPL),
pp. 53–65,
January 2009.
Xin Qi and Andrew C. Myers.
[ ×@inproceedings{jmask,
title="Masked types for sound object initialization",
author="Xin Qi and Andrew C. Myers",
booktitle="36th ACM Symp. on Principles of Programming Languages (POPL)",
url="http://www.cs.cornell.edu/andru/papers/masked-types.html",
pages="53–65",
month="January",
year="2009"}
| J\maskproject| TR| slides ]
-
Sharing classes between families
ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI),
pp. 281–292,
2009.
Xin Qi and Andrew C. Myers.
[ ×@inproceedings{jets,
title="Sharing classes between families",
author="Xin Qi and Andrew C. Myers",
booktitle="ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)",
url="http://www.cs.cornell.edu/andru/papers/class-sharing.html",
pages="281–292",
year="2009"} ]
-
A stateless approach to connection-oriented protocols
ACM Transactions on Computing Systems, 26(3):8:1–8:50,
September 2008.
Alan Shieh, Andrew C. Myers, and Emin Gün Sirer.
[ ×@article{smg08,
title="A stateless approach to connection-oriented protocols",
author="Alan Shieh and Andrew C. Myers and Emin Gün Sirer",
journal="ACM Transactions on Computing Systems",
volume="26",
number="3",
url="http://portal.acm.org/citation.cfm?id=1394444",
pages="8:1–8:50",
month="September",
year="2008"}
| Tricklesproject ]
-
End-to-end enforcement of erasure and declassification
IEEE Computer Security Foundations Symp. (CSF),
pp. 98–111,
June 2008.
Stephen Chong and Andrew C. Myers.
[ ×@inproceedings{cm08,
title="End-to-end enforcement of erasure and declassification",
author="Stephen Chong and Andrew C. Myers",
booktitle="IEEE Computer Security Foundations Symp. (CSF)",
url="http://www.cs.cornell.edu/andru/papers/enferasure-csf08.pdf",
pages="98–111",
month="June",
year="2008"} ]
-
Securing nonintrusive web encryption through information flow
3rd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS),
pp. 125–134,
June 2008.
Lantian Zheng and Andrew C. Myers.
[ ×@inproceedings{zm08,
title="Securing nonintrusive web encryption through information flow",
author="Lantian Zheng and Andrew C. Myers",
booktitle="3rd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS)",
url="https://www.cs.cornell.edu/andru/papers/plas08.pdf",
pages="125–134",
month="June",
year="2008"} ]
-
Civitas: Toward a secure voting system
IEEE Symp. on Security and Privacy,
pp. 354–368,
May 2008.
Michael R. Clarkson, Stephen Chong, and Andrew C. Myers.
[ ×@inproceedings{ccm08,
title="Civitas: Toward a secure voting system",
author="Michael R. Clarkson and Stephen Chong and Andrew C. Myers",
booktitle="IEEE Symp. on Security and Privacy",
url="http://www.cs.cornell.edu/andru/papers/civitas.html",
pages="354–368",
month="May",
year="2008"}
| Civitasproject ]
-
Secure web applications via automatic partitioning
21st ACM Symp. on Operating System Principles (SOSP),
pp. 31–44,
October 2007.
(SOSP Best Paper Award.)
Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, and Xin Zheng.
[ ×@inproceedings{swift07,
title="Secure web applications via automatic partitioning",
author="Stephen Chong and Jed Liu and Andrew C. Myers and
Xin Qi and K. Vikram and Lantian Zheng and Xin Zheng",
booktitle="21st ACM Symp. on Operating System Principles (SOSP)",
url="http://www.cs.cornell.edu/andru/papers/swift-sosp07.pdf",
pages="31–44",
month="October",
year="2007"} ]
-
SIF: Enforcing confidentiality and
integrity in web applications
16th USENIX Security Symp.,
August 2007.
Stephen Chong, K. Vikram, and Andrew C. Myers.
