Gradual Release: Unifying Declassification, Encryption and Key Release Policies (SP '07), pp.207-221, 2007. ,
Secure compilation of side-channel countermeasures: the case of cryptographic "constant-time, Proc. of the 31st Computer Security Foundations Symposium, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01959560
A Static Analyzer for Large Safety-critical Software, Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (PLDI '03), 2003. ,
URL : https://hal.archives-ouvertes.fr/hal-00128135
, , pp.196-207
Language-Based Information Erasure, Proceedings of the 18th IEEE Workshop on Computer Security Foundations (CSFW '05), pp.241-254, 2005. ,
End-to-End Enforcement of Erasure and Declassification, Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium (CSF '08), pp.98-111, 2008. ,
Securing a Compiler Transformation, 23rd Int. Static Analysis Symposium, vol.9837, pp.170-188, 2016. ,
The Correctness-Security Gap in Compiler Optimization, Proc. of the 2015 IEEE Security and Privacy Workshops (SPW '15), pp.73-87, 2015. ,
, Iterated Register Coalescing. ACM Trans. Program. Lang. Syst, vol.18, pp.300-324, 1996.
Catching and Identifying Bugs in Register Allocation, Proceedings of the 13th International Conference on Static Analysis (SAS'06), pp.281-300, 2006. ,
Just Forget It: The Semantics and Enforcement of Information Erasure, Proceedings of the Theory and Practice of Software, 17th European Conference on Programming Languages and Systems (ESOP'08/ETAPS'08), pp.239-253, 2008. ,
, , 2011.
VeriFast: A Powerful, Sound, Predictable, Fast Verifier for C and Java, Proc. of the 3d Int. Symp. on NASA Formal Methods, vol.6617, pp.41-55, 2011. ,
Formal Certification of a Compiler Back-end or: Programming a Compiler with a Proof Assistant, Conference Record of the 33rd ACM SIGPLANSIGACT Symposium on Principles of Programming Languages (POPL '06), pp.42-54, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00000963
Formal verification of a realistic compiler, Commun. ACM, vol.52, pp.107-115, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00415861
Principles of Program Analysis, 1999. ,
DOI : 10.1007/978-3-662-03811-6
URL : http://www.seas.harvard.edu/courses/cs252/2011sp/slides/Lec11-AbstractInt.pdf
Translation Validation, Tools and Algorithms for Construction and Analysis of Systems (LNCS), vol.1384, pp.151-166, 1998. ,
Validating Register Allocation and Spilling, Proceedings of the 19th Joint European Conference on Theory and Practice of Software, International Conference on Compiler Construction (CC'10/ETAPS'10), pp.224-243, 2010. ,
DOI : 10.1007/978-3-642-11970-5_13
URL : https://hal.archives-ouvertes.fr/inria-00529841
Declassification: Dimensions and principles, Journal of Computer Security, vol.17, pp.517-548, 2009. ,
DOI : 10.3233/jcs-2009-0352
URL : http://www.md.chalmers.se/~andrei/sabelfeld-sands-jcs07.pdf
What you get is what you C: Controlling side effects in mainstream C compilers, 3rd IEEE European Symposium on Security and Privacy (EuroSP), 2018. ,
DOI : 10.1109/eurosp.2018.00009
A New Verified Compiler Backend for CakeML, Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming, pp.60-73, 2016. ,
DOI : 10.1145/3022670.2951924
URL : http://kar.kent.ac.uk/55687/7/paper.pdf
Undefined Behavior: What Happened to My Code, Proceedings of the Third ACM SIGOPS Asia-Pacific Conference on Systems (APSys '12). USENIX Association, pp.9-9, 2012. ,
DOI : 10.1145/2349896.2349905
URL : http://dspace.mit.edu/bitstream/1721.1/86949/1/Kaashoek_Undefined%20behavior.pdf
Finding and Understanding, Bugs in C Compilers. SIGPLAN Not, vol.46, issue.6, pp.283-294, 2011. ,
Dead Store Elimination (Still) Considered Harmful, Proceedings of the 26th USENIX Conference on Security Symposium (SEC'17). USENIX Association, pp.1025-1040, 2017. ,