default search action
Stephen Chong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c55]Celine Lee, Abdulrahman Mahmoud, Michal Kurek, Simone Campanoni, David Brooks, Stephen Chong, Gu-Yeon Wei, Alexander M. Rush:
Guess & Sketch: Language Model Guided Transpilation. ICLR 2024 - [c54]Jingmei Hu, Stephen Chong, Margo I. Seltzer:
Parallel Assembly Synthesis. LOPSTR 2024: 3-26 - [i21]Jian Xiang, Ruggero Lanotte, Simone Tini, Stephen Chong, Massimo Merro:
Measuring Robustness in Cyber-Physical Systems under Sensor Attacks. CoRR abs/2403.05829 (2024) - [i20]Aaron Bembenek, Michael Greenberg, Stephen Chong:
Making Formulog Fast: An Argument for Unconventional Datalog Evaluation (Extended Version). CoRR abs/2408.14017 (2024) - 2023
- [j13]Aaron Bembenek, Michael Greenberg, Stephen Chong:
From SMT to ASP: Solver-Based Approaches to Solving Datalog Synthesis-as-Rule-Selection Problems. Proc. ACM Program. Lang. 7(POPL): 185-217 (2023) - [j12]Jingmei Hu, Eric Lu, David A. Holland, Ming Kawaguchi, Stephen Chong, Margo I. Seltzer:
Towards Porting Operating Systems with Program Synthesis. ACM Trans. Program. Lang. Syst. 45(1): 2:1-2:70 (2023) - [c53]Stephen Chong, Ruggero Lanotte, Massimo Merro, Simone Tini, Jian Xiang:
Quantitative Robustness Analysis of Sensor Attacks on Cyber-Physical Systems. HSCC 2023: 20:1-20:12 - [c52]Anitha Gollamudi, Stephen Chong:
Expressive Authorization Policies using Computation Principals. SACMAT 2023: 107-119 - [i19]Celine Lee, Abdulrahman Mahmoud, Michal Kurek, Simone Campanoni, David Brooks, Stephen Chong, Gu-Yeon Wei, Alexander M. Rush:
Guess & Sketch: Language Model Guided Transpilation. CoRR abs/2309.14396 (2023) - 2022
- [j11]Elisavet Kozyri, Stephen Chong, Andrew C. Myers:
Expressing Information Flow Properties. Found. Trends Priv. Secur. 3(1): 1-102 (2022) - [c51]Aaron Bembenek, Michael Greenberg, Stephen Chong:
Formulog: Datalog + SMT + FP. Datalog 2022: 48-53 - [i18]Jingmei Hu, Eric Lu, David A. Holland, Ming Kawaguchi, Stephen Chong, Margo I. Seltzer:
Towards Porting Operating Systems with Program Synthesis. CoRR abs/2204.07167 (2022) - 2021
- [c50]Jian Xiang, Nathan Fulton, Stephen Chong:
Relational Analysis of Sensor Attacks on Cyber-Physical Systems. CSF 2021: 1-16 - [c49]Gian Pietro Farina, Stephen Chong, Marco Gaboardi:
Coupled Relational Symbolic Execution for Differential Privacy. ESOP 2021: 207-233 - [c48]Zachary Yedidia, Stephen Chong:
Fast incremental PEG parsing. SLE 2021: 99-112 - [c47]Jian Xiang, Stephen Chong:
Co-Inflow: Coarse-grained Information Flow Control for Java-like Languages. SP 2021: 18-35 - [c46]Jingmei Hu, Priyan Vaithilingam, Stephen Chong, Margo I. Seltzer, Elena L. Glassman:
Assuage: Assembly Synthesis Using A Guided Exploration. UIST 2021: 134-148 - [i17]Owen Arden, Anitha Gollamudi, Ethan Cecchetti, Stephen Chong, Andrew C. Myers:
A Calculus for Flow-Limited Authorization. CoRR abs/2104.10379 (2021) - [i16]Jian Xiang, Nathan Fulton, Stephen Chong:
Relational Analysis of Sensor Attacks on Cyber-Physical Systems. CoRR abs/2106.01850 (2021) - 2020
- [j10]Aaron Bembenek, Michael Greenberg, Stephen Chong:
Formulog: Datalog for SMT-based static analysis. Proc. ACM Program. Lang. 4(OOPSLA): 141:1-141:31 (2020) - [j9]Ezra Zigmond, Stephen Chong, Christos Dimoulas, Scott Moore:
