The Department of Computer Science at Cornell University, which was organized in 1965, is one of the oldest departments of its kind in the country. It has a full-time faculty of 36, approximately 110 resident Ph.D. graduate students, 100 M.Eng students, and the undergraduate program graduates about 200 C.S. majors each year. The department is typically ranked as one of the top five in the country.

For more information, go to the Computer Science Home Page.

Collections in this community

Recent Submissions

  • HyperFlow: A Processor Architecture for Timing-Safe Information-Flow Security 

    Ferraiuolo, Andrew; Zhao, Yuqi; Suh, G. Edward; Myers, Andrew C. (2018-05-01)
    This paper presents HyperFlow, a processor that enforces secure information flow, including control over timing channels. The design and implementation of HyperFlow offer security assurance because it is implemented ...
  • On Disintegration in Probabilistic Semantics 

    Kozen, Dexter (2018-04-01)
    We give a version of disintegration based on weaker assumptions than previously known. The result is derived using an enhanced version of the Radon-Nikodym theorem that makes explicit the approximating functions, thereby ...
  • Undecidable Problems for Probabilistic Network Programming 

    Kahn, David (2017-07-07)
    The software defined networking language NetKAT is able to verify many useful properties of networks automatically via a PSPACE decision procedure for program equality. However, for its probabilistic extension ProbNetKAT, ...
  • Flow-Limited Authorization 

    Arden, Owen (2017-01)
    Enforcing the confidentiality and integrity of information is critical in distributed applications. Production systems typically use some form of authorization mechanism to protect information, but these mechanisms do ...
  • Lightweight Verification of Secure Hardware Isolation Through Static Information Flow Analysis (Technical Report) 

    Ferraiuolo, Andrew; Xu, Rui; Zhang, Danfeng; Myers, Andrew C.; Suh, G. Edward (2017-01-29)
    Hardware-based mechanisms for software isolation are becoming increasingly popular, but implementing these mechanisms correctly has proved difficult, undermining the root of security. This work introduces an effective ...

View more


RSS Feeds