A. Askarov and A. Sabelfeld, Tight Enforcement of Information-Release Policies for Dynamic Languages, 2009 22nd IEEE Computer Security Foundations Symposium, pp.43-59, 2009.
DOI : 10.1109/CSF.2009.22

T. Austin and C. Flanagan, Multiple facets for dynamic information flow, POPL, 2012.
DOI : 10.1145/2103656.2103677

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.297.8564

T. H. Austin and C. Flanagan, Permissive dynamic information flow analysis, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS '10, 2010.
DOI : 10.1145/1814217.1814220

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.297.9422

G. Barthe, J. M. Crespo, D. Devriese, F. Piessens, and E. Rivas, Secure Multi-Execution through Static Program Transformation, 2012.
DOI : 10.1007/978-3-642-30793-5_12

URL : https://hal.archives-ouvertes.fr/hal-01528736

G. Barthe, P. R. Argenio, and T. Rezk, Secure information flow by selfcomposition, CSFW, pp.100-114, 2004.

N. Bielova, D. Devriese, F. Massacci, and F. Piessens, Reactive non-interference for a browser model, 2011 5th International Conference on Network and System Security, 2011.
DOI : 10.1109/ICNSS.2011.6059965

A. Birgisson, A. Russo, and A. Sabelfeld, Capabilities for information flow, Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security, PLAS '11, 2011.
DOI : 10.1145/2166956.2166961

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.295.9096

R. Capizzi, A. Longo, V. N. Venkatakrishnan, and A. P. Sistla, Preventing Information Leaks through Shadow Executions, 2008 Annual Computer Security Applications Conference (ACSAC), 2008.
DOI : 10.1109/ACSAC.2008.50

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.5494

S. Cavadini, Secure slices of insecure programs, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.112-122, 2008.
DOI : 10.1145/1368310.1368329

A. Chudnov and D. A. Naumann, Information Flow Monitor Inlining, 2010 23rd IEEE Computer Security Foundations Symposium, pp.200-214, 2010.
DOI : 10.1109/CSF.2010.21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.6508

R. Chugh, J. A. Meister, R. Jhala, and S. Lerner, Staged information flow for Javascript, PLDI, 2009.
DOI : 10.1145/1542476.1542483

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.205.1627

M. Cristiá and P. Mata, Runtime enforcement of noninterference by duplicating processes and their memories, 2009.

D. Devriese and F. Piessens, Noninterference through Secure Multi-execution, 2010 IEEE Symposium on Security and Privacy, pp.109-124, 2010.
DOI : 10.1109/SP.2010.15

URL : https://lirias.kuleuven.be/bitstream/123456789/265429/1/secure-multi-execution-final.pdf

G. and L. Guernic, Confidentiality Enforcement Using Dynamic Information Flow Analyses, 2007.
URL : https://hal.archives-ouvertes.fr/tel-00198621

N. Heintze and J. G. Riecke, The SLam calculus, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.365-377, 1998.
DOI : 10.1145/268946.268976

M. Jaskelioff and A. Russo, Secure Multi-execution in Haskell, PSI, 2011.
DOI : 10.1007/978-3-642-29709-0_16

V. Kashyap, B. Wiedermann, and B. Hardekopf, Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach, 2011 IEEE Symposium on Security and Privacy, pp.413-428, 2011.
DOI : 10.1109/SP.2011.19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.352.9921

M. Ter-louw, K. T. Ganesh, and V. N. Venkatakrishnan, Adjail: Practical enforcement of confidentiality and integrity policies on web advertisements, USENIX Security Symposium, pp.371-388, 2010.

S. Maffeis, J. C. Mitchell, and A. Taly, Isolating JavaScript with Filters, Rewriting, and Wrappers, ESORICS, pp.505-522, 2009.
DOI : 10.1007/978-3-540-31987-0_28

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.641

S. Maffeis, J. C. Mitchell, and A. Taly, Object Capabilities and Isolation of Untrusted Web Applications, 2010 IEEE Symposium on Security and Privacy, pp.125-140, 2010.
DOI : 10.1109/SP.2010.16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.6529

M. S. Miller, M. Samuel, B. Laurie, I. Awad, and M. Stay, Caja: Safe active content in sanitized javascript, 2008.

A. C. Myers, JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999.
DOI : 10.1145/292540.292561

G. Richards, C. Hammer, B. Burg, and J. Vitek, The Eval That Men Do, 2011.
DOI : 10.1007/978-3-540-31987-0_28

A. Russo and A. Sabelfeld, Securing Timeout Instructions in Web Applications, 2009 22nd IEEE Computer Security Foundations Symposium, pp.92-106, 2009.
DOI : 10.1109/CSF.2009.16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.268

A. Russo, A. Sabelfeld, and A. Chudnov, Tracking Information Flow in Dynamic Tree Structures, ESORICS, pp.86-103, 2009.
DOI : 10.1007/3-540-48294-6_20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.5981

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3979

A. Sabelfeld and A. Russo, From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research, Ershov Memorial Conference, pp.352-365, 2009.
DOI : 10.1007/978-3-642-11486-1_30

A. Taly, U. Erlingsson, M. S. Miller, J. C. Mitchell, and J. Nagra, Automated Analysis of Security-Critical JavaScript APIs, 2011 IEEE Symposium on Security and Privacy, 2011.
DOI : 10.1109/SP.2011.39

D. Volpano, C. Irvine, and G. Smith, A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-188, 1996.
DOI : 10.3233/JCS-1996-42-304

URL : http://cisr.nps.edu/downloads/96paper_jcs.pdf