H. Thomas, C. Austin, and . Flanagan, Efficient Purely-dynamic Information Flow Analysis, Proc. of PLAS 2009 (PLAS '09, pp.113-124, 2009.

H. Thomas, C. Austin, and . Flanagan, Permissive Dynamic Information Flow Analysis, Proc. of PLAS 2010 (PLAS '10, pp.1-12, 2010.

H. Thomas, C. Austin, and . Flanagan, Multiple Facets for Dynamic Information Flow, Proc. of POPL 2012 (POPL '12, pp.165-178, 2012.

G. Barthe, J. M. Crespo, D. Devriese, F. Piessens, and E. Rivas, Secure Multi-Execution through Static Program Transformation, Formal Techniques for Distributed Systems, pp.186-202, 2012.
DOI : 10.1007/978-3-642-30793-5_12

URL : https://hal.archives-ouvertes.fr/hal-01528736

A. Bichhawat, V. Rajani, D. Garg, and C. Hammer, Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis, Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, PLAS'14, pp.15-24, 2014.
DOI : 10.1145/2637113.2637116

URL : http://arxiv.org/pdf/1506.03950

N. Bielova, D. Devriese, F. Massacci, and F. Piessens, Reactive noninterference for a Browser model, Proc. of NSS 2011, pp.97-104, 2011.
DOI : 10.1109/icnss.2011.6059965

N. Bielova and T. Rezk, Spot the Difference: Secure Multiexecution and Multiple Facets, Proc. of ESORICS 2016, pp.501-519, 2016.
DOI : 10.1007/978-3-319-45744-4_25

URL : https://hal.archives-ouvertes.fr/hal-01348192

N. Bielova and T. Rezk, Spot the Difference: Secure Multi-execution and Multiple Facets, pp.7-9, 2016.
DOI : 10.1109/CSF.2013.9

URL : https://hal.archives-ouvertes.fr/hal-01348192

N. Bielova and T. Rezk, A Taxonomy of Information Flow Monitors, Proc. of POST 2016, pp.46-67, 2016.
DOI : 10.1109/CSF.2013.9

URL : https://hal.archives-ouvertes.fr/hal-01348188

I. Bolo?teanu and D. Garg, Asymmetric Secure Multi-execution with Declassification, Proc. of POST 2016, pp.24-45, 2016.
DOI : 10.1109/CSF.2013.9

N. Broberg, B. Van-delft, and D. Sands, Paragon for Practical Programming with Information-Flow Control, Proc. of APLAS 2013, pp.217-232, 2013.
DOI : 10.1007/978-3-319-03542-0_16

S. Calzavara, A. Rabitti, and M. Bugliesi, Content Security Problems?, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.1365-1375, 2016.
DOI : 10.1007/978-3-319-11379-1_11

W. De-groef and D. Devriese, Nick Nikiforakis, and Frank Piessens FlowFox: a web browser with flexible and precise information flow control, Proc. of CCS 2012, pp.748-759, 2012.

D. Devriese and F. Piessens, Noninterference through Secure Multi-execution, 2010 IEEE Symposium on Security and Privacy, pp.109-124, 2010.
DOI : 10.1109/SP.2010.15

P. Efstathopoulos, M. Krohn, S. Vandebogart, C. Frey, D. Ziegler et al., Labels and event processes in the Asbestos operating system, Proc. of SOSP 2005 (SOSP), 2005.

D. Hedin, A. Birgisson, L. Bello, and A. Sabelfeld, JSFlow, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, 2014.
DOI : 10.1145/2554850.2554909

C. Jackson and A. Barth, Beware of Finer-Grained Origins, Web 2.0 Security and Privacy (W2SP'08), 2008.

M. Jaskelioff and A. Russo, Secure Multi-execution in Haskell, International Andrei Ershov Memorial Conference on Perspectives of System Informatics, pp.170-178, 2011.
DOI : 10.1007/978-3-642-29709-0_16

V. Kashyap, B. Wiedermann, and B. Hardekopf, Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach, 2011 IEEE Symposium on Security and Privacy, pp.413-428, 2011.
DOI : 10.1109/SP.2011.19

URL : http://www.ieee-security.org/TC/SP2011/PAPERS/2011/paper026.pdf

M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek et al., Information Flow Control for Standard OS Abstractions, Proc. of SOSP 2007 (SOSP), 2007.
DOI : 10.1145/1294261.1294293

URL : http://www.pdos.csail.mit.edu/~max/docs/flume.ps.gz

C. Andrew and . Myers, JFlow: Practical mostly-static information flow control, Proc. of POPL, pp.228-241, 1999.

C. Andrew, B. Myers, and . Liskov, Protecting privacy using the decentralized label model, ACM Transactions on Software Engineering and Methodology (TOSEM), vol.9, issue.4, pp.410-442, 2000.

