Musard Balliu

Orcid: 0000-0001-6005-5992

According to our database1, Musard Balliu authored at least 36 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Challenges of Producing Software Bill of Materials for Java.
IEEE Secur. Priv., 2023

Disjunctive Policies for Database-Backed Programs.
CoRR, 2023

Unveiling the Invisible: Detection and Evaluation of Prototype Pollution Gadgets with Dynamic Taint Analysis.
CoRR, 2023

Security Properties through the Lens of Modal Logic.
CoRR, 2023

Challenges of Producing Software Bill Of Materials for Java.
CoRR, 2023

Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js.
Proceedings of the 32nd USENIX Security Symposium, 2023

Software Bill of Materials in Java.
Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2023

2022
Dynamic Policies Revisited.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2021
Friendly Fire: Cross-app Interactions in IoT Platforms.
ACM Trans. Priv. Secur., 2021

SandTrap: Securing JavaScript-driven Trigger-Action Platforms.
Proceedings of the 30th USENIX Security Symposium, 2021

Vivienne: Relational Verification of Cryptographic Implementations in WebAssembly.
Proceedings of the IEEE Secure Development Conference, 2021

Enclave-Based Secure Programming with JE.
Proceedings of the IEEE Secure Development Conference, 2021

Security-Aware Multi-User Architecture for IoT.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

SerialDetector: Principled and Practical Exploration of Object Injection Vulnerabilities for the Web.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Language Support for Secure Software Development with Enclaves.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

Securing Node-RED Applications.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
Clockwork: Tracking Remote Timing Attacks.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Securing IoT Apps.
IEEE Secur. Priv., 2019

Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis.
Proceedings of the IEEE International Conference on Software Architecture, 2019

Information-Flow Control for Database-Backed Applications.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Securing Cross-App Interactions in IoT Platforms.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

An Empirical Study of Information Flows in Real-World JavaScript.
Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and Analysis for Security, 2019

2018
If This Then What?: Controlling Flows in IoT Apps.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Formalising privacy policies in social networks.
J. Log. Algebraic Methods Program., 2017

We Are Family: Relating Information-Flow Trackers.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Explicit Secrecy: A Policy for Taint Tracking.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Let's Face It: Faceted Values for Taint Tracking.
Proceedings of the Computer Security - ESORICS 2016, 2016

JSLINQ: Building Secure Applications across Tiers.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2014
Logics for Information Flow Security:From Specification to Verification.
PhD thesis, 2014

Automating Information Flow Analysis of Low Level Code.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
A Logic for Information Flow Analysis of Distributed Programs.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

2012
ENCoVer: Symbolic Exploration for Information Flow Security.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

2011
Epistemic temporal logic for information flow security.
Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, 2011

2010
A Weakest Precondition Approach to Robustness.
Trans. Comput. Sci., 2010

2009
A weakest precondition approach to active attacks analysis.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009


  Loading...