Follow
Musard Balliu
Title
Cited by
Cited by
Year
If this then what? Controlling flows in IoT apps
I Bastys, M Balliu, A Sabelfeld
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
1382018
Inspectre: Breaking and fixing microarchitectural vulnerabilities by formal analysis
R Guanciale, M Balliu, M Dam
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
742020
Epistemic temporal logic for information flow security
M Balliu, M Dam, G Le Guernic
ACM SIGPLAN Sixth Workshop on Programming Languages and Analysis for …, 2011
722011
Explicit secrecy: A policy for taint tracking
D Schoepe, M Balliu, BC Pierce, A Sabelfeld
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 15-30, 2016
602016
Automating information flow analysis of low level code
M Balliu, M Dam, R Guanciale
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
532014
ENCOVER: Symbolic Exploration for Information Flow Security
M Balliu, M Dam, G Le Guernic
452012
Flaws in flows: Unveiling design flaws via information flow analysis
K Tuma, R Scandariato, M Balliu
2019 IEEE International Conference on Software Architecture (ICSA), 191-200, 2019
432019
An empirical study of information flows in real-world javascript
CA Staicu, D Schoepe, M Balliu, M Pradel, A Sabelfeld
Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and …, 2019
392019
The internet of things: security challenges
PC Van Oorschot, SW Smith
IEEE Security & Privacy 17 (5), 7-9, 2019
362019
Securing iot apps
M Balliu, I Bastys, A Sabelfeld
IEEE Security & Privacy 17 (5), 22-29, 2019
332019
{SandTrap}: Securing {JavaScript-driven}{Trigger-Action} Platforms
MM Ahmadpanah, D Hedin, M Balliu, LE Olsson, A Sabelfeld
30th USENIX Security Symposium (USENIX Security 21), 2899-2916, 2021
262021
Silent spring: Prototype pollution leads to remote code execution in Node. js
M Shcherbakov, M Balliu, CA Staicu
32nd USENIX Security Symposium (USENIX Security 23), 5521-5538, 2023
252023
A logic for information flow analysis of distributed programs
M Balliu
Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat …, 2013
252013
Serialdetector: Principled and practical exploration of object injection vulnerabilities for the web
M Shcherbakov, M Balliu
Network and Distributed Systems Security (NDSS) Symposium 202121-24 February …, 2021
242021
Securing cross-app interactions in IoT platforms
M Balliu, M Merro, M Pasqua
2019 IEEE 32nd computer security foundations symposium (CSF), 319-31915, 2019
242019
We are family: Relating information-flow trackers
M Balliu, D Schoepe, A Sabelfeld
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
242017
Friendly fire: cross-app interactions in IoT platforms
M Balliu, M Merro, M Pasqua, M Shcherbakov
ACM Transactions on Privacy and Security (TOPS) 24 (3), 1-40, 2021
202021
Information-flow control for database-backed applications
M Guarnieri, M Balliu, D Schoepe, D Basin, A Sabelfeld
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 79-94, 2019
202019
Let’s face it: Faceted values for taint tracking
D Schoepe, M Balliu, F Piessens, A Sabelfeld
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
202016
Formalising privacy policies in social networks
R Pardo, M Balliu, G Schneider
Journal of Logical and Algebraic Methods in Programming 90, 125-157, 2017
18*2017
The system can't perform the operation now. Try again later.
Articles 1–20