T. H. Austin and C. Flanagan, Efficient purely-dynamic information flow analysis, PLAS, 2009.
DOI : 10.1145/1667209.1667223

L. Bauer, S. Cai, L. Jia, T. Passaro, M. Stroucken et al., Run-time Monitoring and Formal Analysis of Information Flows in Chromium, Proceedings 2015 Network and Distributed System Security Symposium, 2015.
DOI : 10.14722/ndss.2015.23295

URL : http://www.ece.cmu.edu/%7Elbauer/papers/2015/ndss2015-browser-info-flow.pdf

A. Bichhawat, V. Rajani, D. Garg, and C. Hammer, Information Flow Control in WebKit???s JavaScript Bytecode, 2014.
DOI : 10.1007/978-3-642-54792-8_9

URL : http://arxiv.org/pdf/1401.4339

N. Bielova and T. Rezk, A Taxonomy of Information Flow Monitors, 2016.
DOI : 10.1109/CSF.2013.9

URL : https://hal.archives-ouvertes.fr/hal-01348188

D. E. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

D. Devriese and F. Piessens, Noninterference through Secure Multi-execution, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.15

C. Dimoulas, R. B. Findler, C. Flanagan, and M. Felleisen, Correct blame for contracts: No more scapegoating, POPL, 2011.
DOI : 10.1145/1925844.1926410

C. Dimoulas, M. S. New, R. B. Findler, and M. Felleisen, Oh Lord, please don't let contracts be misunderstood (functional pearl), ICFP, 2016.
DOI : 10.1145/3022670.2951930

R. B. Findler and M. Felleisen, Contracts for higher-order functions, ICFP, 2002.
DOI : 10.1145/583852.581484

URL : http://people.cs.uchicago.edu/~robby/pubs/papers/ho-contracts-techreport.ps

, File System ? Node.js v9.2.0 Documentation, 2017.

M. Greenberg, B. C. Pierce, and S. Weirich, Contracts made manifest, POPL, 2010.

W. D. Groef, D. Devriese, N. Nikiforakis, and F. Piessens, FlowFox, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382275

W. D. Groef, D. Devriese, N. Nikiforakis, and F. Piessens, Secure multi-execution of web scripts: Theory and practice, Journal of Computer Security, vol.22, issue.4, 2014.
DOI : 10.3233/JCS-130495

D. Hedin, L. Bello, and A. Sabelfeld, Information-flow security for JavaScript and??its APIs, Journal of Computer Security, vol.4, issue.3, 2015.
DOI : 10.3233/JCS-1996-42-304

D. Hedin, A. Birgisson, L. Bello, and A. Sabelfeld, JSFlow, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, 2014.
DOI : 10.1145/2554850.2554909

D. Hedin and A. Sabelfeld, Information-Flow Security for a Core of JavaScript, 2012 IEEE 25th Computer Security Foundations Symposium, 2012.
DOI : 10.1109/CSF.2012.19

URL : http://www.cse.chalmers.se/~andrei/jsflow-csf12.pdf

D. Hedin, A. Sjösten, F. Piessens, and A. Sabelfeld, A Principled Approach to Tracking Information Flow in the Presence of Libraries, 2017.
DOI : 10.1007/978-3-540-73589-2_2

S. Heule, D. Stefan, E. Z. Yang, J. C. Mitchell, and A. Russo, IFC Inside: Retrofitting Languages with Dynamic Information Flow Control, 2015.
DOI : 10.1007/978-3-662-46666-7_2

I. , The Coq Proof Assistant, 2017.

V. Kashyap, B. Wiedermann, and B. Hardekopf, Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach, 2011 IEEE Symposium on Security and Privacy, 2011.
DOI : 10.1109/SP.2011.19

D. King, T. Jaeger, S. Jha, and S. A. Seshia, Effective blame for information-flow violations, Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, SIGSOFT '08/FSE-16, 2008.
DOI : 10.1145/1453101.1453135

. Mozilla-developer and . Network, Proxy. https://developer.mozilla, 2018.

M. Developer-network and . Regexp, , 2018.

W. Rafnsson and A. Sabelfeld, Secure Multi-Execution: Fine-grained, Declassification-aware, and Transparent, CSF, 2013.

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

M. Sharir and A. Pnueli, Two approaches to interprocedural data flow analysis. Program Flow Analysis: Theory and Applications, 1981.

A. Sjösten, D. Hedin, and A. Sabelfeld, Information Flow Tracking for Sideeffectful Libraries -Full version

S. A. Zdancewic, Programming Languages for Information Security, 2002.