[ ×@inproceedings{sif07,
title="SIF: Enforcing confidentiality and
integrity in web applications",
author="Stephen Chong and K. Vikram and Andrew C. Myers",
booktitle="16th USENIX Security Symp.",
url="http://www.cs.cornell.edu/andru/papers/sif.pdf",
month="August",
year="2007"}
| SIFproject ]
-
Dynamic security labels and static information flow control
International Journal of Information Security, 6(2–3),
March 2007.
Lantian Zheng and Andrew C. Myers.
[ ×@article{zm07,
title="Dynamic security labels and static information flow control",
author="Lantian Zheng and Andrew C. Myers",
journal="International Journal of Information Security",
volume="6",
number="2–3",
url="http://www.cs.cornell.edu/andru/papers/dynlabel-ijis.pdf",
month="March",
year="2007"} ]
-
J&: nested intersection for scalable software composition
21st ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA),
pp. 21–36,
October 2006.
Nathaniel Nystrom, Xin Qi, and Andrew C. Myers.
[ ×@inproceedings{nqm06,
title="J&: nested intersection for scalable software composition",
author="Nathaniel Nystrom and Xin Qi and Andrew C. Myers",
booktitle="21st ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA)",
url="http://www.cs.cornell.edu/andru/papers/compose.pdf",
pages="21–36",
month="October",
year="2006"}
| J&project ]
-
Decentralized robustness
19th IEEE Computer Security Foundations Workshop (CSFW),
pp. 242–253,
July 2006.
Stephen Chong and Andrew C. Myers.
[ ×@inproceedings{cm06,
title="Decentralized robustness",
author="Stephen Chong and Andrew C. Myers",
booktitle="19th IEEE Computer Security Foundations Workshop (CSFW)",
url="http://www.cs.cornell.edu/andru/papers/robdlm.pdf",
pages="242–253",
month="July",
year="2006"} ]
-
Interruptible iterators
33rd ACM Symp. on Principles of Programming Languages (POPL),
pp. 283–294,
January 2006.
Jed Liu, Aaron Kimball, and Andrew C. Myers.
[ ×@inproceedings{jmatch2,
title="Interruptible iterators",
author="Liu, Jed and Kimball, Aaron and Myers, Andrew C.",
booktitle="33rd ACM Symp. on Principles of Programming Languages (POPL)",
url="http://www.cs.cornell.edu/andru/papers/jmatch2.pdf",
pages="283–294",
month="January",
year="2006"} ]
-
Enforcing robust declassification and qualified robustness
Journal of Computer Security, 14(2):157–196,
2006.
Andrew C. Myers, Andrei Sabelfeld, and Steve Zdancewic.
[ ×@article{msz06,
title="Enforcing robust declassification and qualified robustness",
author="Andrew C. Myers and Andrei Sabelfeld and Steve Zdancewic",
journal="Journal of Computer Security",
volume="14",
number="2",
url="http://www.cs.cornell.edu/andru/papers/robdecl-jcs",
pages="157–196",
year="2006"} ]
-
End-to-end availability policies and noninterference
18th IEEE Computer Security Foundations Workshop (CSFW),
pp. 272–286,
June 2005.
Lantian Zheng and Andrew C. Myers.
[ ×@inproceedings{zm05,
title="End-to-end availability policies and noninterference",
author="Lantian Zheng and Andrew C. Myers",
booktitle="18th IEEE Computer Security Foundations Workshop (CSFW)",
url="http://www.cs.cornell.edu/andru/papers/avail.pdf",
pages="272–286",
month="June",
year="2005"} ]
-
Language-based information erasure
18th IEEE Computer Security Foundations Workshop (CSFW),
pp. 241–254,
June 2005.
Stephen Chong and Andrew C. Myers.
[ ×@inproceedings{cm05,
title="Language-based information erasure",
author="Stephen Chong and Andrew C. Myers",
booktitle="18th IEEE Computer Security Foundations Workshop (CSFW)",
url="http://www.cs.cornell.edu/andru/papers/erasure.pdf",
pages="241–254",
month="June",
year="2005"} ]
-
Belief in information flow
18th IEEE Computer Security Foundations Workshop (CSFW),
pp. 31–45,
June 2005.
