Bibliography
Major publications by the team in recent years
-
1N. Bielova, T. Rezk.
A Taxonomy of Information Flow Monitors, in: International Conference on Principles of Security and Trust (POST 2016), Eindhoven, Netherlands, F. Piessens, L. Viganò (editors), LNCS - Lecture Notes in Computer Science, Springer, April 2016, vol. 9635, pp. 46–67. [ DOI : 10.1007/978-3-662-49635-0_3 ]
https://hal.inria.fr/hal-01348188 -
2G. Boudol, I. Castellani.
Noninterference for Concurrent Programs and Thread Systems, in: Theoretical Computer Science, 2002, vol. 281, no 1, pp. 109-130. -
3G. Boudol, Z. Luo, T. Rezk, M. Serrano.
Reasoning about Web Applications: An Operational Semantics for HOP, in: ACM Transactions on Programming Languages and Systems (TOPLAS), 2012, vol. 34, no 2. -
4S. Capecchi, I. Castellani, M. Dezani-Ciancaglini.
Information Flow Safety in Multiparty Sessions, in: Mathematical Structures in Computer Science, 2015, vol. 26, no 8, 43 p. [ DOI : 10.1017/S0960129514000619 ]
https://hal.inria.fr/hal-01237236 -
5I. Castellani, M. Dezani-Ciancaglini, P. Giannini.
Concurrent Reversible Sessions, in: CONCUR 2017 - 28th International Conference on Concurrency Theory , Berlin, Germany, CONCUR 2017, Roland Meyer and Uwe Nestmann, September 2017, vol. 85, pp. 1-17. [ DOI : 10.4230/LIPIcs.CONCUR.2017.30 ]
https://hal.inria.fr/hal-01639845 -
6C. Fournet, T. Rezk.
Cryptographically sound implementations for typed information-flow security, in: Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, 2008, pp. 323-335. -
7M. Ngo, F. Piessens, T. Rezk.
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements, in: SP 2018 - IEEE Symposium on Security and Privacy, San Francisco, United States, IEEE, May 2018, pp. 496-513. [ DOI : 10.1109/SP.2018.00048 ]
https://hal.inria.fr/hal-01928669 -
8M. Serrano, G. Berry.
Multitier Programming in Hop - A first step toward programming 21st-century applications, in: Communications of the ACM, August 2012, vol. 55, no 8, pp. 53–59. [ DOI : 10.1145/2240236.2240253 ]
http://cacm.acm.org/magazines/2012/8/153796-multitier-programming-in-hop/abstract -
9M. Serrano, V. Prunet.
A Glimpse of Hopjs, in: 21th ACM Sigplan Int'l Conference on Functional Programming (ICFP), Nara, Japan, September 2016, pp. 188–200.
http://dx.doi.org/10.1145/2951913.2951916 -
10D. F. Somé, N. Bielova, T. Rezk.
On the Content Security Policy Violations due to the Same-Origin Policy, in: 26th International World Wide Web Conference, 2017 (WWW 2017), April 2017. [ DOI : 10.1145/3038912.3052634 ]
https://hal.inria.fr/hal-01649526
Doctoral Dissertations and Habilitation Theses
-
11T. Rezk.
Secure Programming, Université de Nice - Sophia Antipolis, April 2018, Habilitation à diriger des recherches.
https://hal.inria.fr/tel-01941697 -
12D. F. Somé.
Web applications Security and Privacy, Université Côte D'Azur, October 2018.
https://hal.inria.fr/tel-01925851 -
13C. Vidal.
Reactive Web Programming, Université Côte d'Azur, July 2018.
https://tel.archives-ouvertes.fr/tel-01900619
International Conferences with Proceedings
-
14G. G. Gulyás, D. F. Somé, N. Bielova, C. Castelluccia.
To Extend or not to Extend: On the Uniqueness of Browser Extensions and Web Logins, in: WPES'18 - Workshop on Privacy in the Electronic Society, Toronto, Canada, ACM Press, October 2018, pp. 14-27. [ DOI : 10.1145/3267323.3268959 ]
https://hal.inria.fr/hal-01921863 -
15M. Ngo, N. Bielova, C. Flanagan, T. Rezk, A. Russo, T. Schmitz.
A Better Facet of Dynamic Information Flow Control, in: WWW '18 Companion: The 2018 Web Conference Companion, Lyon, France, April 2018, pp. 1-9.
https://hal.inria.fr/hal-01723723 -
16M. Ngo, F. Piessens, T. Rezk.
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements, in: SP 2018 - IEEE Symposium on Security and Privacy, San Francisco, United States, IEEE, May 2018, pp. 496-513. [ DOI : 10.1109/SP.2018.00048 ]
https://hal.inria.fr/hal-01928669 -
17M. Serrano.
JavaScript AOT compilation, in: the 14th ACM SIGPLAN International Symposium on Dynamic Languages, Boston, France, Proceeding of the 14th ACM SIGPLAN International Symposium on Dynamic Languages, ACM Press, November 2018. [ DOI : 10.1145/3276945.3276950 ]
https://hal.archives-ouvertes.fr/hal-01937197 -
18C. Vidal, G. Berry, M. Serrano.
Hiphop.js: a language to orchestrate web applications, in: SAC: Symposium on Applied Computing, Pau, France, April 2018, vol. Proceedings of the 2018 Symposium on Applied Computing. [ DOI : 10.1145/3167132.3167440 ]
https://hal.archives-ouvertes.fr/hal-01937252
Other Publications
-
19I. Fouad, N. Bielova, A. Legout, N. Sarafijanovic-Djukic.
Tracking the Pixels: Detecting Web Trackers via Analyzing Invisible Pixels, December 2018, working paper or preprint.
https://hal.inria.fr/hal-01943496
- 20Adblock Plus Official website, 2018, https://adblockplus.org/.
- 21Disconnect Official website, 2018, https://disconnect.me/.
- 22Disconnect List, 2018, https://disconnect.me/trackerprotection/blocked.
- 23EasyList filter lists, 2018, https://easylist.to/.
- 24EasyPrivacy filter lists, 2018, https://easylist.to/easylist/easyprivacy.txt.
- 25The new Firefox Fast for good, 2018, https://www.mozilla.org/en-US/firefox/new/.
- 26Ghostery Official website, 2018, https://www.ghostery.com/.
- 27Privacy Badger Official website - Electronic Frontier Foundation, 2018, https://www.eff.org/privacybadger.
- 28uBlock Origin - An efficient blocker for Chromium and Firefox. Fast and lean, 2018, https://github.com/gorhill/uBlock.
-
29I. Castellani, M. Dezani-Ciancaglini, P. Giannini.
Concurrent Reversible Sessions, in: CONCUR 2017 - 28th International Conference on Concurrency Theory , Berlin, Germany, CONCUR 2017, Roland Meyer and Uwe Nestmann, September 2017, vol. 85, pp. 1-17. [ DOI : 10.4230/LIPIcs.CONCUR.2017.30 ]
https://hal.inria.fr/hal-01639845 -
30G. G. Gulyás, G. Acs, C. Castelluccia.
Near-Optimal Fingerprinting with Constraints, in: Proceedings on Privacy Enhancing Technologies, 2016, vol. 2016, no 4, pp. 470–487.