Fine-Grained, Language-Based Access Control for Database-Backed Applications. Art Sci. Eng. Program. 4(2): 3 (2020) - [i15]Gian Pietro Farina, Stephen Chong, Marco Gaboardi:
Coupled Relational Symbolic Execution for Differential Privacy. CoRR abs/2007.12987 (2020) - [i14]Aaron Bembenek, Michael Greenberg, Stephen Chong:
Formulog: Datalog for SMT-Based Static Analysis (Extended Version). CoRR abs/2009.08361 (2020)
2010 – 2019
- 2019
- [c45]Anitha Gollamudi, Stephen Chong, Owen Arden:
Information Flow Control for Distributed Trusted Execution Environments. CSF 2019: 304-318 - [c44]Mathias Vorreiter Pedersen, Stephen Chong:
Programming with Flow-Limited Authorization: Coarser is Better. EuroS&P 2019: 63-78 - [c43]Gerald Fry, T. Samawi, Kenny Lu, Avi Pfeffer, Curt Wu, Steve Marotta, Michael Reposa, Stephen Chong:
Machine Learning-Enabled Adaptation of Information Fusion Software Systems. FUSION 2019: 1-7 - [c42]Gian Pietro Farina, Stephen Chong, Marco Gaboardi:
Relational Symbolic Execution. PPDP 2019: 10:1-10:14 - [c41]Jingmei Hu, Eric Lu, David A. Holland, Ming Kawaguchi, Stephen Chong, Margo I. Seltzer:
Trials and Tribulations in Synthesizing Operating Systems. PLOS@SOSP 2019: 67-73 - [i13]Ming Kawaguchi, Jingmei Hu, Eric Lu, David A. Holland, Stephen Chong, Margo I. Seltzer:
Aquarium Technical Report Preprint. CoRR abs/1908.00093 (2019) - [i12]Ezra Zigmond, Stephen Chong, Christos Dimoulas, Scott Moore:
Fine-Grained, Language-Based Access Control for Database-Backed Applications. CoRR abs/1909.12279 (2019) - [i11]Micah Altman, Stephen Chong, Alexandra Wood:
Formalizing Privacy Laws for License Generation and Data Repository Decision Automation. CoRR abs/1910.10096 (2019) - 2018
- [i10]Aaron Bembenek, Stephen Chong:
FormuLog: Datalog for static analysis involving logical formulae. CoRR abs/1809.06274 (2018) - 2017
- [j8]Andrew Bedford, Stephen Chong, Josée Desharnais, Elisavet Kozyri, Nadia Tawbi:
A progress-sensitive flow-sensitive inlined information-flow control monitor (extended version). Comput. Secur. 71: 114-131 (2017) - [j7]Lucas Waye, Stephen Chong, Christos Dimoulas:
Whip: higher-order contracts for modern services. Proc. ACM Program. Lang. 1(ICFP): 36:1-36:28 (2017) - [c40]Stephen Chong:
Authorization Contracts. PLAS@CCS 2017: 75 - [c39]Lucas Waye, Pablo Buiras, Owen Arden, Alejandro Russo, Stephen Chong:
Cryptographically Secure Information Flow Control on Key-Value Stores. CCS 2017: 1893-1907 - [i9]Lucas Waye, Pablo Buiras, Owen Arden, Alejandro Russo, Stephen Chong:
Cryptographically Secure Information Flow Control on Key-Value Stores. CoRR abs/1708.08895 (2017) - [i8]Gian Pietro Farina, Stephen Chong, Marco Gaboardi:
Relational Symbolic Execution. CoRR abs/1711.08349 (2017) - 2016
- [j6]Yiling Chen, Stephen Chong, Ian A. Kash, Tal Moran, Salil P. Vadhan:
Truthful Mechanisms for Agents That Value Privacy. ACM Trans. Economics and Comput. 4(3): 13:1-13:30 (2016) - [c38]Scott Moore, Christos Dimoulas, Robert Bruce Findler, Matthew Flatt, Stephen Chong:
Extensible access control with authorization contracts. OOPSLA 2016: 214-233 - [c37]Anitha Gollamudi, Stephen Chong:
Automatic enforcement of expressive security policies using enclaves. OOPSLA 2016: 494-513 - [c36]Jean Yang, Travis Hance, Thomas H. Austin, Armando Solar-Lezama, Cormac Flanagan, Stephen Chong:
