Team, Visitors, External Collaborators
Overall Objectives
Research Program
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
[1]
N. Bielova, T. Rezk.
A Taxonomy of Information Flow Monitors, in: International Conference on Principles of Security and Trust (POST 2016), Eindhoven, Netherlands, F. Piessens, L. Viganò (editors), LNCS - Lecture Notes in Computer Science, Springer, April 2016, vol. 9635, pp. 46–67. [ DOI : 10.1007/978-3-662-49635-0_3 ]
https://hal.inria.fr/hal-01348188
[2]
G. Boudol, I. Castellani.
Noninterference for Concurrent Programs and Thread Systems, in: Theoretical Computer Science, 2002, vol. 281, no 1, pp. 109-130.
[3]
G. Boudol, Z. Luo, T. Rezk, M. Serrano.
Reasoning about Web Applications: An Operational Semantics for HOP, in: ACM Transactions on Programming Languages and Systems (TOPLAS), 2012, vol. 34, no 2.
[4]
S. Capecchi, I. Castellani, M. Dezani-Ciancaglini.
Information Flow Safety in Multiparty Sessions, in: Mathematical Structures in Computer Science, 2015, vol. 26, no 8, 43 p. [ DOI : 10.1017/S0960129514000619 ]
https://hal.inria.fr/hal-01237236
[5]
I. Castellani, M. Dezani-Ciancaglini, P. Giannini.
Concurrent Reversible Sessions, in: CONCUR 2017 - 28th International Conference on Concurrency Theory , Berlin, Germany, CONCUR 2017, Roland Meyer and Uwe Nestmann, September 2017, vol. 85, pp. 1-17. [ DOI : 10.4230/LIPIcs.CONCUR.2017.30 ]
https://hal.inria.fr/hal-01639845
[6]
C. Fournet, T. Rezk.
Cryptographically sound implementations for typed information-flow security, in: Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, 2008, pp. 323-335.
[7]
M. Ngo, F. Piessens, T. Rezk.
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements, in: SP 2018 - IEEE Symposium on Security and Privacy, San Francisco, United States, IEEE, May 2018, pp. 496-513. [ DOI : 10.1109/SP.2018.00048 ]
https://hal.inria.fr/hal-01928669
[8]
M. Serrano, G. Berry.
Multitier Programming in Hop - A first step toward programming 21st-century applications, in: Communications of the ACM, August 2012, vol. 55, no 8, pp. 53–59. [ DOI : 10.1145/2240236.2240253 ]
http://cacm.acm.org/magazines/2012/8/153796-multitier-programming-in-hop/abstract
[9]
M. Serrano, V. Prunet.
A Glimpse of Hopjs, in: 21th ACM Sigplan Int'l Conference on Functional Programming (ICFP), Nara, Japan, September 2016, pp. 188–200.
http://dx.doi.org/10.1145/2951913.2951916
[10]
D. F. Somé, N. Bielova, T. Rezk.
On the Content Security Policy Violations due to the Same-Origin Policy, in: 26th International World Wide Web Conference, 2017 (WWW 2017), April 2017. [ DOI : 10.1145/3038912.3052634 ]
https://hal.inria.fr/hal-01649526
Publications of the year

Doctoral Dissertations and Habilitation Theses

[11]
T. Rezk.
Secure Programming, Université de Nice - Sophia Antipolis, April 2018, Habilitation à diriger des recherches.
https://hal.inria.fr/tel-01941697
[12]
D. F. Somé.
Web applications Security and Privacy, Université Côte D'Azur, October 2018.
https://hal.inria.fr/tel-01925851
[13]
C. Vidal.
Reactive Web Programming, Université Côte d'Azur, July 2018.
https://tel.archives-ouvertes.fr/tel-01900619

International Conferences with Proceedings

[14]
G. G. Gulyás, D. F. Somé, N. Bielova, C. Castelluccia.
To Extend or not to Extend: On the Uniqueness of Browser Extensions and Web Logins, in: WPES'18 - Workshop on Privacy in the Electronic Society, Toronto, Canada, ACM Press, October 2018, pp. 14-27. [ DOI : 10.1145/3267323.3268959 ]
https://hal.inria.fr/hal-01921863
[15]
M. Ngo, N. Bielova, C. Flanagan, T. Rezk, A. Russo, T. Schmitz.
A Better Facet of Dynamic Information Flow Control, in: WWW '18 Companion: The 2018 Web Conference Companion, Lyon, France, April 2018, pp. 1-9.
https://hal.inria.fr/hal-01723723
[16]
M. Ngo, F. Piessens, T. Rezk.
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements, in: SP 2018 - IEEE Symposium on Security and Privacy, San Francisco, United States, IEEE, May 2018, pp. 496-513. [ DOI : 10.1109/SP.2018.00048 ]
https://hal.inria.fr/hal-01928669
[17]
M. Serrano.
JavaScript AOT compilation, in: the 14th ACM SIGPLAN International Symposium on Dynamic Languages, Boston, France, Proceeding of the 14th ACM SIGPLAN International Symposium on Dynamic Languages, ACM Press, November 2018. [ DOI : 10.1145/3276945.3276950 ]
https://hal.archives-ouvertes.fr/hal-01937197
[18]
C. Vidal, G. Berry, M. Serrano.
Hiphop.js: a language to orchestrate web applications, in: SAC: Symposium on Applied Computing, Pau, France, April 2018, vol. Proceedings of the 2018 Symposium on Applied Computing. [ DOI : 10.1145/3167132.3167440 ]
https://hal.archives-ouvertes.fr/hal-01937252

Other Publications

[19]
I. Fouad, N. Bielova, A. Legout, N. Sarafijanovic-Djukic.
Tracking the Pixels: Detecting Web Trackers via Analyzing Invisible Pixels, December 2018, working paper or preprint.
https://hal.inria.fr/hal-01943496
References in notes
[20]
Adblock Plus Official website, 2018, https://adblockplus.org/.
[21]
Disconnect Official website, 2018, https://disconnect.me/.
[22]
Disconnect List, 2018, https://disconnect.me/trackerprotection/blocked.
[23]
EasyList filter lists, 2018, https://easylist.to/.
[24]
EasyPrivacy filter lists, 2018, https://easylist.to/easylist/easyprivacy.txt.
[25]
The new Firefox Fast for good, 2018, https://www.mozilla.org/en-US/firefox/new/.
[26]
Ghostery Official website, 2018, https://www.ghostery.com/.
[27]
Privacy Badger Official website - Electronic Frontier Foundation, 2018, https://www.eff.org/privacybadger.
[28]
uBlock Origin - An efficient blocker for Chromium and Firefox. Fast and lean, 2018, https://github.com/gorhill/uBlock.
[29]
I. Castellani, M. Dezani-Ciancaglini, P. Giannini.
Concurrent Reversible Sessions, in: CONCUR 2017 - 28th International Conference on Concurrency Theory , Berlin, Germany, CONCUR 2017, Roland Meyer and Uwe Nestmann, September 2017, vol. 85, pp. 1-17. [ DOI : 10.4230/LIPIcs.CONCUR.2017.30 ]
https://hal.inria.fr/hal-01639845
[30]
G. G. Gulyás, G. Acs, C. Castelluccia.
Near-Optimal Fingerprinting with Constraints, in: Proceedings on Privacy Enhancing Technologies, 2016, vol. 2016, no 4, pp. 470–487.