Author of the publication

Hybrid Information Flow Monitoring against Web Tracking.

, , and . CSF, page 240-254. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing Stack Maps with Interfaces., , and . ECOOP, volume 5142 of Lecture Notes in Computer Science, page 642-666. Springer, (2008)Secure Object Flow Analysis for Java Card., and . CARDIS, page 97-110. USENIX, (2002)Inference of Polymorphic and Conditional Strictness Properties.. POPL, page 209-221. ACM, (1998)A Backwards Analysis for Compile-time Garbage Collection., and . ESOP, volume 432 of Lecture Notes in Computer Science, page 227-239. Springer, (1990)Coarse Grained Java Security Policies., , and . ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 296. Springer, (1998)Types in Program Analysis.. The Essence of Computation, volume 2566 of Lecture Notes in Computer Science, page 204-222. Springer, (2002)Certified Result Checking for Polyhedral Analysis of Bytecode Programs., , , and . TGC, volume 6084 of Lecture Notes in Computer Science, page 253-267. Springer, (2010)Polyhedral Analysis for Synchronous Languages., , and . SAS, volume 1694 of Lecture Notes in Computer Science, page 51-68. Springer, (1999)SawjaCard: A Static Analysis Tool for Certifying Java Card Applications., , and . SAS, volume 8723 of Lecture Notes in Computer Science, page 51-67. Springer, (2014)Compiling Sandboxes: Formally Verified Software Fault Isolation., , , , and . ESOP, volume 11423 of Lecture Notes in Computer Science, page 499-524. Springer, (2019)