Andrei Sabelfeld

According to our database1, Andrei Sabelfeld authored at least 94 papers between 1997 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
On the Road with Third-party Apps: Security Analysis of an In-vehicle App Platform.
Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems, 2019

Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Assuring BetterTimes.
Journal of Computer Security, 2018

Tracking Information Flow via Delayed Output - Addressing Privacy in IoT and Emailing Apps.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

Information Flow Tracking for Side-Effectful Libraries.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2018

Prudent Design Principles for Information Flow Control.
Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, 2018

If This Then What?: Controlling Flows in IoT Apps.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Raising the Bar: Evaluating Origin-wide Security Manifests.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Special issue on verified information flow security.
Journal of Computer Security, 2017

Measuring login webpage security.
Proceedings of the Symposium on Applied Computing, 2017

A Principled Approach to Tracking Information Flow in the Presence of Libraries.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017

Privacy-Preserving Location-Proximity for Mobile Apps.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

We Are Family: Relating Information-Flow Trackers.
Proceedings of the Computer Security - ESORICS 2017, 2017

PrivatePool: Privacy-Preserving Ridesharing.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

Discovering Browser Extensions via Web Accessible Resources.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

2016
Information-flow security for JavaScript and its APIs.
Journal of Computer Security, 2016

JavaScript Sandboxing: Isolating and Restricting Client-Side JavaScript.
Proceedings of the Foundations of Security Analysis and Design VIII, 2016

Explicit Secrecy: A Policy for Taint Tracking.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Progress-Sensitive Security for SPARK.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

Let's Face It: Faceted Values for Taint Tracking.
Proceedings of the Computer Security - ESORICS 2016, 2016

JSLINQ: Building Secure Applications across Tiers.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

MaxPace: Speed-constrained location queries.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Data Exfiltration in the Face of CSP.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Location-enhanced authentication using the IoT: because you cannot be in two places at once.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Web Application Security Using JSFlow.
Proceedings of the 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2015

InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

BetterTimes - Privacy-Assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields.
Proceedings of the Provable Security, 2015

Value Sensitivity and Observable Abstract Values for Information Flow Control.
Proceedings of the Logic for Programming, Artificial Intelligence, and Reasoning, 2015

May I? - Content Security Policy Endorsement for Browser Extensions.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

Understanding and Enforcing Opacity.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Value-Sensitive Hybrid Information Flow Control for a JavaScript-Like Language.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Preface.
Journal of Computer Security, 2014

JSFlow: tracking information flow in JavaScript and its APIs.
Proceedings of the Symposium on Applied Computing, 2014

SeLINQ: tracking information across application-database boundaries.
Proceedings of the 19th ACM SIGPLAN international conference on Functional programming, 2014

Architectures for Inlining Security Monitors in Web Applications.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

Compositional Information-Flow Security for Interactive Systems.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2013
Securing Class Initialization in Java-like Languages.
IEEE Trans. Dependable Sec. Comput., 2013

GlassTube: a lightweight approach to web application integrity.
Proceedings of the 2013 ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, 2013

Secure Multi-execution: Fine-Grained, Declassification-Aware, and Transparent.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

Polyglots: crossing origins by crossing formats.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
A Perspective on Information-Flow Control.
Proceedings of the Software Safety and Security - Tools for Analysis and Verification, 2012

Web Application Security (Dagstuhl Seminar 12401).
Dagstuhl Reports, 2012

Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing.
Proceedings of the Computer Security - ESORICS 2012, 2012

Securing Interactive Programs.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

Information-Flow Security for a Core of JavaScript.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

2011
Limiting information leakage in event-based communication.
Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, 2011

Capabilities for information flow.
Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, 2011

Multi-run Security.
Proceedings of the Computer Security - ESORICS 2011, 2011

Decentralized Delimited Release.
Proceedings of the Programming Languages and Systems - 9th Asian Symposium, 2011

2010
Implicit flows in malicious and nonmalicious code.
Proceedings of the Logics and Languages for Reliability and Security, 2010

