On Flow-Sensitive Security Types, Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp.79-90, 2006. ,
DOI : 10.1145/1111037.1111045
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.388.4867
Automata-Based Confidentiality Monitoring Advances in Computer Science-ASIAN, Secure Software and Related Issues, pp.75-89, 2006. ,
Termination-Insensitive Noninterference Leaks More Than Just a Bit, Computer Security - ESORICS Lecture Notes in Computer Science, vol.4, issue.3, 2008. ,
DOI : 10.3233/JCS-1996-42-304
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.573
Efficient purely-dynamic information flow analysis, ACM SIGPLAN Notices, vol.44, issue.8, pp.20-31, 2009. ,
DOI : 10.1145/1667209.1667223
Dynamic vs. Static Flow-Sensitive Security Analysis, 2010 23rd IEEE Computer Security Foundations Symposium, pp.186-199, 2010. ,
DOI : 10.1109/CSF.2010.20
Permissive dynamic information flow analysis, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS '10, pp.1-12, 2010. ,
DOI : 10.1145/1814217.1814220
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.297.9422
Static Analysis for Efficient Hybrid Information-Flow Control, 2011 IEEE 24th Computer Security Foundations Symposium, pp.2011-2035, 2011. ,
DOI : 10.1109/CSF.2011.17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.229.1581
Mechanized Semantics for the Clight Subset of the C Language, Journal of Automated Reasoning, vol.29, issue.6, pp.263-288, 2009. ,
DOI : 10.1007/s10817-009-9148-3
URL : https://hal.archives-ouvertes.fr/inria-00352524
Formal verification of a realistic compiler, Communications of the ACM, vol.52, issue.7, pp.107-115, 2009. ,
DOI : 10.1145/1538788.1538814
URL : https://hal.archives-ouvertes.fr/inria-00415861
Program Transformation for Non-interference Verification on Programs with Pointers, 2013. ,
DOI : 10.1007/978-3-642-33826-7_16
URL : https://hal.archives-ouvertes.fr/hal-00814671
Natural semantics, 4th Annual Symposium on Theoretical Aspects of Computer Sciences on STACS 87, pp.22-39, 1987. ,
DOI : 10.1007/BFb0039592
URL : https://hal.archives-ouvertes.fr/inria-00075953
Language-Based Information-Flow Security. Selected Areas in Communications, IEEE Journal on, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/jsac.2002.806121
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3979
Automaton-based Confidentiality Monitoring of Concurrent Programs, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.218-232, 2007. ,
DOI : 10.1109/CSF.2007.10
URL : https://hal.archives-ouvertes.fr/inria-00161019
Frama-C, Software Engineering and Formal Methods, pp.233-247, 2012. ,
DOI : 10.1007/978-3-642-33826-7_16