Category: papers

Welcome to Feras Al Kassar, Arianna Corvi and Adam Khayam!

Feras Al Kassar joined INDES as a PhD student and Arianna Corvi and Adam Khayam joined INDES as interns on 7 January 2019. Welcome, Feras, Arianna and Adam!

Paper on CSP-SOP violations accepted at WWW 2017

A paper that shows how the Content Security Policy (CSP), a mechanism designed to mitigate popular web vulnerabilities, can be violated due to the Same Origin Policy (SOP) got accepted at WWW 2017: On the Content Security Policy Violations due to the Same-Origin Policy Francis Some, Nataliia Bielova and Tamara Rezk

Paper on causality accepted to JFLA’17

A small article that characterizes causal functions on events, i.e. whose produced events before a given time depend only on the events received before that time. Causalité dans les calculs d’événements Bernard P. Serpette and David Janin

Paper on dynamic leakage accepted to PLAS’16

A paper that states the need for a new quantitative information flow measure in case of dynamic program analysis is accepted to the ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS’16): Dynamic leakage – a need for a new quantitative information flow measure Nataliia Bielova

Paper on Hop.js accepted to ICFP’16!

A paper that overviews the Hop.js design has been accepted to the ACM SIGPLAN International Conference on Functional Programming (ICFP’16): A Glimpse of Hop.js Manuel Serrano and Vincent Prunet

Article published in Cybersecurity special theme of ERCIM News

A new article on program monitoring to prevent Web tracking through device fingerprinting appeared in the special theme “Cybersecurity” in the European Research Consortium for Informatics and Mathematics newsletter (ERCIM News): Using JavaScript Monitoring to Prevent Device Fingerprinting Nataliia Bielova, Frédéric Besson and Thomas Jensen.

Paper on information flow monitors accepted to ESORICS’16

A paper that formally compares the Secure Multi-Execution (SME) and Multiple Facets (MF) monitors for information flow control is accepted to the European Symposium on Research in Computer Security (ESORICS’16) Spot the Difference: Secure Multi-Execution and Multiple Facets Nataliia Bielova and Tamara Rezk.

Paper on hybrid monitoring of attacker knowledge accepted to CSF’16

A paper on hybrid information flow monitoring of attacker knowledge is accepted to the IEEE Computer Security Foundations Symposium (CSF’16): Hybrid Monitoring of Attacker Knowledge Frederic Besson, Nataliia Bielova and Thomas Jensen