Michael R. Clarkson, Andrew C. Myers, and Fred B. Schneider.
[ ×@inproceedings{cms05,
title="Belief in information flow",
author="Michael R. Clarkson and Andrew C. Myers and Fred B. Schneider",
booktitle="18th IEEE Computer Security Foundations Workshop (CSFW)",
url="http://www.cs.cornell.edu/andru/papers/InfoFlowBelief.pdf",
pages="31–45",
month="June",
year="2005"} ]
-
Trickles: A stateless network stack for improved scalability, resilience, and flexibility
2nd USENIX Symp. on Networked Systems Design and Implementation (NSDI),
pp. 175–188,
May 2005.
Alan Shieh, Andrew C. Myers, and Emin Gün Sirer.
[ ×@inproceedings{smg05,
title="Trickles: A stateless network stack for improved scalability, resilience, and flexibility",
author="Alan Shieh and Andrew C. Myers and Emin Gün Sirer",
booktitle="2nd USENIX Symp. on Networked Systems Design and Implementation (NSDI)",
url="http://www.cs.cornell.edu/andru/papers/trickles.pdf",
pages="175–188",
month="May",
year="2005"}
| Tricklesproject ]
-
Supporting workflow in a course management system
36th ACM Technical Symposium on Computer Science
Education (SIGCSE),
pp. 262–266,
February 2005.
Chavdar Botev, Hubert Chao, Theodore Chao, Raymond Doyle, Sergey
Grankin, Jon Guarino, Saikat Guha, Pei-Chen Lee, Dan Perry, Christopher
Re, Ilya Rifkin, Tingyan Yuan, Dora Abdullah, Kathy Carpenter, David
Gries, Andrew C. Myers, and Jayavel Shanmugasundaram.
[ ×@inproceedings{CMS,
title="Supporting workflow in a course management system",
author="Chavdar Botev, Hubert Chao, Theodore Chao, Raymond Doyle, Sergey
Grankin, Jon Guarino, Saikat Guha, Pei-Chen Lee, Dan Perry, Christopher
Re, Ilya Rifkin, Tingyan Yuan, Dora Abdullah, Kathy Carpenter, David
Gries, Andrew C. Myers, and Jayavel Shanmugasundaram",
booktitle="36th ACM Technical Symposium on Computer Science
Education (SIGCSE)",
url="http://www.cs.cornell.edu/andru/papers/sigcse.pdf",
pages="262–266",
month="February",
year="2005"} ]
-
Scalable extensibility via nested inheritance
19th ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA),
pp. 99–115,
October 2004.
Nathaniel Nystrom, Stephen Chong, and Andrew C. Myers.
[ ×@inproceedings{ncm04,
title="Scalable extensibility via nested inheritance",
author="Nathaniel Nystrom and Stephen Chong and Andrew C. Myers",
booktitle="19th ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA)",
url="http://www.cs.cornell.edu/andru/papers/ncm04.pdf",
pages="99–115",
month="October",
year="2004"} ]
-
Security policies for downgrading
11th ACM Conf. on Computer and Communications Security (CCS),
pp. 198–209,
October 2004.
Stephen Chong and Andrew C. Myers.
[ ×@inproceedings{cm04,
title="Security policies for downgrading",
author="Stephen Chong and Andrew C. Myers",
booktitle="11th ACM Conf. on Computer and Communications Security (CCS)",
url="http://www.cs.cornell.edu/andru/papers/decl-policy.pdf",
pages="198–209",
month="October",
year="2004"} ]
-
Dynamic security labels and noninterference
2nd Workshop on Formal Aspects in Security
and Trust (FAST), IFIP TC1 WG1.7,
August 2004.
Lantian Zheng and Andrew C. Myers.
[ ×@inproceedings{zm04,
title="Dynamic security labels and noninterference",
author="Lantian Zheng and Andrew C. Myers",
booktitle="2nd Workshop on Formal Aspects in Security
and Trust (FAST), IFIP TC1 WG1.7",
url="http://www.cs.cornell.edu/andru/papers/dynlabel.pdf",
month="August",
year="2004"} ]
-
Enforcing robust declassification
17th IEEE Computer Security Foundations Workshop (CSFW),
pp. 172–186,
June 2004.