Precise, dynamic information flow for database-backed applications. PLDI 2016: 631-647 - [c35]Sepehr Amir-Mohammadian, Stephen Chong, Christian Skalka:
Correct Audit Logging: Theory and Practice. POST 2016: 139-162 - [c34]Andrew Bedford, Stephen Chong, Josée Desharnais, Nadia Tawbi:
A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor. SEC 2016: 352-366 - [i7]Stephen Chong, Joshua D. Guttman, Anupam Datta, Andrew C. Myers, Benjamin C. Pierce, Patrick Schaumont, Tim Sherwood, Nickolai Zeldovich:
Report on the NSF Workshop on Formal Methods for Security. CoRR abs/1608.00678 (2016) - 2015
- [j5]Stephen Chong, Christian Skalka, Jeffrey A. Vaughan:
Self-Identifying Data for Fair Use. ACM J. Data Inf. Qual. 5(3): 11:1-11:30 (2015) - [j4]Stephen Chong, Ron van der Meyden:
Using Architecture to Reason about Information Security. ACM Trans. Inf. Syst. Secur. 18(2): 8:1-8:30 (2015) - [c33]Aslan Askarov, Stephen Chong, Heiko Mantel:
Hybrid Monitors for Concurrent Noninterference. CSF 2015: 137-151 - [c32]Aslan Askarov, Scott Moore, Christos Dimoulas, Stephen Chong:
Cryptographic Enforcement of Language-Based Information Erasure. CSF 2015: 334-348 - [c31]Andrew Johnson, Lucas Waye, Scott Moore, Stephen Chong:
Exploring and enforcing security guarantees via program dependence graphs. PLDI 2015: 291-302 - [c30]Lucas Waye, Pablo Buiras, Dan King, Stephen Chong, Alejandro Russo:
It's My Privilege: Controlling Downgrading in DC-Labels. STM 2015: 203-219 - [i6]Jean Yang, Travis Hance, Thomas H. Austin, Armando Solar-Lezama, Cormac Flanagan, Stephen Chong:
End-To-End Policy-Agnostic Security for Database-Backed Applications. CoRR abs/1507.03513 (2015) - 2014
- [c29]Christos Dimoulas, Scott Moore, Aslan Askarov, Stephen Chong:
Declarative Policies for Capability Control. CSF 2014: 3-17 - [c28]Stephen Chong:
Language-based capabilities. PSP 2014: 1 - [c27]Scott Moore, Christos Dimoulas, Dan King, Stephen Chong:
SHILL: A Secure Shell Scripting Language. OSDI 2014: 183-199 - [i5]Stephen Chong, Ron van der Meyden:
Using Architecture to Reason about Information Security. CoRR abs/1409.0309 (2014) - 2013
- [c26]Evan Czaplicki, Stephen Chong:
Asynchronous functional reactive programming for GUIs. PLDI 2013: 411-422 - [c25]Benjamin Livshits, Stephen Chong:
Towards fully automatic placement of security sanitizers and declassifiers. POPL 2013: 385-398 - [c24]Yiling Chen, Stephen Chong, Ian A. Kash, Tal Moran, Salil P. Vadhan:
Truthful mechanisms for agents that value privacy. EC 2013: 215-232 - [i4]Stephen Chong, Eran Tromer, Jeffrey A. Vaughan:
Enforcing Language Semantics Using Proof-Carrying Data. IACR Cryptol. ePrint Arch. 2013: 513 (2013) - 2012
- [j3]Stephen Chong:
Required information release. J. Comput. Secur. 20(6): 637-676 (2012) - [c23]Scott Moore, Aslan Askarov, Stephen Chong:
Precise enforcement of progress-sensitive security. CCS 2012: 881-893 - [c22]Aslan Askarov, Stephen Chong:
Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies. CSF 2012: 308-322 - [c21]Stefan K. Muller, Stephen Chong:
Towards a practical secure concurrent language. OOPSLA 2012: 57-74 - [e2]Stephen Chong:
25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1918-8 [contents] - 2011
- [c20]Scott Moore, Stephen Chong:
Static Analysis for Efficient Hybrid Information-Flow Control. CSF 2011: 146-160 - [c19]Jeffrey A. Vaughan, Stephen Chong:
