Author of the publication

From Fine- to Coarse-Grained Dynamic Information Flow Control and Back, a Tutorial on Dynamic Information Flow.

, , , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constant-time foundations for the new spectre era., , , , , , and . PLDI, page 913-926. ACM, (2020)Information-Flow Control for Programming on Encrypted Data., , , and . CSF, page 45-60. IEEE Computer Society, (2012)A hardware framework for the fast generation of multiple long-period random number streams., and . FPGA, page 245-254. ACM, (2008)On Parallelizing the CryptMT Stream Cipher., , , and . VTC Spring, page 1082-1086. IEEE, (2008)STORM: Refinement Types for Secure Web Applications., , , , , , , and . OSDI, page 441-459. USENIX Association, (2021)MSWasm: Soundly Enforcing Memory-Safe Execution of Unsafe Code., , , , , , , , , and . CoRR, (2022)User-Assisted Host-Based Detection of Outbound Malware Traffic., , , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 293-307. Springer, (2009)Half&Half: Demystifying Intel's Directional Branch Predictors for Fast, Secure Partitioned Execution., , , , and . SP, page 1220-1237. IEEE, (2023)WaVe: a verifiably secure WebAssembly sandboxing runtime., , , , , , , and . SP, page 2940-2955. IEEE, (2023)Finding and Preventing Bugs in JavaScript Bindings., , , , , and . IEEE Symposium on Security and Privacy, page 559-578. IEEE Computer Society, (2017)