Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Merlin: specification inference for explicit information flow problems., , , and . PLDI, page 75-86. ACM, (2009)ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser., and . IEEE Symposium on Security and Privacy, page 481-496. IEEE Computer Society, (2010)Ripley: automatically securing web 2.0 applications through replicated execution., , and . ACM Conference on Computer and Communications Security, page 173-186. ACM, (2009)Spectator: Detection and Containment of JavaScript Worms., and . USENIX Annual Technical Conference, page 335-348. USENIX Association, (2008)Securing web applications with static and dynamic information flow tracking., , , and . PEPM, page 3-12. ACM, (2008)Reflection Analysis for Java., , and . APLAS, volume 3780 of Lecture Notes in Computer Science, page 139-160. Springer, (2005)Using web application construction frameworks to protect against code injection attacks., and . PLAS, page 95-104. ACM, (2007)FLUXO: A Simple Service Compiler., , and . HotOS, USENIX Association, (2009)NOZZLE: A Defense Against Heap-spraying Code Injection Attacks., , and . USENIX Security Symposium, page 169-186. USENIX Association, (2009)GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code., and . USENIX Security Symposium, page 151-168. USENIX Association, (2009)