Follow
Musard Balliu
Title
Cited by
Cited by
Year
If this then what? Controlling flows in IoT apps
I Bastys, M Balliu, A Sabelfeld
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
1102018
Epistemic temporal logic for information flow security
M Balliu, M Dam, G Le Guernic
ACM SIGPLAN Sixth Workshop on Programming Languages and Analysis for …, 2011
662011
Explicit secrecy: A policy for taint tracking
D Schoepe, M Balliu, BC Pierce, A Sabelfeld
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 15-30, 2016
542016
Automating information flow analysis of low level code
M Balliu, M Dam, R Guanciale
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
482014
Inspectre: Breaking and fixing microarchitectural vulnerabilities by formal analysis
R Guanciale, M Balliu, M Dam
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
402020
ENCOVER: Symbolic Exploration for Information Flow Security
M Balliu, M Dam, G Le Guernic
402012
An empirical study of information flows in real-world javascript
CA Staicu, D Schoepe, M Balliu, M Pradel, A Sabelfeld
Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and …, 2019
322019
The internet of things: security challenges
PC Van Oorschot, SW Smith
IEEE Security & Privacy 17 (5), 7-9, 2019
292019
Flaws in flows: Unveiling design flaws via information flow analysis
K Tuma, R Scandariato, M Balliu
2019 IEEE International Conference on Software Architecture (ICSA), 191-200, 2019
292019
We are family: Relating information-flow trackers
M Balliu, D Schoepe, A Sabelfeld
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
232017
A logic for information flow analysis of distributed programs
M Balliu
Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat …, 2013
222013
Principles of Security and Trust: 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague …
F Nielson, D Sands
Springer Nature, 2019
212019
Principles of Security and Trust: 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague …
F Nielson, D Sands
Springer Nature, 2019
202019
Let’s face it: Faceted values for taint tracking
D Schoepe, M Balliu, F Piessens, A Sabelfeld
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
202016
Securing cross-app interactions in IoT platforms
M Balliu, M Merro, M Pasqua
2019 IEEE 32nd computer security foundations symposium (CSF), 319-31915, 2019
192019
Securing iot apps
M Balliu, I Bastys, A Sabelfeld
IEEE Security & Privacy 17 (5), 22-29, 2019
192019
Formalising privacy policies in social networks
R Pardo, M Balliu, G Schneider
Journal of Logical and Algebraic Methods in Programming 90, 125-157, 2017
18*2017
Jslinq: Building secure applications across tiers
M Balliu, B Liebe, D Schoepe, A Sabelfeld
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
152016
A weakest precondition approach to active attacks analysis (abstract only)
M Balliu, I Mastroeni
ACM SIGPLAN Notices 44 (8), 5-5, 2009
15*2009
A weakest precondition approach to active attacks analysis
M Balliu, I Mastroeni
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009
152009
The system can't perform the operation now. Try again later.
Articles 1–20