Andrew C. Myers, Andrei Sabelfeld, and Steve Zdancewic.
[ ×@inproceedings{msz04,
title="Enforcing robust declassification",
author="Andrew C. Myers and Andrei Sabelfeld and Steve Zdancewic",
booktitle="17th IEEE Computer Security Foundations Workshop (CSFW)",
url="http://www.cs.cornell.edu/andru/papers/csfw04.pdf",
pages="172–186",
month="June",
year="2004"} ]
-
A model for delimited release
2003 International Symposium on Software Security,
pp. 174–191,
2004.
Andrei Sabelfeld and Andrew C. Myers.
[ ×@inproceedings{sm04,
title="A model for delimited release",
author="Andrei Sabelfeld and Andrew C. Myers",
booktitle="2003 International Symposium on Software Security",
number="3233",
url="http://www.cs.cornell.edu/andru/papers/isss03.pdf",
pages="174–191",
year="2004"} ]
-
Observational determinism for concurrent program security
16th IEEE Computer Security Foundations Workshop (CSFW),
pp. 29–43,
June 2003.
Steve Zdancewic and Andrew C. Myers.
[ ×@inproceedings{zm03,
title="Observational determinism for concurrent program security",
author="Steve Zdancewic and Andrew C. Myers",
booktitle="16th IEEE Computer Security Foundations Workshop (CSFW)",
url="http://www.cs.cornell.edu/andru/papers/csfw03.pdf",
pages="29–43",
month="June",
year="2003"} ]
-
Using replication and partitioning to build secure distributed systems
IEEE Symp. on Security and Privacy,
pp. 236–250,
May 2003.
Lantian Zheng, Stephen Chong, Andrew C. Myers, and Steve Zdancewic.
[ ×@inproceedings{zcmz03,
title="Using replication and partitioning to build secure distributed systems",
author="Lantian Zheng and Stephen Chong and Andrew C. Myers and Steve Zdancewic",
booktitle="IEEE Symp. on Security and Privacy",
url="http://www.cs.cornell.edu/andru/papers/sp03.pdf",
pages="236–250",
month="May",
year="2003"} ]
-
Polyglot: an extensible compiler framework for Java
12th Int'l Conf. on Compiler Construction (CC'03),
pp. 138–152,
April 2003.
Nathaniel Nystrom, Michael R. Clarkson, and Andrew C. Myers.
[ ×@inproceedings{ncm03,
title="Polyglot: an extensible compiler framework for Java",
author="Nathaniel Nystrom and Michael R. Clarkson and Andrew C. Myers",
booktitle="12th Int'l Conf. on Compiler Construction (CC'03)",
url="http://www.cs.cornell.edu/andru/papers/polyglot.pdf",
pages="138–152",
month="April",
year="2003"}
| Polyglotproject ]
-
Language-based information-flow security
IEEE Journal on Selected Areas in Communications, 21(1):5–19,
January 2003.
Andrei Sabelfeld and Andrew C. Myers.
[ ×@article{sm-jsac,
title="Language-based information-flow security",
author="Andrei Sabelfeld and Andrew C. Myers",
journal="IEEE Journal on Selected Areas in Communications",
volume="21",
number="1",
url="http://www.cs.cornell.edu/andru/papers/jsac/sm-jsac03.pdf",
pages="5–19",
month="January",
year="2003"} ]
-
JMatch: iterable abstract pattern matching for Java
5th International Symposium on Practical Aspects of Declarative Languages,
pp. 110–127,
January 2003.
Jed Liu and Andrew C. Myers.
[ ×@inproceedings{jmatch-padl03,
title="JMatch: iterable abstract pattern matching for Java",
author="Jed Liu and Andrew C. Myers",
booktitle="5th International Symposium on Practical Aspects of Declarative Languages",
url="http://www.cs.cornell.edu/andru/papers/padl03.pdf",
pages="110–127",
month="January",
year="2003"}
| JMatchproject ]
-
Secure information flow via linear continuations
Higher-Order and Symbolic Computation, 15(2–3):209–234,
September 2002.