Inference of Expressive Declassification Policies. IEEE Symposium on Security and Privacy 2011: 180-195 - [i3]Yiling Chen, Stephen Chong, Ian A. Kash, Tal Moran, Salil P. Vadhan:
Truthful Mechanisms for Agents that Value Privacy. CoRR abs/1111.5472 (2011) - 2010
- [c18]Stephen Chong:
Required Information Release. CSF 2010: 215-227 - [c17]Stephen Chong, Christian Skalka, Jeffrey A. Vaughan:
Self-identifying sensor data. IPSN 2010: 82-93 - [c16]Gregory Malecha, Stephen Chong:
A more precise security type system for dynamic security tests. PLAS 2010: 4
2000 – 2009
- 2009
- [j2]Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, Xin Zheng:
Building secure web applications with automatic partitioning. Commun. ACM 52(2): 79-87 (2009) - [c15]Stephen Chong:
Towards Semantics for Provenance Security. Workshop on the Theory and Practice of Provenance 2009 - [c14]James Cheney, Stephen Chong, Nate Foster, Margo I. Seltzer, Stijn Vansummeren:
Provenance: a future history. OOPSLA Companion 2009: 957-964 - [c13]Stephen Chong, Ron van der Meyden:
Deriving epistemic conclusions from agent architecture. TARK 2009: 61-70 - [e1]Stephen Chong, David A. Naumann:
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, PLAS 2009, Dublin, Ireland, 15-21 June, 2009. ACM 2009, ISBN 978-1-60558-645-8 [contents] - 2008
- [b1]Stephen Chong:
Expressive and Enforceable Information Security Policies. Cornell University, USA, 2008 - [c12]Stephen Chong, Andrew C. Myers:
End-to-End Enforcement of Erasure and Declassification. CSF 2008: 98-111 - [c11]Michael R. Clarkson, Stephen Chong, Andrew C. Myers:
Civitas: Toward a Secure Voting System. SP 2008: 354-368 - 2007
- [c10]Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, Xin Zheng:
Secure web application via automatic partitioning. SOSP 2007: 31-44 - [c9]Stephen Chong, K. Vikram, Andrew C. Myers:
SIF: Enforcing Confidentiality and Integrity in Web Applications. USENIX Security Symposium 2007 - [i2]Michael E. Clarkson, Stephen Chong, Andrew C. Myers:
Civitas: A Secure Remote Voting System. Frontiers of Electronic Voting 2007 - 2006
- [c8]Kevin R. O'Neill, Michael R. Clarkson, Stephen Chong:
Information-Flow Security for Interactive Programs. CSFW 2006: 190-201 - [c7]Stephen Chong, Andrew C. Myers:
Decentralized Robustness. CSFW 2006: 242-256 - 2005
- [c6]Stephen Chong, Andrew C. Myers:
Language-Based Information Erasure. CSFW 2005: 241-254 - 2004
- [c5]Stephen Chong, Andrew C. Myers:
Security policies for downgrading. CCS 2004: 198-209 - [c4]Hubie Chen, Stephen Chong:
Owned Policies for Information Security. CSFW 2004: 126-138 - [c3]Nathaniel Nystrom, Stephen Chong, Andrew C. Myers:
Scalable extensibility via nested inheritance. OOPSLA 2004: 99-115 - [i1]Stephen Chong, Riccardo Pucella:
A Framework for Creating Natural Language User Interfaces for Action-Based Applications. CoRR abs/cs/0412065 (2004) - 2003
- [j1]Riccardo Pucella, Stephen Chong:
Review of type-logical semantics. SIGACT News 34(1): 6-17 (2003) - [c2]Stephen Chong, Radu Rugina:
Static Analysis of Accessed Regions in Recursive Data Structures. SAS 2003: 463-482 - [c1]Lantian Zheng, Stephen Chong, Andrew C. Myers, Steve Zdancewic:
Using Replication and Partitioning to Build Secure Distributed Systems. S&P 2003: 236-250
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint