Multiple facets for dynamic information flow, Proc. of the 39th Symposium of Principles of Programming Languages, 2012. ,
Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning, SSRN Electronic Journal, p.SSRN eLibrary, 2011. ,
DOI : 10.2139/ssrn.1898390
Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.141-153, 2009. ,
DOI : 10.1109/SP.2009.18
Securing frame communication in browsers, Communications of the ACM, vol.52, issue.6, pp.83-91, 2009. ,
DOI : 10.1145/1516046.1516066
Edit Automata: Enforcement Mechanisms for Run-time Security Policies, International Journal of Information Security, vol.4, issue.12, pp.2-16, 2005. ,
A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, pp.321-371, 2007. ,
DOI : 10.3233/JCS-2007-15302
Quantifying information flow with beliefs, Journal of Computer Security, vol.17, issue.5, pp.655-701, 2009. ,
DOI : 10.3233/JCS-2009-0353
URL : http://doi.org/10.3233/jcs-2009-0353
Commission proposes a comprehensive reform of the data protection rules ,
FlowFox, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.748-759, 2012. ,
DOI : 10.1145/2382196.2382275
Non-interference through secure multi-execution, Proc. of the 2010 Symposium on Security and Privacy, pp.109-124, 2010. ,
DOI : 10.1109/sp.2010.15
URL : https://lirias.kuleuven.be/bitstream/123456789/265429/1/secure-multi-execution-final.pdf
The Panopticlick project, https://panopticlick.eff.org [12] Eckersley, P.: How unique is your browser?, Proc. of the 2010 Privacy Enhancing Technologies Symposium, pp.1-18, 2011. ,
Information-Flow Security for a Core of JavaScript, 2012 IEEE 25th Computer Security Foundations Symposium, pp.3-18, 2012. ,
DOI : 10.1109/CSF.2012.19
An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007. ,
DOI : 10.1145/1315245.1315282
Approximation and Randomization for Quantitative Information-Flow Analysis, 2010 23rd IEEE Computer Security Foundations Symposium, pp.3-14, 2010. ,
DOI : 10.1109/CSF.2010.8
Privacy online: USA jumps aboard the Do- Not-Track standard, 2012. ,
Why we need a sound Do-Not-Track standard for privacy online, 2012. ,
Confidentiality Enforcement Using Dynamic Information Flow Analyses, 2007. ,
URL : https://hal.archives-ouvertes.fr/tel-00198621
Precise Dynamic Verification of Confidentiality, Proc. of the 5th International Verification Workshop. CEUR Workshop Proc, pp.82-96, 2008. ,
Automata-Based Confidentiality Monitoring, Proc. of the Annual Asian Computing Science Conference, pp.75-89, 2006. ,
DOI : 10.1007/11555827_21
URL : https://hal.archives-ouvertes.fr/inria-00130210
Dynamic Enforcement of Knowledge-Based Security Policies, 2011 IEEE 24th Computer Security Foundations Symposium, pp.114-128, 2011. ,
DOI : 10.1109/CSF.2011.15
Third-Party Web Tracking: Policy and Technology, 2012 IEEE Symposium on Security and Privacy, pp.413-427, 2012. ,
DOI : 10.1109/SP.2012.47
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.388.5781
Quantitative information flow as network flow capacity, Proc. of the ACM, 2008. ,
on Programming Language Design and Implementation, pp.193-205, 2008. ,
A survey of the use of adobe flash local shared objects to respawn http cookies, 2011. ,
Static Analysis for Efficient Hybrid Information-Flow Control, 2011 IEEE 24th Computer Security Foundations Symposium, pp.146-160, 2011. ,
DOI : 10.1109/CSF.2011.17
Letter to the online advertisement industry Available online: http://ec.europa.eu/justice/data-protection/article-29/ documentation/other-document/files, 20110803_ letter_to_oba_annexes.pdf [27] QIF project: Coq proof of monitor correctness, 2011. ,
Dynamic vs. Static Flow-Sensitive Security Analysis, 2010 23rd IEEE Computer Security Foundations Symposium, pp.186-199, 2010. ,
DOI : 10.1109/CSF.2010.20
On the Foundations of Quantitative Information Flow, Foundations of Software Science and Computational Structures, pp.288-302, 2009. ,
DOI : 10.1137/060651380
Respawn redux Online, 2011. ,
Flash Cookies and Privacy, AAAI Spring Symposium: Intelligent Information Privacy Management, 2010. ,
DOI : 10.2139/ssrn.1446862
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.401.7830