Steve Zdancewic and Andrew C. Myers.
[ ×@article{zm02-hosc,
title="Secure information flow via linear continuations",
author="Steve Zdancewic and Andrew C. Myers",
journal="Higher-Order and Symbolic Computation",
volume="15",
number="2–3",
url="http://www.cs.cornell.edu/andru/papers/hosc01.pdf",
pages="209–234",
month="September",
year="2002"} ]
-
Secure program partitioning
ACM Trans. on Computer Systems, 20(3):283–328,
August 2002.
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers.
[ ×@article{zznm02,
title="Secure program partitioning",
author="Steve Zdancewic and Lantian Zheng and Nathaniel Nystrom and
Andrew C. Myers",
journal="ACM Trans. on Computer Systems",
volume="20",
number="3",
url="http://www.cs.cornell.edu/andru/papers/sosp01/spp-tr.pdf",
pages="283–328",
month="August",
year="2002"} ]
-
Untrusted hosts and confidentiality: secure program partitioning
18th ACM Symp. on Operating System Principles (SOSP),
pp. 1–14,
October 2001.
(SOSP Best Paper Award.)
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers.
[ ×@inproceedings{zznm01,
title="Untrusted hosts and confidentiality: secure program partitioning",
author="Steve Zdancewic and Lantian Zheng and Nathaniel Nystrom and
Andrew C. Myers",
booktitle="18th ACM Symp. on Operating System Principles (SOSP)",
url="http://www.cs.cornell.edu/andru/papers/sosp01/zznm01.pdf",
pages="1–14",
month="October",
year="2001"} ]
-
Robust declassification
14th IEEE Computer Security Foundations Workshop (CSFW),
pp. 15–23,
June 2001.
Steve Zdancewic and Andrew C. Myers.
[ ×@inproceedings{zm01b,
title="Robust declassification",
author="Steve Zdancewic and Andrew C. Myers",
booktitle="14th IEEE Computer Security Foundations Workshop (CSFW)",
url="http://www.cs.cornell.edu/andru/papers/csfw01.pdf",
pages="15–23",
month="June",
year="2001"} ]
-
Secure information flow and CPS
10th European Symposium on Programming,
pp. 46–61,
2001.
Steve Zdancewic and Andrew C. Myers.
[ ×@inproceedings{zm01,
title="Secure information flow and CPS",
author="Steve Zdancewic and Andrew C. Myers",
booktitle="10th European Symposium on Programming",
volume="2028",
url="http://www.cs.cornell.edu/andru/papers/lincont.pdf",
pages="46–61",
year="2001"} ]
-
Protecting privacy using the decentralized label model
ACM Transactions on Software Engineering and Methodology, 9(4):410–442,
October 2000.
Andrew C. Myers and Barbara Liskov.
[ ×@article{ml-tosem,
title="Protecting privacy using the decentralized label model",
author="Andrew C. Myers and Barbara Liskov",
journal="ACM Transactions on Software Engineering and Methodology",
volume="9",
number="4",
url="http://www.cs.cornell.edu/andru/papers/iflow-tosem.pdf",
pages="410–442",
month="October",
year="2000"} ]
-
JFlow: practical mostly-static information flow control
26th ACM Symp. on Principles of Programming Languages (POPL),
pp. 228–241,
January 1999.
(ACM POPL Most Influential Paper Award, 2009.)
Andrew C. Myers.
[ ×@inproceedings{myers-popl99,
title="JFlow: practical mostly-static information flow control",
author="Andrew C. Myers",
booktitle="26th ACM Symp. on Principles of Programming Languages (POPL)",
url="http://www.cs.cornell.edu/andru/papers/popl99/popl99.pdf",
pages="228–241",
month="January",
year="1999"}| slides ]
-
Complete, safe information flow with decentralized labels
IEEE Symp. on Security and Privacy,
pp. 186–197,
May 1998.