Preface.
Journal of Computer Security, 2010

On-the-fly Inlining of Dynamic Security Monitors.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Securing Class Initialization.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

Unifying Facets of Information Integrity.
Proceedings of the Information Systems Security - 6th International Conference, 2010

Dynamic vs. Static Flow-Sensitive Security Analysis.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

A lattice-based approach to mashup security.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Securing interaction between threads and the scheduler in the presence of synchronization.
J. Log. Algebr. Program., 2009

Declassification: Dimensions and principles.
Journal of Computer Security, 2009

Catch me if you can: permissive yet secure error handling.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009

Tracking Information Flow in Dynamic Tree Structures.
Proceedings of the Computer Security, 2009

From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research.
Proceedings of the Perspectives of Systems Informatics, 2009

Securing Timeout Instructions in Web Applications.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

Tight Enforcement of Information-Release Policies for Dynamic Languages.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

2008
Preface.
Journal of Computer Security, 2008

Termination-Insensitive Noninterference Leaks More Than Just a Bit.
Proceedings of the Computer Security, 2008

2007
Gradual Release: Unifying Declassification, Encryption and Key Release Policies.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Localized delimited release: combining the what and where dimensions of information release.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007

Security of Multithreaded Programs by Compilation.
Proceedings of the Computer Security, 2007

07091 Abstracts Collection - Mobility, Ubiquity and Security.
Proceedings of the Mobility, Ubiquity and Security, 25.02. - 02.03.2007, 2007

07091 Executive Summary - Mobility, Ubiquity and Security.
Proceedings of the Mobility, Ubiquity and Security, 25.02. - 02.03.2007, 2007

Dimensions of Declassification in Theory and Practice.
Proceedings of the Advances in Computer Science, 2007

2006
Enforcing Robust Declassification and Qualified Robustness.
Journal of Computer Security, 2006

Cryptographically-Masked Flows.
Proceedings of the Static Analysis, 13th International Symposium, 2006

Security for Multithreaded Programs Under Cooperative Scheduling.
Proceedings of the Perspectives of Systems Informatics, 2006

Securing Interaction between Threads and the Scheduler.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

Closing Internal Timing Channels by Transformation.
Proceedings of the Advances in Computer Science, 2006

2005
"Language-Based Security".
J. Funct. Program., 2005

Bridging Language-Based and Process Calculi Security.
Proceedings of the Foundations of Software Science and Computational Structures, 2005

Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study.
Proceedings of the Computer Security, 2005

Dimensions and Principles of Declassification.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

2004
Enforcing Robust Declassification.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

2003
Language-based information-flow security.
IEEE Journal on Selected Areas in Communications, 2003

A Unifying Approach to the Security of Distributed and Multi-Threaded Programs.
Journal of Computer Security, 2003

A Model for Delimited Information Release.
Proceedings of the Software Security, 2003

Confidentiality for Multithreaded Programs via Bisimulation.
Proceedings of the Perspectives of Systems Informatics, 2003

03411 Abstracts Collection - Language Based Security.
Proceedings of the Language-Based Security, 5.-10. October 2003, 2003

03411 Final Report - Language Based Security.
Proceedings of the Language-Based Security, 5.-10. October 2003, 2003

2002
Securing Communication in a Concurrent Language.
Proceedings of the Static Analysis, 9th International Symposium, 2002

2001
The Impact of Synchronisation on Secure Information Flow in Concurrent Programs.
Proceedings of the Perspectives of System Informatics, 2001

A Generic Approach to the Security of Multi-Threaded Programs.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

2000
Probabilistic Noninterference for Multi-Threaded Programs.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

1999
A Per Model of Secure Information Flow in Sequential Programs.
Proceedings of the Programming Languages and Systems, 1999

1997
Simple Semantic Analysis Problems for Functional Programs.
Proceedings of the 1997 ACM SIGPLAN International Conference on Functional Programming (ICFP '97), 1997


  Loading...