D. Jang, R. Jhala, S. Lerner, and H. Shacham, An empirical study of privacy-violating information flows in JavaScript web applications, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, 2010.
DOI : 10.1145/1866307.1866339

D. Hedin and A. Sabelfeld, Information-Flow Security for a Core of JavaScript, 2012 IEEE 25th Computer Security Foundations Symposium, 2012.
DOI : 10.1109/CSF.2012.19

W. De-groef, D. Devriese, N. Nikiforakis, and F. Piessens, FlowFox, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382275

A. Bichhawat, V. Rajani, D. Garg, and C. Hammer, Information Flow Control in WebKit???s JavaScript Bytecode, POST, 2014.
DOI : 10.1007/978-3-642-54792-8_9

T. H. Austin and C. Flanagan, Multiple Facets for Dynamic Information Flow, POPL, 2012.

N. Nikiforakis, L. Invernizzi, A. Kapravelos, S. Van-acker, W. Joosen et al., You are what you include, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382274

P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Krügel et al., Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis, NDSS, 2007.

D. Devriese and F. Piessens, Noninterference through Secure Multi-execution, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.15

URL : https://lirias.kuleuven.be/bitstream/123456789/265429/1/secure-multi-execution-final.pdf

N. Bielova, D. Devriese, F. Massacci, and F. Piessens, Reactive non-interference for a browser model, 2011 5th International Conference on Network and System Security, 2011.
DOI : 10.1109/ICNSS.2011.6059965

C. Klein, J. Clements, C. Dimoulas, C. Eastlund, M. Felleisen et al., Run Your Research: On the Effectiveness of Lightweight Mechanization, 2012.

A. Sabelfeld and D. Sands, A Per Model of Secure Information Flow in Sequential Programs, Higher Order Symbol. Comput, vol.14, issue.1, pp.59-91, 2001.
DOI : 10.1007/3-540-49099-X_4

R. Capizzi, A. Longo, V. Venkatakrishnan, and A. Sistla, Preventing Information Leaks through Shadow Executions, 2008 Annual Computer Security Applications Conference (ACSAC), 2008.
DOI : 10.1109/ACSAC.2008.50

W. Rafnsson and A. Sabelfeld, Secure multi-execution: finegrained , declassification-aware, and transparent, CSF, 2013.

D. Zanarini, M. Jaskelioff, and A. Russo, Precise Enforcement of Confidentiality for Reactive Systems, 2013 IEEE 26th Computer Security Foundations Symposium, 2013.
DOI : 10.1109/CSF.2013.9

V. Kashyap, B. Wiedermann, and B. Hardekopf, Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach, 2011 IEEE Symposium on Security and Privacy, 2011.
DOI : 10.1109/SP.2011.19

W. De-groef, D. Devriese, N. Nikiforakis, and F. Piessens, Secure multi-execution of web scripts: Theory and practice, Journal of Computer Security, vol.22, issue.4, 2014.
DOI : 10.3233/JCS-130495

A. Askarov, S. Hunt, A. Sabelfeld, and D. Sands, Termination-Insensitive Noninterference Leaks More Than Just a Bit, ESORICS, 2008.
DOI : 10.3233/JCS-1996-42-304

A. Sabelfeld and D. Sands, Dimensions and Principles of Declassification, CSF, 2005.

S. Chong and A. C. Myers, Language-Based Information Erasure, 18th IEEE Computer Security Foundations Workshop (CSFW'05), 2005.
DOI : 10.1109/CSFW.2005.19

A. A. Matos and G. Boudol, On Declassification and the Non-Disclosure Policy, 18th IEEE Computer Security Foundations Workshop (CSFW'05), 2005.
DOI : 10.1109/CSFW.2005.21

N. Broberg and D. Sands, Flow Locks: Towards a Core Calculus for Dynamic Flow Policies, ESOP, 2006.
DOI : 10.3233/JCS-1996-42-304

H. Mantel, A. G. Reinhard, S. Barthe, T. Cavadini, and . Rezk, Controlling the What and Where of Declassification in Language-Based Security Tractable Enforcement of Declassification Policies, ESOP CSF, 2007.

S. Chong and A. C. Myers, End-to-End Enforcement of Erasure and Declassification, 2008 21st IEEE Computer Security Foundations Symposium, 2008.
DOI : 10.1109/CSF.2008.12

A. Banerjee, D. A. Naumann, and S. Rosenberg, Expressive Declassification Policies and Modular Static Enforcement, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008.
DOI : 10.1109/SP.2008.20

P. Li and S. Zdancewic, Downgrading policies and relaxed noninterference, POPL, 2005.
DOI : 10.1145/1040305.1040319

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.143.9195

A. Sabelfeld and A. C. Myers, A Model for Delimited Information Release, International Symposium on Software Security, 2003.
DOI : 10.1007/978-3-540-37621-7_9

A. Askarov and A. Sabelfeld, Localized delimited release, Proceedings of the 2007 workshop on Programming languages and analysis for security , PLAS '07, 2007.
DOI : 10.1145/1255329.1255339

J. Magazinius, A. Askarov, and A. Sabelfeld, Decentralized Delimited Release, APLAS, 2011.
DOI : 10.3233/JCS-1996-42-304

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.295.1435

C. Fournet and J. Planul, Compiling Information-Flow Security to Minimal Trusted Computing Bases, ESOP, 2011.
DOI : 10.3233/JCS-2006-14203

N. Swamy and M. Hicks, Verified enforcement of stateful information release policies, PLAS, 2008.

G. and L. Guernic, Confidentiality Enforcement Using Dynamic Information Flow Analyses, 2007.
URL : https://hal.archives-ouvertes.fr/tel-00198621

A. Bohannon and B. C. Pierce, Featherweight firefox: Formalizing the core of a web browser, USENIX Conference on Web Application Development, 2010.

G. Barthe, J. M. Crespo, D. Devriese, F. Piessens, and E. Rivas, Secure Multi-Execution through Static Program Transformation, FMOODS/FORTE, 2012.
DOI : 10.1007/978-3-642-30793-5_12

S. Van-acker, P. De-ryck, L. Desmet, F. Piessens, and W. Joosen, WebJail, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, 2011.
DOI : 10.1145/2076732.2076775

D. Crockford, Adsafe, 2009.

M. S. Miller, M. Samuel, B. Laurie, I. Awad, and M. Stay, Caja: Safe active content in sanitized javascript

P. Agten, S. Van-acker, Y. Brondsema, P. H. Phung, L. Desmet et al., JSand, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, 2012.
DOI : 10.1145/2420950.2420952

S. Maffeis, J. C. Mitchell, and A. Taly, Object Capabilities and Isolation of Untrusted Web Applications, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.16

W. Xu, S. Bhatkar, and R. Sekar, Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks, USENIX Security, 2006.

P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Krügel et al., Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis, NDSS, 2007.