Andrew C. Myers and Barbara Liskov.
[ ×@inproceedings{ml-sp98,
title="Complete, safe information flow with decentralized labels",
author="Andrew C. Myers and Barbara Liskov",
booktitle="IEEE Symp. on Security and Privacy",
url="http://www.cs.cornell.edu/andru/papers/sp98/sp98.pdf",
pages="186–197",
month="May",
year="1998"} ]
-
A decentralized model for information flow control
16th ACM Symp. on Operating System Principles (SOSP),
pp. 129–142,
October 1997.
Andrew C. Myers and Barbara Liskov.
[ ×@inproceedings{ml-ifc-97,
title="A decentralized model for information flow control",
author="Andrew C. Myers and Barbara Liskov",
booktitle="16th ACM Symp. on Operating System Principles (SOSP)",
url="http://www.cs.cornell.edu/andru/papers/iflow-sosp97/paper.html",
pages="129–142",
month="October",
year="1997"} ]
-
HAC: Hybrid adaptive caching for distributed storage systems
16th ACM Symp. on Operating System Principles (SOSP),
pp. 102–115,
October 1997.
Miguel Castro, Atul Adya, Barbara Liskov, and Andrew C. Myers.
[ ×@inproceedings{castro-sosp97,
title="HAC: Hybrid adaptive caching for distributed storage systems",
author="Miguel Castro and Atul Adya and Barbara Liskov and Andrew C. Myers",
booktitle="16th ACM Symp. on Operating System Principles (SOSP)",
url="http://www.cs.cornell.edu/andru/papers/hac-sosp97/published.html",
pages="102–115",
month="October",
year="1997"} ]
-
Parameterized types for Java
24th ACM Symp. on Principles of Programming Languages (POPL),
pp. 132–145,
January 1997.
Andrew C. Myers, Joseph A. Bank, and Barbara Liskov.
[ ×@inproceedings{java-popl97,
title="Parameterized types for Java",
author="Andrew C. Myers and Joseph A. Bank and Barbara Liskov",
booktitle="24th ACM Symp. on Principles of Programming Languages (POPL)",
url="http://www.cs.cornell.edu/andru/papers/popl97/popl97.html",
pages="132–145",
month="January",
year="1997"}
| Project ]
-
Safe and efficient sharing of persistent objects in Thor
ACM SIGMOD International Conference on Management
of Data (SIGMOD),
pp. 318–329,
June 1996.
B. Liskov, A. Adya, M. Castro, M. Day, S. Ghemawat, R. Gruber, U. Maheshwari, A. C. Myers, and L. Shrira.
[ ×@inproceedings{sigmod96,
title="Safe and efficient sharing of persistent objects in Thor",
author="B. Liskov and A. Adya and M. Castro and M. Day and
S. Ghemawat and R. Gruber and U. Maheshwari and
A. C. Myers and L. Shrira",
booktitle="ACM SIGMOD International Conference on Management
of Data (SIGMOD)",
url="http://www.cs.cornell.edu/andru/papers/safe-sharing.pdf",
pages="318–329",
month="June",
year="1996"} ]
-
The language-independent interface of the Thor persistent object system
Object-Oriented Multidatabase Systems,
pp. 570–588,
1996.
Barbara Liskov, Mark Day, Sanjay Ghemawat, Robert Gruber, Umesh Maheshwari, Andrew C. Myers, and Liuba Shrira.
[ ×@inproceedings{thor-interface,
title="The language-independent interface of the Thor persistent object system",
author="Barbara Liskov and Mark Day and Sanjay Ghemawat and
Robert Gruber and Umesh Maheshwari and Andrew C. Myers and
Liuba Shrira",
booktitle="Object-Oriented Multidatabase Systems",
url="http://www.cs.cornell.edu/andru/papers/thor-interface.pdf",
pages="570–588",
year="1996"} ]
-
Subtypes vs. where clauses: constraining parametric polymorphism
10th ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA),
pp. 156–168,
October 1995.
Mark Day, Robert Gruber, Barbara Liskov, and Andrew C. Myers.
