Nataliia Bielova

Author's posts

Paper on Hop.js accepted to ICFP’16!

A paper that overviews the Hop.js design has been accepted to the ACM SIGPLAN International Conference on Functional Programming (ICFP’16): A Glimpse of Hop.js Manuel Serrano and Vincent Prunet

Article published in Cybersecurity special theme of ERCIM News

A new article on program monitoring to prevent Web tracking through device fingerprinting appeared in the special theme “Cybersecurity” in the European Research Consortium for Informatics and Mathematics newsletter (ERCIM News): Using JavaScript Monitoring to Prevent Device Fingerprinting Nataliia Bielova, Frédéric Besson and Thomas Jensen.

Paper on information flow monitors accepted to ESORICS’16

A paper that formally compares the Secure Multi-Execution (SME) and Multiple Facets (MF) monitors for information flow control is accepted to the European Symposium on Research in Computer Security (ESORICS’16) Spot the Difference: Secure Multi-Execution and Multiple Facets Nataliia Bielova and Tamara Rezk.

Paper on hybrid monitoring of attacker knowledge accepted to CSF’16

A paper on hybrid information flow monitoring of attacker knowledge is accepted to the IEEE Computer Security Foundations Symposium (CSF’16): Hybrid Monitoring of Attacker Knowledge Frederic Besson, Nataliia Bielova and Thomas Jensen

A postdoc position on Information Flow security and Coq

One postdoc position is available on Information flow security and proofs in Coq — contact Tamara Rezk or Nataliia Bielova) directly.

2 postdoc positions @ INRIA on Web Tracking & User discrimination on the Web

We have 2 postdoc positions and 1 internship position in the project “Web Tracking and User discrimination on the Web: measurement, causation and prevention”. 2 postdocs Measurement and causation of user discrimination on the Web (jointly by INDES and DIANA) Web Tracking prevention and user discrimination on the Web (jointly by INDES and DIANA) 1 …

Continue reading

A paper on the computer scientist nightmare will be presented at WedlerFest’16

Manuel Serrano will present a paper at WedlerFest’16: The computer scientist nightmare Manuel Serrano

A paper on secure multiparty sessions with topics to appear in PLACES workshop

Ilaria Castellani got a new paper appeared in the PLACES’16 workshop: Secure Multiparty Sessions with Topics Ilaria Castellani, Mariangiola Dezani-Ciancaglini and Ugo De’Liguoro

A paper on access control, capabilities, their equivalence and confused deputy attacks is accepted to CSF’16

A paper on access control, capabilities, their equivalence and confused deputy attacks is accepted to the IEEE Computer Security Foundations Symposium (CSF’16): On access control, capabilities, their equivalence, and confused deputy attacks Vineet Rajani, Deepak Garg, Tamara Rezk

A paper on taxonomy of information flow monitors is accepted to POST’16

Tamara Rezk and Nataliia Bielova have a new paper accepted to the International Conference on Principles of Security and Trust (POST’16). This paper offers a rigorous comparison of existing information flow monitors with respect to two dimensions: soundness and transparency. A Taxonomy of Information Flow Monitors Nataliia Bielova and Tamara Rezk.