Stephen Chong

Orcid: 0000-0002-6734-5383

According to our database1, Stephen Chong authored at least 77 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Measuring Robustness in Cyber-Physical Systems under Sensor Attacks.
CoRR, 2024

2023
Towards Porting Operating Systems with Program Synthesis.
ACM Trans. Program. Lang. Syst., March, 2023

From SMT to ASP: Solver-Based Approaches to Solving Datalog Synthesis-as-Rule-Selection Problems.
Proc. ACM Program. Lang., January, 2023

Guess & Sketch: Language Model Guided Transpilation.
CoRR, 2023

Expressive Authorization Policies using Computation Principals.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Quantitative Robustness Analysis of Sensor Attacks on Cyber-Physical Systems.
Proceedings of the 26th ACM International Conference on Hybrid Systems: Computation and Control, 2023

2022
Expressing Information Flow Properties.
Found. Trends Priv. Secur., 2022

Formulog: Datalog + SMT + FP.
Proceedings of the 4th International Workshop on the Resurgence of Datalog in Academia and Industry (Datalog-2.0 2022) co-located with the 16th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR 2022), 2022

2021
A Calculus for Flow-Limited Authorization.
CoRR, 2021

Assuage: Assembly Synthesis Using A Guided Exploration.
Proceedings of the UIST '21: The 34th Annual ACM Symposium on User Interface Software and Technology, 2021

Co-Inflow: Coarse-grained Information Flow Control for Java-like Languages.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Fast incremental PEG parsing.
Proceedings of the SLE '21: 14th ACM SIGPLAN International Conference on Software Language Engineering, Chicago, IL, USA, October 17, 2021

Coupled Relational Symbolic Execution for Differential Privacy.
Proceedings of the Programming Languages and Systems, 2021

Relational Analysis of Sensor Attacks on Cyber-Physical Systems.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

2020
Fine-Grained, Language-Based Access Control for Database-Backed Applications.
Art Sci. Eng. Program., 2020

Formulog: Datalog for SMT-based static analysis.
Proc. ACM Program. Lang., 2020

Formulog: Datalog for SMT-Based Static Analysis (Extended Version).
CoRR, 2020

2019
Formalizing Privacy Laws for License Generation and Data Repository Decision Automation.
CoRR, 2019

Aquarium Technical Report Preprint.
CoRR, 2019

Trials and Tribulations in Synthesizing Operating Systems.
Proceedings of the 10th Workshop on Programming Languages and Operating Systems, 2019

Relational Symbolic Execution.
Proceedings of the 21st International Symposium on Principles and Practice of Programming Languages, 2019

Machine Learning-Enabled Adaptation of Information Fusion Software Systems.
Proceedings of the 22th International Conference on Information Fusion, 2019

Programming with Flow-Limited Authorization: Coarser is Better.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Information Flow Control for Distributed Trusted Execution Environments.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

2018
FormuLog: Datalog for static analysis involving logical formulae.
CoRR, 2018

2017
Whip: higher-order contracts for modern services.
Proc. ACM Program. Lang., 2017

A progress-sensitive flow-sensitive inlined information-flow control monitor (extended version).
Comput. Secur., 2017

Cryptographically Secure Information Flow Control on Key-Value Stores.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Authorization Contracts.
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017

2016
Truthful Mechanisms for Agents That Value Privacy.
ACM Trans. Economics and Comput., 2016

Report on the NSF Workshop on Formal Methods for Security.
CoRR, 2016

A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Correct Audit Logging: Theory and Practice.
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016

Precise, dynamic information flow for database-backed applications.
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2016

Extensible access control with authorization contracts.
Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, 2016

Automatic enforcement of expressive security policies using enclaves.
Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, 2016

2015
Using Architecture to Reason about Information Security.
ACM Trans. Inf. Syst. Secur., 2015

Self-Identifying Data for Fair Use.
ACM J. Data Inf. Qual., 2015

End-To-End Policy-Agnostic Security for Database-Backed Applications.
CoRR, 2015

It's My Privilege: Controlling Downgrading in DC-Labels.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Exploring and enforcing security guarantees via program dependence graphs.
Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015

Cryptographic Enforcement of Language-Based Information Erasure.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Hybrid Monitors for Concurrent Noninterference.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
SHILL: A Secure Shell Scripting Language.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

Language-based capabilities.
Proceedings of the 2014 International Workshop on Privacy & Security in Programming, 2014

Declarative Policies for Capability Control.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2013
Enforcing Language Semantics Using Proof-Carrying Data.
IACR Cryptol. ePrint Arch., 2013

Towards fully automatic placement of security sanitizers and declassifiers.
Proceedings of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2013

Asynchronous functional reactive programming for GUIs.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2013

2012
Required information release.
J. Comput. Secur., 2012

Towards a practical secure concurrent language.
Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2012

Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

Precise enforcement of progress-sensitive security.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Inference of Expressive Declassification Policies.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Static Analysis for Efficient Hybrid Information-Flow Control.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

2010
A more precise security type system for dynamic security tests.
Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, 2010

Self-identifying sensor data.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

2009
Building secure web applications with automatic partitioning.
Commun. ACM, 2009

Deriving epistemic conclusions from agent architecture.
Proceedings of the 12th Conference on Theoretical Aspects of Rationality and Knowledge (TARK-2009), 2009

Provenance: a future history.
Proceedings of the Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2009

Towards Semantics for Provenance Security.
Proceedings of the First Workshop on the Theory and Practice of Provenance, 2009

2008
Expressive and Enforceable Information Security Policies.
PhD thesis, 2008

Civitas: Toward a Secure Voting System.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

End-to-End Enforcement of Erasure and Declassification.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

2007
SIF: Enforcing Confidentiality and Integrity in Web Applications.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Secure web application via automatic partitioning.
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007

Civitas: A Secure Remote Voting System.
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007

2006
Information-Flow Security for Interactive Programs.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

Decentralized Robustness.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

2005
Language-Based Information Erasure.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

2004
A Framework for Creating Natural Language User Interfaces for Action-Based Applications
CoRR, 2004

Scalable extensibility via nested inheritance.
Proceedings of the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2004

Owned Policies for Information Security.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

Security policies for downgrading.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
Review of type-logical semantics.
SIGACT News, 2003

Using Replication and Partitioning to Build Secure Distributed Systems.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Static Analysis of Accessed Regions in Recursive Data Structures.
Proceedings of the Static Analysis, 10th International Symposium, 2003


  Loading...