Tight Enforcement of Information-Release Policies for Dynamic Languages, 2009 22nd IEEE Computer Security Foundations Symposium, pp.43-59, 2009. ,
DOI : 10.1109/CSF.2009.22
Multiple facets for dynamic information flow, POPL, 2012. ,
DOI : 10.1145/2103656.2103677
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.297.8564
Permissive dynamic information flow analysis, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS '10, 2010. ,
DOI : 10.1145/1814217.1814220
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.297.9422
Secure Multi-Execution through Static Program Transformation, 2012. ,
DOI : 10.1007/978-3-642-30793-5_12
URL : https://hal.archives-ouvertes.fr/hal-01528736
Secure information flow by selfcomposition, CSFW, pp.100-114, 2004. ,
Reactive non-interference for a browser model, 2011 5th International Conference on Network and System Security, 2011. ,
DOI : 10.1109/ICNSS.2011.6059965
Capabilities for information flow, Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security, PLAS '11, 2011. ,
DOI : 10.1145/2166956.2166961
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.295.9096
Preventing Information Leaks through Shadow Executions, 2008 Annual Computer Security Applications Conference (ACSAC), 2008. ,
DOI : 10.1109/ACSAC.2008.50
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.5494
Secure slices of insecure programs, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.112-122, 2008. ,
DOI : 10.1145/1368310.1368329
Information Flow Monitor Inlining, 2010 23rd IEEE Computer Security Foundations Symposium, pp.200-214, 2010. ,
DOI : 10.1109/CSF.2010.21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.6508
Staged information flow for Javascript, PLDI, 2009. ,
DOI : 10.1145/1542476.1542483
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.205.1627
Runtime enforcement of noninterference by duplicating processes and their memories, 2009. ,
Noninterference through Secure Multi-execution, 2010 IEEE Symposium on Security and Privacy, pp.109-124, 2010. ,
DOI : 10.1109/SP.2010.15
URL : https://lirias.kuleuven.be/bitstream/123456789/265429/1/secure-multi-execution-final.pdf
Confidentiality Enforcement Using Dynamic Information Flow Analyses, 2007. ,
URL : https://hal.archives-ouvertes.fr/tel-00198621
The SLam calculus, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.365-377, 1998. ,
DOI : 10.1145/268946.268976
Secure Multi-execution in Haskell, PSI, 2011. ,
DOI : 10.1007/978-3-642-29709-0_16
Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach, 2011 IEEE Symposium on Security and Privacy, pp.413-428, 2011. ,
DOI : 10.1109/SP.2011.19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.352.9921
Adjail: Practical enforcement of confidentiality and integrity policies on web advertisements, USENIX Security Symposium, pp.371-388, 2010. ,
Isolating JavaScript with Filters, Rewriting, and Wrappers, ESORICS, pp.505-522, 2009. ,
DOI : 10.1007/978-3-540-31987-0_28
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.641
Object Capabilities and Isolation of Untrusted Web Applications, 2010 IEEE Symposium on Security and Privacy, pp.125-140, 2010. ,
DOI : 10.1109/SP.2010.16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.6529
Caja: Safe active content in sanitized javascript, 2008. ,
JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999. ,
DOI : 10.1145/292540.292561
The Eval That Men Do, 2011. ,
DOI : 10.1007/978-3-540-31987-0_28
Securing Timeout Instructions in Web Applications, 2009 22nd IEEE Computer Security Foundations Symposium, pp.92-106, 2009. ,
DOI : 10.1109/CSF.2009.16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.268
Tracking Information Flow in Dynamic Tree Structures, ESORICS, pp.86-103, 2009. ,
DOI : 10.1007/3-540-48294-6_20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.5981
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3979
From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research, Ershov Memorial Conference, pp.352-365, 2009. ,
DOI : 10.1007/978-3-642-11486-1_30
Automated Analysis of Security-Critical JavaScript APIs, 2011 IEEE Symposium on Security and Privacy, 2011. ,
DOI : 10.1109/SP.2011.39
A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-188, 1996. ,
DOI : 10.3233/JCS-1996-42-304
URL : http://cisr.nps.edu/downloads/96paper_jcs.pdf