Andrei Sabelfeld
Visar 117 publikationer
CodeX: Contextual Flow Tracking for Browser Extensions
FakeX: A Framework for Detecting Fake Reviews of Browser Extensions
Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS
Poster: Data Minimization by Construction for Trigger-Action Applications
LazyTAP: On-Demand Data Minimization for Trigger-Action Applications
Black Ostrich: Web Application Scanning with String Solvers
No Signal Left to Chance: Driving Browser Extension Analysis by Download Patterns
DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting Duplication
Practical Data Access Minimization in Trigger-Action Platforms
Outsourcing MPC Precomputation for Location Privacy
Are chrome extensions compliant with the spirit of least privilege?
Hardening the security analysis of browser extensions
SecWasm: Information Flow Control for WebAssembly
EssentialFP: Exposing the Essence of Browser Fingerprinting
Securing Node-RED Applications
Data privacy in trigger-action systems
Black widow: Blackbox data-driven web scanning
SandTrap: Securing JavaScript-driven Trigger-Action Platforms
Nontransitive Policies Transpiled
VERONICA: Expressive and Precise Concurrent Information Flow Security
Clockwork: Tracking Remote Timing Attacks
Where are you bob? privacy-preserving proximity testing with a napping party
AutoNav: Evaluation and Automatization of Web Navigation Policies
HMAC and “secure preferences”: Revisiting chromium-based browsers security
An empirical study of information flows in real-world Javascript
Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks
On the road with third-party apps: Security analysis of an in-vehicle app platform
Information-flow control for database-backed applications
Raising the bar: Evaluating origin-wide security manifests
Information Flow Tracking for Side-Effectful Libraries
Tracking Information Flow via Delayed Output: Addressing Privacy in IoT and Emailing Apps
If This Then What? Controlling Flows in IoT Apps
Prudent Design Principles for Information Flow Control
Measuring login webpage security
We are family: Relating information-flow trackers
Discovering Browser Extensions via Web Accessible Resources
Special issue on verified information flow security
PrivatePool: Privacy-Preserving Ridesharing
Privacy-Preserving Location-Proximity for Mobile Apps
Welcome Message from the Program Committee Chairs EuroS&P 2017
A Principled Approach to Tracking Information Flow in the Presence of Libraries
MaxPace: Speed-Constrained Location Queries
Explicit Secrecy: A Policy for Taint Tracking
Secure multi-execution: Fine-grained, declassification-aware, and transparent
Progress-sensitive security for SPARK
Data Exfiltration in the Face of CSP
Information-flow security for JavaScript and its APIs
Javascript sandboxing: Isolating and restricting client-side javascript
JSLINQ: Building secure applications across tiers
Location-enhanced Authentication using the IoT
Let’s face it: Faceted values for taint tracking
Location-enhanced authentication using the IoT because you cannot be in two places at once
Value-sensitive Hybrid Information Flow Control for a JavaScript-like Language
Value Sensitivity and Observable Abstract Values for Information Flow Control
Web Application Security using JSFlow
May I? - Content Security Policy Endorsement for Browser Extensions
Understanding and Enforcing Opacity
InnerCircle: A Parallelizable Decentralized Privacy-Preserving Location Proximity Protocol
Password meters and generators on the web: From large-scale empirical study to getting it right
Compositional Information-flow Security for Interactive Systems
Architectures for Inlining Security Monitors in Web Application
JSFlow: Tracking Information Flow in JavaScript and its APIs
SeLINQ: Tracking information across application-database boundaries
Secure multi-execution: Fine-grained, declassification-aware, and transparent
Securing Class Initialization in Java-like Languages
Polyglots: Crossing Origins by Crossing Formats
Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing
On-The-Fly Inlining Of Dynamic Security Monitors
Information-flow security for a core of JavaScript
Capabilities for information flow
Decentralized Delimited Release
A Perspective on Information-Flow Control
Limiting Information Leakage in Event-based Communication
Security of Multithreaded Programs by Compilation
A lattice-based approach to mashup security
Dynamic vs. Static Flow-Sensitive Security Analysis
On-the-fly inlining of dynamic security monitors
Unifying Facets of Information Integrity
Secuirty of Multithreaded Programs by Compilation
Securing Interaction between Threads and the Scheduler in the Presence of Synchronization
Implicit flows in malicious and nonmalicious code
From dynamic to static and back: Riding the roller coaster of information-flow control research
Tight Enforcement of Information-Release Policies for Dynamic Languages
Tracking Information Flow in Dynamic Tree Structures
Securing Timeout Instructions in Web Applications
Catch Me If You Can: Permissive Yet Secure Error Handling
Declassification: Dimensions and Principles
Cryptographically-Masked Flows
Termination-Insensitive Noninterference Leaks More Than Just a Bit.
Closing Internal Timing Channels by Transformation
Gradual Release: Unifying Declassification, Encryption and Key Release Policies
Security of Multithreaded Programs by Compilation
Localized Delimited Release: Combining the What and Where Dimensions of Information Release
Securing Interaction between Threads and the Scheduler
Security for Multithreaded Programs under Cooperative Scheduling
Enforcing Robust Declassification and Qualified Robustness
Cryptographically-Masked Flows
Dimensions and Principles of Declassification
Bridging Language-Based and Process Calculi Security
Proceedings of FCS'05 Workshop on Foundations of Computer Security
Secure Implementation of Cryptographic Protocols: A Case Study of Mutual Distrust
Security-typed languages for implementation of cryptographic protocols: A case study
Proceedings of Workshop on Foundations of Computer Security
Proceedings of FCS'04 Workshop on Foundations of Computer Security
A Model for Delimited Information Release
Enforcing Robust Declassification
A Per Model of Secure Information Flow in Sequential Programs
Probabilistic Noninterference for Multi-threaded Programs
Ladda ner publikationslistor
Du kan ladda ner denna lista till din dator.
Filtrera och ladda ner publikationslista
Som inloggad användare hittar du ytterligare funktioner i MyResearch.
Du kan även exportera direkt till Zotero eller Mendeley genom webbläsarplugins. Dessa hittar du här:
Zotero Connector
Mendeley Web Importer
Tjänsten SwePub erbjuder uttag av Researchs listor i andra format, till exempel kan du få uttag av publikationer enligt Harvard och Oxford i .RIS, BibTex och RefWorks-format.
Visar 11 forskningsprojekt
SEBRA: SEcuring BRowser Extensions by Information Flow Analysis
Mint: Minimizing Code and Data in Complex Systems”
Principiell säkerhet för framväxande applikationsdomäner
FlowShield: Securing Web Applications by Information Flow Tracking
WebSec: Säkerhet i webb-drivna system
WASP - Security for Autonomous Systems
FlexCSP - Putting Content Security Policy to work for Practical Web Applications
DecentLP: Robust decentraliserad plats-sekretess
Programming Language-Based Security To Rescue (PROSECUTOR)
Informationsdriven säker Business Intelligence (DataBIN)