Author of the publication

Cryptographically sound implementations for typed information-flow security.

, and . POPL, page 323-335. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Type Abstraction for Relaxed Noninterference., , , and . ECOOP, volume 74 of LIPIcs, page 7:1-7:27. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Comparing the Detection of XSS Vulnerabilities in Node.js and a Multi-tier JavaScript-based Language via Deep Learning., , and . ICISSP, page 189-201. SCITEPRESS, (2022)Spot the Difference: Secure Multi-execution and Multiple Facets., and . ESORICS (1), volume 9878 of Lecture Notes in Computer Science, page 501-519. Springer, (2016)High-Assurance Cryptography in the Spectre Era., , , , , , , , and . SP, page 1884-1901. IEEE, (2021)Clockwork: Tracking Remote Timing Attacks., , , and . CSF, page 350-365. IEEE, (2020)Security Types Preserving Compilation: (Extended Abstract)., , and . VMCAI, volume 2937 of Lecture Notes in Computer Science, page 2-15. Springer, (2004)Certificate Translation for Optimizing Compilers., , , and . SAS, volume 4134 of Lecture Notes in Computer Science, page 301-317. Springer, (2006)Impossibility of Precise and Sound Termination-Sensitive Security Enforcements., , and . IEEE Symposium on Security and Privacy, page 496-513. IEEE Computer Society, (2018)A Certified Lightweight Non-interference Java Bytecode Verifier., , and . ESOP, volume 4421 of Lecture Notes in Computer Science, page 125-140. Springer, (2007)Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure., , and . CoRR, (2022)