Towards a Formal Foundation of Web Security, 2010 23rd IEEE Computer Security Foundations Symposium, pp.290-304, 2010. ,
DOI : 10.1109/CSF.2010.27
Attacks on JavaScript Mashup Communication, W2SP2009, 2009. ,
Securing frame communication in browsers, Communications of the ACM, vol.52, issue.6, pp.83-91, 2009. ,
DOI : 10.1145/1516046.1516066
Cross-origin Javascript Capability Leaks: Detection, Exploitation, and Defense, USENIX security symposium, pp.187-198, 2009. ,
Reducing cross domain call overhead using batched futures, OOPSLA, 1994. ,
Featherweight Firefox: Formalizing the core of a web browser, Usenix Conference on Web Application Development (WebApps), 2010. ,
Typing termination in a higher-order concurrent imperative language, Information and Computation, vol.208, issue.6, pp.716-736, 2010. ,
DOI : 10.1016/j.ic.2009.06.007
OMash, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.99-108, 2008. ,
DOI : 10.1145/1455770.1455784
The <module> Tag, 2010. ,
Labels and event processes in the asbestos operating system, SIGOPS Oper. Syst. Rev, vol.39, issue.5, 2005. ,
Fully abstract compilation to javascript, The 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '13, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00780803
Syntactic type abstraction, ACM Transactions on Programming Languages and Systems, vol.22, issue.6, pp.1037-1080, 2000. ,
DOI : 10.1145/371880.371887
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.2708
Information-Flow Security for a Core of JavaScript, 2012 IEEE 25th Computer Security Foundations Symposium, 2012. ,
DOI : 10.1109/CSF.2012.19
Document Object Model (DOM) level 2 Core Specification, p.3, 2000. ,
Remote Batch Invocation for Compositional Object Services, 2009. ,
DOI : 10.1109/MIC.2003.1250585
Subspace, Proceedings of the 16th international conference on World Wide Web , WWW '07, 2007. ,
DOI : 10.1145/1242572.1242655
Sorin Lerner, and Hovav Shacham. An Empirical Study of Privacy-violating Information Flows in JavaScript Web Applications, CCS, 2010. ,
SMash, Proceeding of the 17th international conference on World Wide Web , WWW '08, 2008. ,
DOI : 10.1145/1367497.1367570
Scheme to JavaScript Compilation, 2009. ,
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements, USENIX Security Symposium, 2010. ,
Mashic compiler: Sandboxing using inter-frame communication, IEEE Computer Security Foundations Symposium, 2012. ,
Language-Based Isolation of Untrusted JavaScript, 2009 22nd IEEE Computer Security Foundations Symposium, pp.77-91, 2009. ,
DOI : 10.1109/CSF.2009.11
An Operational Semantics for JavaScript, APLAS, pp.307-325, 2008. ,
DOI : 10.1007/11601524_11
Object Capabilities and Isolation of Untrusted Web Applications, 2010 IEEE Symposium on Security and Privacy, 2010. ,
DOI : 10.1109/SP.2010.16
You are what you include, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, p.12, 2012. ,
DOI : 10.1145/2382196.2382274
Typed-based verification of Web sandboxes, Journal of Computer Security, vol.22, issue.4, pp.511-565, 2014. ,
DOI : 10.3233/JCS-140504
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, 2003. ,
DOI : 10.1109/JSAC.2002.806121
A Model for Delimited Information Release, Software Security -Theories and Systems, Second Mext-NSF-JSPS International Symposium, ISSS 2003, pp.174-191, 2003. ,
DOI : 10.1007/978-3-540-37621-7_9
An information flow monitor-inlining compiler for securing a core of javascript, IFIP Advances in Information and Communication Technology, pp.278-292, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01087374
CORBA: integrating diverse applications within distributed heterogeneous environments, IEEE Communications Magazine, vol.35, issue.2, pp.46-55, 1997. ,
DOI : 10.1109/35.565655
Protection and Communication Abstractions for Web Browsers in MashupOS, SOSP '07, pp.1-16, 2007. ,
A measurement study of insecure javascript practices on the web, ACM Transactions on the Web, vol.7, issue.2, 2013. ,
DOI : 10.1145/2460383.2460386
Making information flow explicit in HiStar, Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, p.6, 2006. ,
DOI : 10.1145/2018396.2018419