Author of the publication

An In-Depth Symbolic Security Analysis of the ACME Standard

, , , , , , and . CCS '21 : Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, page 2601-2617. New York, Association for Computing Machinery, (2021)
DOI: 10.1145/3460120.3484588

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WebPol: Fine-Grained Information Flow Policies for Web Browsers., , , , and . ESORICS (1), volume 10492 of Lecture Notes in Computer Science, page 242-259. Springer, (2017)Security Architecture for Virtual Machines., , and . ICA3PP (1), volume 7016 of Lecture Notes in Computer Science, page 218-229. Springer, (2011)Information Flow Control for Event Handling and the DOM in Web Browsers., , , and . CSF, page 366-379. IEEE Computer Society, (2015)Exception handling for dynamic information flow control.. ICSE Companion, page 718-720. ACM, (2014)Information Flow Control in WebKit's JavaScript Bytecode., , , and . POST, volume 8414 of Lecture Notes in Computer Science, page 159-178. Springer, (2014)Post-Dominator Analysis for Precisely Handling Implicit Flows.. ICSE (2), page 787-789. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis., , , and . CoRR, (2015)DY* : A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code, , , , , , and . 2021 IEEE European Symposium on Security and Privacy (EuroS&P), page 523-542. Piscataway, IEEE, (2021)ESTRELA: Automated Policy Enforcement Across Remote APIs., , , and . CoRR, (2018)Practical dynamic information flow control.. Saarland University, Saarbrücken, Germany, (2018)