FR

EN

Homepage Inria website
  • Inria login
  • The Inria's Research Teams produce an annual Activity Report presenting their activities and their results of the year. These reports include the team members, the scientific program, the software developed by the team and the new results of the year. The report also describes the grants, contracts and the activities of dissemination and teaching. Finally, the report gives the list of publications of the year.

  • Legal notice
  • Cookie management
  • Personal data
  • Cookies


Bibliography

Major publications by the team in recent years
  • 1N. Bielova, T. Rezk.

    A Taxonomy of Information Flow Monitors, in: International Conference on Principles of Security and Trust (POST 2016), Eindhoven, Netherlands, F. Piessens, L. Viganò (editors), LNCS - Lecture Notes in Computer Science, Springer, April 2016, vol. 9635, pp. 46–67. [ DOI : 10.1007/978-3-662-49635-0_3 ]

    https://hal.inria.fr/hal-01348188
  • 2G. Boudol, I. Castellani.

    Noninterference for Concurrent Programs and Thread Systems, in: Theoretical Computer Science, 2002, vol. 281, no 1, pp. 109-130.
  • 3G. Boudol, Z. Luo, T. Rezk, M. Serrano.

    Reasoning about Web Applications: An Operational Semantics for HOP, in: ACM Transactions on Programming Languages and Systems (TOPLAS), 2012, vol. 34, no 2.
  • 4S. Capecchi, I. Castellani, M. Dezani-Ciancaglini.

    Information Flow Safety in Multiparty Sessions, in: Mathematical Structures in Computer Science, 2015, vol. 26, no 8, 43 p. [ DOI : 10.1017/S0960129514000619 ]

    https://hal.inria.fr/hal-01237236
  • 5I. Castellani, M. Dezani-Ciancaglini, P. Giannini.

    Concurrent Reversible Sessions, in: CONCUR 2017 - 28th International Conference on Concurrency Theory , Berlin, Germany, CONCUR 2017, Roland Meyer and Uwe Nestmann, September 2017, vol. 85, pp. 1-17. [ DOI : 10.4230/LIPIcs.CONCUR.2017.30 ]

    https://hal.inria.fr/hal-01639845
  • 6C. Fournet, T. Rezk.

    Cryptographically sound implementations for typed information-flow security, in: Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, 2008, pp. 323-335.
  • 7M. Ngo, F. Piessens, T. Rezk.

    Impossibility of Precise and Sound Termination-Sensitive Security Enforcements, in: SP 2018 - IEEE Symposium on Security and Privacy, San Francisco, United States, IEEE, May 2018, pp. 496-513. [ DOI : 10.1109/SP.2018.00048 ]

    https://hal.inria.fr/hal-01928669
  • 8M. Serrano, G. Berry.

    Multitier Programming in Hop - A first step toward programming 21st-century applications, in: Communications of the ACM, August 2012, vol. 55, no 8, pp. 53–59. [ DOI : 10.1145/2240236.2240253 ]

    http://cacm.acm.org/magazines/2012/8/153796-multitier-programming-in-hop/abstract
  • 9M. Serrano, V. Prunet.

    A Glimpse of Hopjs, in: 21th ACM Sigplan Int'l Conference on Functional Programming (ICFP), Nara, Japan, September 2016, pp. 188–200.

    http://dx.doi.org/10.1145/2951913.2951916
  • 10D. F. Somé, N. Bielova, T. Rezk.

    On the Content Security Policy Violations due to the Same-Origin Policy, in: 26th International World Wide Web Conference, 2017 (WWW 2017), April 2017. [ DOI : 10.1145/3038912.3052634 ]

    https://hal.inria.fr/hal-01649526
Publications of the year

Doctoral Dissertations and Habilitation Theses

International Conferences with Proceedings

  • 14G. G. Gulyás, D. F. Somé, N. Bielova, C. Castelluccia.

    To Extend or not to Extend: On the Uniqueness of Browser Extensions and Web Logins, in: WPES'18 - Workshop on Privacy in the Electronic Society, Toronto, Canada, ACM Press, October 2018, pp. 14-27. [ DOI : 10.1145/3267323.3268959 ]

    https://hal.inria.fr/hal-01921863
  • 15M. Ngo, N. Bielova, C. Flanagan, T. Rezk, A. Russo, T. Schmitz.

    A Better Facet of Dynamic Information Flow Control, in: WWW '18 Companion: The 2018 Web Conference Companion, Lyon, France, April 2018, pp. 1-9.

    https://hal.inria.fr/hal-01723723
  • 16M. Ngo, F. Piessens, T. Rezk.

    Impossibility of Precise and Sound Termination-Sensitive Security Enforcements, in: SP 2018 - IEEE Symposium on Security and Privacy, San Francisco, United States, IEEE, May 2018, pp. 496-513. [ DOI : 10.1109/SP.2018.00048 ]

    https://hal.inria.fr/hal-01928669
  • 17M. Serrano.

    JavaScript AOT compilation, in: the 14th ACM SIGPLAN International Symposium on Dynamic Languages, Boston, France, Proceeding of the 14th ACM SIGPLAN International Symposium on Dynamic Languages, ACM Press, November 2018. [ DOI : 10.1145/3276945.3276950 ]

    https://hal.archives-ouvertes.fr/hal-01937197
  • 18C. Vidal, G. Berry, M. Serrano.

    Hiphop.js: a language to orchestrate web applications, in: SAC: Symposium on Applied Computing, Pau, France, April 2018, vol. Proceedings of the 2018 Symposium on Applied Computing. [ DOI : 10.1145/3167132.3167440 ]

    https://hal.archives-ouvertes.fr/hal-01937252

Other Publications

  • 19I. Fouad, N. Bielova, A. Legout, N. Sarafijanovic-Djukic.

    Tracking the Pixels: Detecting Web Trackers via Analyzing Invisible Pixels, December 2018, working paper or preprint.

    https://hal.inria.fr/hal-01943496
References in notes