Andrew C. Myers

According to our database1, Andrew C. Myers authored at least 114 papers between 1993 and 2020.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2013, "For contributions to languages and systems that use information flow for implementing secure computing systems.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Path Planning Under Malicious Injections and Removals of Perceived Obstacles: A Probabilistic Programming Approach.
IEEE Robotics Autom. Lett., 2020

Handling bidirectional control flow.
Proc. ACM Program. Lang., 2020

Heterogeneous Paxos: Technical Report.
CoRR, 2020

Handling Bidirectional Control Flow: Technical Report.
CoRR, 2020

The Cost of Software-Based Memory Management Without Virtual Memory.
CoRR, 2020

Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.
Proceedings of the 29th USENIX Security Symposium, 2020

Heterogeneous Paxos.
Proceedings of the 24th International Conference on Principles of Distributed Systems, 2020

2019
Editorial.
ACM Trans. Program. Lang. Syst., 2019

Abstraction-safe effect handlers via tunneling.
Proc. ACM Program. Lang., 2019

Charlotte: Composable Authenticated Distributed Data Structures, Technical Report.
CoRR, 2019

A Tour of Gallifrey, a Language for Geodistributed Programming.
Proceedings of the 3rd Summit on Advances in Programming Languages, 2019

Efficient, Consistent Distributed Computation with Predictive Treaties.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019

Using Information Flow to Design an ISA that Controls Timing Channels.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

JRIF: Reactive Information Flow Control for Java.
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019

2018
A Web of Blocks.
CoRR, 2018

MixT: a language for mixing consistency in geodistributed transactions.
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2018

Secure Autonomous Cyber-Physical Systems Through Verifiable Information Flow Control.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018

HyperFlow: A Processor Architecture for Nonmalleable, Timing-Safe Information Flow Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
SHErrLoc: A Static Holistic Error Locator.
ACM Trans. Program. Lang. Syst., 2017

Familia: unifying interfaces, type classes, and family polymorphism.
Proc. ACM Program. Lang., 2017

Fabric: Building open distributed systems securely by construction.
J. Comput. Secur., 2017

Nonmalleable Information Flow: Technical Report.
CoRR, 2017

Secure Information Flow Verification with Mutable Dependent Types.
Proceedings of the 54th Annual Design Automation Conference, 2017

Teaching Programming with Gamified Semantics.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Nonmalleable Information Flow Control.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis.
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, 2017

2016
Report on the NSF Workshop on Formal Methods for Security.
CoRR, 2016

Accepting blame for safe tunneled exceptions.
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2016

Lattice priority scheduling: Low-overhead timing-channel protection for a shared memory controller.
Proceedings of the 2016 IEEE International Symposium on High Performance Computer Architecture, 2016

SecDCP: secure dynamic cache partitioning for efficient timing channel protection.
Proceedings of the 53rd Annual Design Automation Conference, 2016

A Calculus for Flow-Limited Authorization.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Diagnosing type errors with class.
Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015

Lightweight, flexible object-oriented generics.
Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015

Finding counterexamples from parsing conflicts.
Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015

Flow-Limited Authorization.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

A Hardware Design Language for Timing-Sensitive Information-Flow Security.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

2014
Using Program Analysis to Improve Database Applications.
IEEE Data Eng. Bull., 2014

Distributed Protocols and Heterogeneous Trust: Technical Report.
CoRR, 2014

Defining and Enforcing Referential Security.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014

Toward general diagnosis of static errors.
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014

Warranties for Faster Strong Consistency.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

A Language-Based Approach to Secure Quorum Replication.
Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, 2014

2013
Speeding up database applications with Pyxis.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2013

How languages can save distributed computing.
Proceedings of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2013

Reconciling exhaustive pattern matching with objects.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2013

StatusQuo: Making Familiar Abstractions Perform Using Program Analysis.
Proceedings of the CIDR 2013, 2013

2012
Automatic Partitioning of Database Applications.
Proc. VLDB Endow., 2012

Preface.
J. Comput. Secur., 2012

Sharing Mobile Code Securely with Information Flow Control.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Language-based control and mitigation of timing channels.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2012

2011
Attacker Control and Impact for Confidentiality and Integrity
Log. Methods Comput. Sci., 2011

Predictive mitigation of timing channels in interactive systems.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Using Security Policies to Write Secure Software.
Proceedings of the Logics and Languages for Reliability and Security, 2010

Homogeneous family sharing.
Proceedings of the 25th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2010

Toward Securely Programming the Internet.
Proceedings of the Information Systems Security - 6th International Conference, 2010

A Semantic Framework for Declassification and Endorsement.
Proceedings of the Programming Languages and Systems, 2010

Predictive black-box mitigation of timing channels.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Quantifying information flow with beliefs.
J. Comput. Secur., 2009

