Alejandro Russo

Orcid: 0000-0002-4338-6316

Affiliations:
  • Chalmers University of Technology, Gothenburg, Sweden


According to our database1, Alejandro Russo authored at least 70 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards a GDPR-compliant cloud architecture with data privacy controlled through sticky policies.
PeerJ Comput. Sci., 2024

HasTEE+ : Confidential Cloud Computing and Analytics with Haskell.
CoRR, 2024

2023
MUTAGEN: Reliable Coverage-Guided, Property-Based Testing using Exhaustive Mutations.
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2023

HasTEE: Programming Trusted Execution Environments with Haskell.
Proceedings of the 16th ACM SIGPLAN International Haskell Symposium, 2023

2022
From Fine- to Coarse-Grained Dynamic Information Flow Control and Back, a Tutorial on Dynamic Information Flow.
CoRR, 2022

2021
A Programming Language for Data Privacy with Accuracy Estimations.
ACM Trans. Program. Lang. Syst., 2021

Practical normalization by evaluation for EDSLs.
Proceedings of the Haskell 2021: Proceedings of the 14th ACM SIGPLAN International Symposium on Haskell, 2021

MultiCall: A Transaction-batching Interpreter for Ethereum.
Proceedings of the BSCI '21: Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2021

2020
A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

BinderAnn: Automated Reification of Source Annotations for Monadic EDSLs.
Proceedings of the Trends in Functional Programming - 21st International Symposium, 2020

Hey, my data are mine!: active data to empower the user.
Proceedings of the ICSE-NIER 2020: 42nd International Conference on Software Engineering, New Ideas and Emerging Results, Seoul, South Korea, 27 June, 2020

Towards secure IoT programming in Haskell.
Proceedings of the 13th ACM SIGPLAN International Symposium on Haskell, 2020

Securing Asynchronous Exceptions.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

Short Paper: Blockcheck the Typechain.
Proceedings of the PLAS'20: Proceedings of the 15th Workshop on Programming Languages and Analysis for Security, 2020

2019
From fine- to coarse-grained dynamic information flow control and back.
Proc. ACM Program. Lang., 2019

Exponential Elimination for Bicartesian Closed Categorical Combinators.
Proceedings of the 21st International Symposium on Principles and Practice of Programming Languages, 2019

Deriving compositional random generators.
Proceedings of the IFL '19: Implementation and Application of Functional Languages, 2019

Generating random structurally rich algebraic data type values.
Proceedings of the 14th International Workshop on Automation of Software Test, 2019

Optimising Faceted Secure Multi-Execution.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

2018
A Better Facet of Dynamic Information Flow Control.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Towards Adding Variety to Simplicity.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice, 2018

Branching processes for QuickCheck generators.
Proceedings of the 11th ACM SIGPLAN International Symposium on Haskell, 2018

Faceted Secure Multi Execution.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Flexible dynamic information flow control in the presence of exceptions.
J. Funct. Program., 2017

Hails: Protecting data privacy in untrusted web applications.
J. Comput. Secur., 2017

Securing Concurrent Lazy Programs Against Information Leakage.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

Cryptographically Secure Information Flow Control on Key-Value Stores.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Encoding DCC in Haskell.
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017

2016
Flexible Manipulation of Labeled Values for Information-Flow Control Libraries.
Proceedings of the Computer Security - ESORICS 2016, 2016

Fault-Resilient Non-interference.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

On Formalizing Information-Flow Control Libraries.
Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, 2016

2015
IFC Inside: Retrofitting Languages with Dynamic Information Flow Control (Extended Version).
CoRR, 2015

It's My Privilege: Controlling Downgrading in DC-Labels.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

IFC Inside: Retrofitting Languages with Dynamic Information Flow Control.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

Functional pearl: two can keep a secret, if one of them uses Haskell.
Proceedings of the 20th ACM SIGPLAN International Conference on Functional Programming, 2015

HLIO: mixing static and dynamic typing for information-flow control in Haskell.
Proceedings of the 20th ACM SIGPLAN International Conference on Functional Programming, 2015

The Most Dangerous Code in the Browser.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

2014
Type-Directed Compilation for Fault-Tolerant Non-Interference.
CoRR, 2014

Protecting Users by Confining JavaScript with COWL.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

Building secure systems with LIO (demo).
Proceedings of the 2014 ACM SIGPLAN symposium on Haskell, 2014

Fault-Tolerant Non-interference.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

On Dynamic Flow-Sensitive Floating-Label Systems.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2013
A Library for Removing Cache-Based Attacks in Concurrent Information Flow Systems.
Proceedings of the Trustworthy Global Computing - 8th International Symposium, 2013

Lazy Programs Leak Secrets.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling.
Proceedings of the Computer Security - ESORICS 2013, 2013

Precise Enforcement of Confidentiality for Reactive Systems.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

2012
On-the-fly inlining of dynamic security monitors.
Comput. Secur., 2012

Towards a taint mode for cloud computing web applications.
Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, 2012

Addressing covert termination and timing channels in concurrent information flow systems.
Proceedings of the ACM SIGPLAN International Conference on Functional Programming, 2012

2011
Capabilities for information flow.
Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, 2011

Disjunction Category Labels.
Proceedings of the Information Security Technology for Applications, 2011

Testing an optimising compiler by generating random lambda terms.
Proceedings of the 6th International Workshop on Automation of Software Test, 2011

Flexible dynamic information flow control in Haskell.
Proceedings of the 4th ACM SIGPLAN Symposium on Haskell, 2011

Secure Multi-execution in Haskell.
Proceedings of the Perspectives of Systems Informatics, 2011

2010
Implicit flows in malicious and nonmalicious code.
Proceedings of the Logics and Languages for Reliability and Security, 2010

Security of multithreaded programs by compilation.
ACM Trans. Inf. Syst. Secur., 2010

Implementing Erasure Policies Using Taint Analysis.
Proceedings of the Information Security Technology for Applications, 2010

A Taint Mode for Python via a Library.
Proceedings of the Information Security Technology for Applications, 2010

Unifying Facets of Information Integrity.
Proceedings of the Information Systems Security - 6th International Conference, 2010

Dynamic vs. Static Flow-Sensitive Security Analysis.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

2009
Securing interaction between threads and the scheduler in the presence of synchronization.
J. Log. Algebraic Methods Program., 2009

Tracking Information Flow in Dynamic Tree Structures.
Proceedings of the Computer Security, 2009

From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research.
Proceedings of the Perspectives of Systems Informatics, 2009

Securing Timeout Instructions in Web Applications.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

2008
Language Support for Controlling Timing-Based Covert Channels.
PhD thesis, 2008

A library for light-weight information-flow security in haskell.
Proceedings of the 1st ACM SIGPLAN Symposium on Haskell, 2008

2007
A Library for Secure Multi-threaded Information Flow in Haskell.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
Security for Multithreaded Programs Under Cooperative Scheduling.
Proceedings of the Perspectives of Systems Informatics, 2006

Securing Interaction between Threads and the Scheduler.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

Closing Internal Timing Channels by Transformation.
Proceedings of the Advances in Computer Science, 2006


  Loading...