Author of the publication

Information Flow Control for Event Handling and the DOM in Web Browsers.

, , , and . CSF, page 366-379. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Architecture for Virtual Machines., , and . ICA3PP (1), volume 7016 of Lecture Notes in Computer Science, page 218-229. Springer, (2011)Information Flow Control for Event Handling and the DOM in Web Browsers., , , and . CSF, page 366-379. IEEE Computer Society, (2015)Exception handling for dynamic information flow control.. ICSE Companion, page 718-720. ACM, (2014)WebPol: Fine-Grained Information Flow Policies for Web Browsers., , , , and . ESORICS (1), volume 10492 of Lecture Notes in Computer Science, page 242-259. Springer, (2017)ESTRELA: Automated Policy Enforcement Across Remote APIs., , , and . CoRR, (2018)Practical dynamic information flow control.. Saarland University, Saarbrücken, Germany, (2018)Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis., , , and . PLAS@ECOOP, page 15. ACM, (2014)An In-Depth Symbolic Security Analysis of the ACME Standard, , , , , , and . CCS '21 : Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, page 2601-2617. New York, Association for Computing Machinery, (2021)Post-Dominator Analysis for Precisely Handling Implicit Flows.. ICSE (2), page 787-789. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis., , , and . CoRR, (2015)