Major publications by the team in recent years
  • 1G. Barthe, T. Rezk, A. Russo, A. Sabelfeld.

    Security of Multithreaded Programs by Compilation, in: ESORICS, 2007, pp. 2-18.
  • 2G. Boudol, I. Castellani.

    Noninterference for Concurrent Programs and Thread Systems, in: Theoretical Computer Science, 2002, vol. 281, no 1, pp. 109-130.
  • 3G. Boudol, Z. Luo, T. Rezk, M. Serrano.

    Reasoning about Web Applications: An Operational Semantics for HOP, in: ACM Transactions on Programming Languages and Systems (TOPLAS), 2012, vol. 34, no 2.
  • 4S. Capecchi, I. Castellani, M. Dezani-Ciancaglini.

    Typing access control and secure information flow in sessions, in: Journal of Information and Computation, 2014, vol. 238, pp. 68 - 105. [ DOI : 10.1016/j.ic.2014.07.005 ]

  • 5S. Capecchi, I. Castellani, M. Dezani-Ciancaglini.

    Information Flow Safety in Multiparty Sessions, in: Mathematical Structures in Computer Science, 2015, vol. 26, no 8, 43 p. [ DOI : 10.1017/S0960129514000619 ]

  • 6C. Fournet, T. Rezk.

    Cryptographically sound implementations for typed information-flow security, in: Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, 2008, pp. 323-335.
  • 7M. Serrano, G. Berry.

    Multitier Programming in Hop - A first step toward programming 21st-century applications, in: Communications of the ACM, August 2012, vol. 55, no 8, pp. 53–59. [ DOI : 10.1145/2240236.2240253 ]

  • 8M. Serrano, E. Gallesio, F. Loitsch.

    HOP, a language for programming the Web 2.0, in: Proceedings of the First Dynamic Languages Symposium, Portland, Oregon, USA, October 2006.
  • 9M. Serrano.

    Bee: an Integrated Development Environment for the Scheme Programming Language, in: Journal of Functional Programming, May 2000, vol. 10, no 2, pp. 1–43.
Publications of the year

Articles in International Peer-Reviewed Journals

  • 10N. Bielova, F. Besson, T. Jensen.

    Using JavaScript Monitoring to Prevent Device Fingerprinting, in: ERCIM News, July 2016.

  • 11I. Castellani, M. Dezani-Ciancaglini, J. A. Perez.

    Self-adaptation and secure information flow in multiparty communications, in: Formal Aspects of Computing, 2016, vol. 28, no 4, 28 p. [ DOI : 10.1007/s00165-016-0381-3 ]

  • 12Z. Luo, J. Fragoso Santos, A. Almeida Matos, T. Rezk.

    Mashic compiler: Mashup sandboxing based on inter-frame communication, in: Journal of Computer Security, 2016. [ DOI : 10.3233/JCS-160542 ]

  • 13S. E. Reppou, E. G. Tsardoulias, A. M. Kintsakis, A. L. Symeonidis, P. A. Mitkas, F. E. Psomopoulos, G. T. Karagiannis, C. Zelienski, V. Prunet, J.-P. Merlet, M. Iturburu, A. Gkiokas.

    RAPP: A Robotic-Oriented Ecosystem for Delivering Smart User Empowering Applications for Older People, in: International Journal of Social Robotics, June 2016. [ DOI : 10.1007/s12369-016-0361-z ]


International Conferences with Proceedings

  • 14F. Besson, N. Bielova, T. Jensen.

    Hybrid Monitoring of Attacker Knowledge, in: 29th IEEE Computer Security Foundations Symposium, Lisboa, Portugal, 2016.

  • 15N. Bielova.

    Dynamic leakage - a need for a new quantitative information flow measure, in: Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, Vienna, Austria, October 2016, pp. 83-88. [ DOI : 10.1145/2993600.2993607 ]

  • 16N. Bielova, T. Rezk.

    A Taxonomy of Information Flow Monitors, in: International Conference on Principles of Security and Trust (POST 2016), Eindhoven, Netherlands, F. Piessens, L. Viganò (editors), LNCS - Lecture Notes in Computer Science, Springer, April 2016, vol. 9635, pp. 46–67. [ DOI : 10.1007/978-3-662-49635-0_3 ]

  • 17N. Bielova, T. Rezk.

    Spot the Difference: Secure Multi-Execution and Multiple Facets, in: European Symposium on Research in Computer Security (ESORICS), Heraklion, Greece, September 2016.

  • 18I. Castellani, M. Dezani-Ciancaglini, U. De'Liguoro.

    Secure Multiparty Sessions with Topics, in: PLACES 2016, Eindhoven, Netherlands, Proceedings of the 9th workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software, PLACES 2016, Eindhoven, The Netherlands, 8th April 2016., Dominic A. Orchard and Nobuko Yoshida, April 2016, vol. 211, 12 p. [ DOI : 10.4204/EPTCS.211.1 ]

  • 19V. Rajani, D. Garg, T. Rezk.

    On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks, in: Computer Security Foundations, Lisbon, Portugal, June 2016. [ DOI : 10.1109/CSF.2016.18 ]

  • 20M. Serrano, V. Prunet.

    A Glimpse of Hopjs, in: International Conference on Functional Programming (ICFP), Nara, Japan, ACM, September 2016, 12 p. [ DOI : 10.1145/2951913.2951916 ]


National Conferences with Proceedings

  • 21B. P. Serpette, D. Janin.

    Causalité dans les calculs d'événements, in: JFLA 2017 - Vingt-huitième Journées Francophones des Langages Applicatifs, Gourette, France, January 2017.


Scientific Books (or Scientific Book chapters)

  • 22M. Serrano.

    The Computer Scientist Nightmare: My Favorite Bug, in: A List of Successes That Can Change the World : Essays Dedicated to Philip Wadler on the Occasion of His 60th Birthday, Lecture Notes on Computer Science, Springer, April 2016, vol. 9600, pp. 356-366.


Books or Proceedings Editing

  • 23M. Serrano, J. Hage (editors)

    Trends in Functional Programming (TFP 2015): Revised Selected Papers, Lecture Notes on Computer Science, Springer Verlag, Sophia Antipolis, France, February 2016, vol. 9547, 156 p. [ DOI : 10.1007/978-3-319-39110-6 ]


Internal Reports