DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting Duplication | 0 | 0.34 | 2022 |
Are chrome extensions compliant with the spirit of least privilege? | 0 | 0.34 | 2022 |
Data Privacy in Trigger-Action Systems | 1 | 0.36 | 2021 |
EssentialFP: Exposing the Essence of Browser Fingerprinting | 0 | 0.34 | 2021 |
Nontransitive Policies Transpiled | 0 | 0.34 | 2021 |
SandTrap: Securing JavaScript-driven Trigger-Action Platforms | 0 | 0.34 | 2021 |
Black Widow: Blackbox Data-driven Web Scanning | 1 | 0.35 | 2021 |
VERONICA: Expressive and Precise Concurrent Information Flow Security | 0 | 0.34 | 2020 |
HMAC and "Secure Preferences" - Revisiting Chromium-Based Browsers Security. | 0 | 0.34 | 2020 |
AutoNav: Evaluation and Automatization of Web Navigation Policies | 0 | 0.34 | 2020 |
Clockwork: Tracking Remote Timing Attacks | 1 | 0.35 | 2020 |
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing. | 2 | 0.37 | 2019 |
Latex Gloves - Protecting Browser Extensions from Probing and Revelation Attacks. | 2 | 0.38 | 2019 |
Securing IoT Apps | 3 | 0.38 | 2019 |
An Empirical Study of Real-World WebAssembly Binaries: Security, Languages, Use Cases | 3 | 0.38 | 2019 |
Information-Flow Control for Database-Backed Applications | 0 | 0.34 | 2019 |
If This Then What?: Controlling Flows in IoT Apps. | 12 | 0.57 | 2018 |
Assuring BetterTimes. | 0 | 0.34 | 2018 |
Prudent Design Principles for Information Flow Control | 4 | 0.38 | 2018 |
Information Flow Tracking for Side-Effectful Libraries. | 0 | 0.34 | 2018 |
Measuring login webpage security. | 3 | 0.37 | 2017 |
Special issue on verified information flow security. | 3 | 0.37 | 2017 |
We Are Family: Relating Information-Flow Trackers | 2 | 0.35 | 2017 |
PrivatePool: Privacy-Preserving Ridesharing | 4 | 0.39 | 2017 |
A Principled Approach to Tracking Information Flow in the Presence of Libraries. | 2 | 0.37 | 2017 |
Discovering Browser Extensions via Web Accessible Resources. | 10 | 0.54 | 2017 |
Privacy-Preserving Location-Proximity for Mobile Apps | 1 | 0.35 | 2017 |
Location-enhanced authentication using the IoT: because you cannot be in two places at once. | 0 | 0.34 | 2016 |
JavaScript Sandboxing: Isolating and Restricting Client-Side JavaScript. | 1 | 0.34 | 2016 |
Progress-Sensitive Security for SPARK. | 2 | 0.35 | 2016 |
JSLINQ: Building Secure Applications across Tiers. | 3 | 0.40 | 2016 |
Data Exfiltration in the Face of CSP. | 6 | 0.46 | 2016 |
MaxPace: Speed-constrained location queries. | 0 | 0.34 | 2016 |
Explicit Secrecy: A Policy for Taint Tracking | 9 | 0.45 | 2016 |
BetterTimes: Privacy-assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields | 1 | 0.41 | 2015 |
Value Sensitivity and Observable Abstract Values for Information Flow Control | 4 | 0.37 | 2015 |
Understanding and Enforcing Opacity | 3 | 0.40 | 2015 |
InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol | 6 | 0.46 | 2015 |
Web Application Security Using JSFlow. | 1 | 0.36 | 2015 |
May I? - Content Security Policy Endorsement for Browser Extensions | 11 | 0.60 | 2015 |
Value-Sensitive Hybrid Information Flow Control for a JavaScript-Like Language | 14 | 0.53 | 2015 |
Information-flow security for JavaScript and its APIs. | 12 | 0.54 | 2015 |
Architectures for Inlining Security Monitors in Web Applications | 7 | 0.48 | 2014 |
SeLINQ: tracking information across application-database boundaries | 15 | 0.61 | 2014 |
Compositional Information-Flow Security for Interactive Systems | 9 | 0.43 | 2014 |
JSFlow: tracking information flow in JavaScript and its APIs | 68 | 1.48 | 2014 |
GlassTube: a lightweight approach to web application integrity | 4 | 0.44 | 2013 |
Polyglots: crossing origins by crossing formats | 6 | 0.55 | 2013 |
Secure Multi-execution: Fine-Grained, Declassification-Aware, and Transparent | 17 | 0.55 | 2013 |
Information-Flow Security for a Core of JavaScript | 82 | 1.99 | 2012 |