Rootkits for JavaScript environments Towards a formal foundation of web security, Proceedings of the 3rd USENIX conference on Offensive technologies, WOOT'09 23rd IEEE Computer Security Foundations Symposium, pp.290-304, 2009. ,
Discovering Concrete Attacks on Website Authorization by Formal Analysis, 2012 IEEE 25th Computer Security Foundations Symposium, 2012. ,
DOI : 10.1109/CSF.2012.27
URL : https://hal.archives-ouvertes.fr/hal-00815834
Robust defenses for cross-site request forgery, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.75-88, 2008. ,
DOI : 10.1145/1455770.1455782
Secure Password Managers " and " Military-Grade Encryption " on Smartphones: Oh, Really? ,
Cryptography and the internet, Advances in Cryptology: Proceedings of CRYPTO '98, 1998. ,
Cryptree: A Folder Tree Structure for Cryptographic File Systems, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06), pp.189-198, 2006. ,
DOI : 10.1109/SRDS.2006.15
Cryptographic Cloud Storage, Proceedings of the 14th international conference on Financial cryptograpy and data security, pp.136-149, 2010. ,
DOI : 10.1007/978-3-642-14992-4_13
Secure applications of low-entropy keys, Proceedings of the First International Workshop on Information Security, ISW '97, pp.121-134, 1998. ,
DOI : 10.1007/BFb0030415
Authenticated-encryption with associated-data, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.98-107, 2002. ,
DOI : 10.1145/586110.586125
Busting frame busting: a study of clickjacking vulnerabilities at popular sites, IEEE Oakland Web 2.0 Security and Privacy, 2010. ,