Name
Affiliation
Papers
ANDREI SABELFELD
Chalmers University of Technology, Sweden
104
Collaborators
Citations 
PageRank 
81
2692
121.16
Referers 
Referees 
References 
2557
1454
2196
Search Limit
1001000
Title
Citations
PageRank
Year
DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting Duplication00.342022
Are chrome extensions compliant with the spirit of least privilege?00.342022
Data Privacy in Trigger-Action Systems10.362021
EssentialFP: Exposing the Essence of Browser Fingerprinting00.342021
Nontransitive Policies Transpiled00.342021
SandTrap: Securing JavaScript-driven Trigger-Action Platforms00.342021
Black Widow: Blackbox Data-driven Web Scanning10.352021
VERONICA: Expressive and Precise Concurrent Information Flow Security00.342020
HMAC and "Secure Preferences" - Revisiting Chromium-Based Browsers Security.00.342020
AutoNav: Evaluation and Automatization of Web Navigation Policies00.342020
Clockwork: Tracking Remote Timing Attacks10.352020
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing.20.372019
Latex Gloves - Protecting Browser Extensions from Probing and Revelation Attacks.20.382019
Securing IoT Apps30.382019
An Empirical Study of Real-World WebAssembly Binaries: Security, Languages, Use Cases30.382019
Information-Flow Control for Database-Backed Applications00.342019
If This Then What?: Controlling Flows in IoT Apps.120.572018
Assuring BetterTimes.00.342018
Prudent Design Principles for Information Flow Control40.382018
Information Flow Tracking for Side-Effectful Libraries.00.342018
Measuring login webpage security.30.372017
Special issue on verified information flow security.30.372017
We Are Family: Relating Information-Flow Trackers20.352017
PrivatePool: Privacy-Preserving Ridesharing40.392017
A Principled Approach to Tracking Information Flow in the Presence of Libraries.20.372017
Discovering Browser Extensions via Web Accessible Resources.100.542017
Privacy-Preserving Location-Proximity for Mobile Apps10.352017
Location-enhanced authentication using the IoT: because you cannot be in two places at once.00.342016
JavaScript Sandboxing: Isolating and Restricting Client-Side JavaScript.10.342016
Progress-Sensitive Security for SPARK.20.352016
JSLINQ: Building Secure Applications across Tiers.30.402016
Data Exfiltration in the Face of CSP.60.462016
MaxPace: Speed-constrained location queries.00.342016
Explicit Secrecy: A Policy for Taint Tracking90.452016
BetterTimes: Privacy-assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields10.412015
Value Sensitivity and Observable Abstract Values for Information Flow Control40.372015
Understanding and Enforcing Opacity30.402015
InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol60.462015
Web Application Security Using JSFlow.10.362015
May I? - Content Security Policy Endorsement for Browser Extensions110.602015
Value-Sensitive Hybrid Information Flow Control for a JavaScript-Like Language140.532015
Information-flow security for JavaScript and its APIs.120.542015
Architectures for Inlining Security Monitors in Web Applications70.482014
SeLINQ: tracking information across application-database boundaries150.612014
Compositional Information-Flow Security for Interactive Systems90.432014
JSFlow: tracking information flow in JavaScript and its APIs681.482014
GlassTube: a lightweight approach to web application integrity40.442013
Polyglots: crossing origins by crossing formats60.552013
Secure Multi-execution: Fine-Grained, Declassification-Aware, and Transparent170.552013
Information-Flow Security for a Core of JavaScript821.992012
  • 1
  • 2