[ ×@inproceedings{where-clauses,
title="Subtypes vs. where clauses: constraining parametric polymorphism",
author="Mark Day and Robert Gruber and
Barbara Liskov and Andrew C. Myers",
booktitle="10th ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA)",
url="http://www.cs.cornell.edu/andru/papers/where-clauses.pdf",
pages="156–168",
month="October",
year="1995"} ]
-
Bidirectional object layout for separate compilation
10th ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA),
pp. 124–139,
October 1995.
Andrew C. Myers.
[ ×@inproceedings{bidirectional,
title="Bidirectional object layout for separate compilation",
author="Andrew C. Myers",
booktitle="10th ACM SIGPLAN Conf. on Object-Oriented
Programming, Systems, Languages and Applications (OOPSLA)",
url="http://www.cs.cornell.edu/andru/papers/bidirectional/bidirectional.pdf",
pages="124–139",
month="October",
year="1995"} ]
-
References to remote mobile objects in Thor
ACM Letters on Programming Languages and Systems,
March 1994.
Mark Day, Barbara Liskov, Umesh Maheshwari, and Andrew C. Myers.
[ ×@article{loplas,
title="References to remote mobile objects in Thor",
author="Mark Day and Barbara Liskov and Umesh Maheshwari and Andrew C. Myers",
journal="ACM Letters on Programming Languages and Systems",
url="http://www.cs.cornell.edu/andru/papers/mobile-refs.pdf",
month="March",
year="1994"} ]
-
Resolving the integrity/performance conflict
Fourth Workshop on Workstation Operating Systems,
pp. 156–159,
October 1993.
Andrew C. Myers.
[ ×@inproceedings{myers-wwos4,
title="Resolving the integrity/performance conflict",
author="Andrew C. Myers",
booktitle="Fourth Workshop on Workstation Operating Systems",
url="http://www.cs.cornell.edu/andru/papers/integrity-perf.pdf",
pages="156–159",
month="October",
year="1993"} ]
-
Pade–Laplace method for analysis of fluorescence intensity decay
Biophysical Journal, 56:59–93,
July 1989.
Zeljko Bajzer, Andrew C. Myers, Salah S. Sedarous, and Franklyn G. Prendergast.
[ ×@article{padelaplace,
title="Pade–Laplace method for analysis of fluorescence intensity decay",
author="Zeljko Bajzer, Andrew C. Myers, Salah S. Sedarous, and Franklyn G. Prendergast",
journal="Biophysical Journal",
volume="56",
url="http://www.cs.cornell.edu/andru/papers/padelap.htm",
pages="59–93",
month="July",
year="1989"} ]
-
Binding, internalization, and intracellular processing of proteins interacting with recycling receptors: a kinetic analysis
J. Biological Chemistry, 264(23):13623–13631,
1989.
Zeljko Bajzer, Stanimir Vuk-Pavlović, and Andrew C. Myers.
[ ×@article{binding2,
title="Binding, internalization, and intracellular processing of proteins interacting with recycling receptors: a kinetic analysis",
author="Zeljko Bajzer, Stanimir Vuk-Pavlović, and Andrew C. Myers",
journal="J. Biological Chemistry",
volume="264",
number="23",
url="http://www.jbc.org/cgi/content/abstract/264/23/13623",
pages="13623–13631",
year="1989"} ]
-
Binding, internalization, and intracellular processing of protein ligands: derivation of rate constants by computer modeling
J. Biological Chemistry, 262(14):6494–6499,
1987.
Andrew C. Myers, John S. Kovach, and Stanimir Vuk-Pavlović.
[ ×@article{binding,
title="Binding, internalization, and intracellular processing of protein ligands: derivation of rate constants by computer modeling",
author="Andrew C. Myers, John S. Kovach, and Stanimir Vuk-Pavlović",
journal="J. Biological Chemistry",
volume="262",
number="14",
url="http://www.jbc.org/cgi/content/abstract/262/14/6494",
pages="6494–6499",
year="1987"} ]
The papers distributed here have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.