Technical perspective - Reframing security for the web.
Commun. ACM, 2009

Building secure web applications with automatic partitioning.
Commun. ACM, 2009

Fabric: a platform for secure distributed computation and storage.
Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, 2009

Masked types for sound object initialization.
Proceedings of the 36th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2009

Sharing classes between families.
Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, 2009

2008
A stateless approach to connection-oriented protocols.
ACM Trans. Comput. Syst., 2008

Civitas: Toward a Secure Voting System.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008), 2008

Securing nonintrusive web encryption through information flow.
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, 2008

Guiding Distributed Systems Synthesis with Language-Based Security Policies.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2008

End-to-End Enforcement of Erasure and Declassification.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

2007
Dynamic security labels and static information flow control.
Int. J. Inf. Sec., 2007

SIF: Enforcing Confidentiality and Integrity in Web Applications.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Secure web application via automatic partitioning.
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007

Civitas: A Secure Remote Voting System.
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007

07091 Abstracts Collection - Mobility, Ubiquity and Security.
Proceedings of the Mobility, Ubiquity and Security, 25.02. - 02.03.2007, 2007

07091 Executive Summary - Mobility, Ubiquity and Security.
Proceedings of the Mobility, Ubiquity and Security, 25.02. - 02.03.2007, 2007

2006
Enforcing Robust Declassification and Qualified Robustness.
J. Comput. Secur., 2006

Interruptible iterators.
Proceedings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2006

J&: nested intersection for scalable software composition.
Proceedings of the 21th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2006

Decentralized Robustness.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

2005

Making distributed systems secure with program analysis and transformation.
Proceedings of the 2005 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 2005

Trickles: A Stateless Network Stack for Improved Scalability, Resilience, and Flexibility.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

Programming with Explicit Security Policies.
Proceedings of the Programming Languages and Systems, 2005

End-to-End Availability Policies and Noninterference.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

Belief in Information Flow.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

Language-Based Information Erasure.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

2004
Scalable extensibility via nested inheritance.
Proceedings of the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2004

Dynamic Security Labels and Noninterference (Extended Abstract).
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

Enforcing Robust Declassification.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

Security policies for downgrading.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
Language-based information-flow security.
IEEE J. Sel. Areas Commun., 2003

Using Replication and Partitioning to Build Secure Distributed Systems.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

JMatch: Iterable Abstract Pattern Matching for Java.
Proceedings of the Practical Aspects of Declarative Languages, 5th International Symposium, 2003

A Model for Delimited Information Release.
Proceedings of the Software Security, 2003

Observational Determinism for Concurrent Program Security.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

Polyglot: An Extensible Compiler Framework for Java.
Proceedings of the Compiler Construction, 12th International Conference, 2003

2002
Secure program partitioning.
ACM Trans. Comput. Syst., 2002

Secure Information Flow via Linear Continuations.
High. Order Symb. Comput., 2002

2001
Untrusted Hosts and Confidentiality: Secure Program Partitioning.
Proceedings of the 18th ACM Symposium on Operating System Principles, 2001

Security-Typed Languages and Distributed Computation.
Proceedings of the Static Analysis, 8th International Symposium, 2001

Secure Information Flow and CPS.
Proceedings of the Programming Languages and Systems, 2001

Robust Declassification.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

2000
Protecting privacy using the decentralized label model.
ACM Trans. Softw. Eng. Methodol., 2000

1999
Mostly-static decentralized information flow control.
PhD thesis, 1999

JFlow: Practical Mostly-Static Information Flow Control.
Proceedings of the POPL '99, 1999

1998
Complete, Safe Information Flow with Decentralized Labels.
Proceedings of the Security and Privacy, 1998

1997
A Decentralized Model for Information Flow Control.
Proceedings of the Sixteenth ACM Symposium on Operating System Principles, 1997

HAC: Hybrid Adaptive Caching for Distributed Storage Systems.
Proceedings of the Sixteenth ACM Symposium on Operating System Principles, 1997

Parameterized Types for Java.
Proceedings of the Conference Record of POPL'97: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1997

1996
Safe and Efficient Sharing of Persistent Objects in Thor.
Proceedings of the 1996 ACM SIGMOD International Conference on Management of Data, 1996

1995
Bidirectional Object Layout for Separate Compilation.
Proceedings of the OOPSLA'95, 1995

Subtypes vs. Where Clauses: Constraining Parametric Polymorphism.
Proceedings of the OOPSLA'95, 1995

1993
References to Remote Mobile Objects in Thor.
LOPLAS, 1993

Resolving the Integrity/Performance Conflict.
Proceedings of the Proceedings Fourth Workshop on Workstation Operating Systems, 1993


  Loading...