JSFlow: Tracking information flow in JavaScript and its APIs D Hedin, A Birgisson, L Bello, A Sabelfeld Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1663-1671, 2014 | 239 | 2014 |
Information-flow security for a core of JavaScript D Hedin, A Sabelfeld 2012 IEEE 25th Computer Security Foundations Symposium, 3-18, 2012 | 220 | 2012 |
A perspective on information-flow control D Hedin, A Sabelfeld Software safety and security, 319-347, 2012 | 174 | 2012 |
Timing aware information flow security for a javacard-like bytecode D Hedin, D Sands Electronic Notes in Theoretical Computer Science 141 (1), 163-182, 2005 | 77 | 2005 |
A machine-checked formalization of sigma-protocols G Barthe, D Hedin, SZ Béguelin, B Grégoire, S Heraud 2010 23rd IEEE Computer Security Foundations Symposium, 246-260, 2010 | 50 | 2010 |
SeLINQ: tracking information across application-database boundaries D Schoepe, D Hedin, A Sabelfeld Proceedings of the 19th ACM SIGPLAN international conference on Functional …, 2014 | 47 | 2014 |
Value-sensitive hybrid information flow control for a javascript-like language D Hedin, L Bello, A Sabelfeld 2015 IEEE 28th Computer Security Foundations Symposium, 351-365, 2015 | 42 | 2015 |
Boosting the permissiveness of dynamic information-flow tracking by testing A Birgisson, D Hedin, A Sabelfeld Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 39 | 2012 |
Cryptographically-masked flows A Askarov, D Hedin, A Sabelfeld Theoretical Computer Science 402 (2-3), 82-101, 2008 | 38 | 2008 |
Cryptographically-masked flows A Askarov, D Hedin, A Sabelfeld International Static Analysis Symposium, 353-369, 2006 | 35 | 2006 |
Securing interactive programs W Rafnsson, D Hedin, A Sabelfeld 2012 IEEE 25th Computer Security Foundations Symposium, 293-307, 2012 | 34 | 2012 |
Information-flow security for JavaScript and its APIs D Hedin, L Bello, A Sabelfeld Journal of Computer Security 24 (2), 181-234, 2016 | 33 | 2016 |
Noninterference in the presence of non-opaque pointers D Hedin, D Sands 19th IEEE Computer Security Foundations Workshop (CSFW'06), 13 pp.-229, 2006 | 33 | 2006 |
{SandTrap}: Securing {JavaScript-driven}{Trigger-Action} Platforms MM Ahmadpanah, D Hedin, M Balliu, LE Olsson, A Sabelfeld 30th USENIX Security Symposium (USENIX Security 21), 2899-2916, 2021 | 28 | 2021 |
A principled approach to tracking information flow in the presence of libraries D Hedin, A Sjösten, F Piessens, A Sabelfeld Principles of Security and Trust: 6th International Conference, POST 2017 …, 2017 | 21 | 2017 |
Architectures for inlining security monitors in web applications J Magazinius, D Hedin, A Sabelfeld Engineering Secure Software and Systems: 6th International Symposium, ESSoS …, 2014 | 16 | 2014 |
Essentialfp: Exposing the essence of browser fingerprinting A Sjösten, D Hedin, A Sabelfeld 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 32-48, 2021 | 14 | 2021 |
A Perspective on Information-Flow D Hedin, A Sabelfeld Summer school Control Tools for Analysis and Verification of Software Safety …, 2011 | 11* | 2011 |
Securing node-red applications MM Ahmadpanah, M Balliu, D Hedin, LE Olsson, A Sabelfeld Protocols, Strands, and Logic: Essays Dedicated to Joshua Guttman on the …, 2021 | 8 | 2021 |
Value sensitivity and observable abstract values for information flow control L Bello, D Hedin, A Sabelfeld Logic for Programming, Artificial Intelligence, and Reasoning: 20th …, 2015 | 7 | 2015 |