M. Ngo, N. Bielova, C. Flanagan, T. Rezk, A. Russo et al., A Better Facet of Dynamic Information Flow Control, p.2, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01723723

M. Ngo and F. Massacci, Dimiter Milushev, and Frank Piessens Runtime Enforcement of Security Policies on Black Box Reactive Programs, Proc. of POPL 2015, 2015.

F. Pottier and V. Simonet, Information Flow Inference for ML, ACM Symp. on Principles of Programming Languages, pp.319-330, 2002.
DOI : 10.1145/503272.503302

URL : http://cristal.inria.fr/~simonet/publis/fpottier-simonet-toplas.pdf

W. Rafnsson and A. Sabelfeld, Secure Multi-execution: Fine- Grained, Declassification-Aware, and Transparent, Proc. of CSF 2013, pp.33-48, 2013.
DOI : 10.1109/csf.2013.10

URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=6595819

I. Roy, D. E. Porter, M. D. Bond, K. S. Mckinley, and E. Witchel, Laminar: Practical Fine-grained Decentralized Information Flow Control, Proc. of PLDI 2009 (PLDI), 2009.

A. Russo, Functional Pearl: Two Can Keep a Secret, if One of Them Uses Haskell, Proc. of ICFP 2015 (ICFP, 2015.

T. José-fragoso-santos, T. Jensen, A. Rezk, and . Schmitt, Hybrid Typing of Secure Information Flow in a JavaScript-Like Language, Proc. of TGC 2015, pp.63-78, 2015.
DOI : 10.1007/978-3-319-28766-9_5

D. Francis-some, N. Bielova, and T. Rezk, On the Content Security Policy Violations Due to the Same-Origin Policy, Proc. of WWW 2017 (WWW '17, pp.877-886, 2017.

D. Stefan, A. Russo, P. Buiras, A. Levy, C. John et al., Addressing covert termination and timing channels in concurrent information flow systems, Proc. of ICFP 2012, pp.201-214, 2012.
DOI : 10.1145/2398856.2364557

URL : http://www.scs.stanford.edu/%7Edm/home/papers/stefan%3Aaddressing-covert.pdf

D. Stefan, A. Russo, D. Mazières, and J. C. Mitchell, Disjunction Category Labels, Proc. of NordSec, 2011.
DOI : 10.1007/978-3-642-29615-4_16

URL : http://www.scs.stanford.edu/%7Edm/home/papers/stefan%3Adclabels.pdf

M. Vanhoef, W. D. Groef, D. Devriese, F. Piessens, and T. Rezk, Stateful Declassification Policies for Event-Driven Programs, 2014 IEEE 27th Computer Security Foundations Symposium, pp.293-307, 2014.
DOI : 10.1109/CSF.2014.28

URL : https://hal.archives-ouvertes.fr/hal-01098443

L. Waye, P. Buiras, D. King, S. Chong, and A. Russo, It???s My Privilege: Controlling Downgrading in??DC-Labels, International Workshop on Security and Trust Management, 2015.
DOI : 10.1109/CSFW.2001.930133

URL : http://people.seas.harvard.edu/%7Echong/pubs/stm2015-my-privilege.pdf

. Wikipedia, Ad exchange. (2017). https://en.wikipedia.org/wiki/Ad_ exchange, 2017.

. Wikipedia, Real-time bidding. (2017). https://en.wikipedia.org/wiki/ Real-time_bidding. Checked on, 2017.

D. Zanarini, M. Jaskelioff, and A. Russo, Precise Enforcement of Confidentiality for Reactive Systems, 2013 IEEE 26th Computer Security Foundations Symposium, pp.18-32, 2013.
DOI : 10.1109/CSF.2013.9

N. Zeldovich, S. Boyd-wickizer, E. Kohler, and D. Mazières, Making information flow explicit in HiStar, USENIX Symp. on Operating Systems Design and Implementation. USENIX, 2006.
DOI : 10.1145/2018396.2018419

URL : http://www.lasr.cs.ucla.edu/classes/239_1.fall10/papers/p263-zeldovich.pdf