Secure information flow by self-composition G Barthe, PR D'argenio, T Rezk Mathematical Structures in Computer Science 21 (6), 1207-1252, 2011 | 636 | 2011 |
Constant-time foundations for the new spectre era S Cauligi, C Disselkoen, K Gleissenthall, D Tullsen, D Stefan, T Rezk, ... Proceedings of the 41st ACM SIGPLAN Conference on Programming Language …, 2020 | 147 | 2020 |
A certified lightweight non-interference java bytecode verifier G Barthe, D Pichardie, T Rezk Programming Languages and Systems: 16th European Symposium on Programming …, 2007 | 122 | 2007 |
Non-interference for a JVM-like language G Barthe, T Rezk Proceedings of the 2005 ACM SIGPLAN international workshop on Types in …, 2005 | 102 | 2005 |
Cryptographically sound implementations for typed information-flow security C Fournet, T Rezk ACM SIGPLAN Notices 43 (1), 323-335, 2008 | 97 | 2008 |
Binsec/rel: Efficient relational symbolic execution for constant-time at binary-level LA Daniel, S Bardin, T Rezk 2020 IEEE Symposium on Security and Privacy (SP), 1021-1038, 2020 | 90 | 2020 |
Preventing timing leaks through transactional branching instructions G Barthe, T Rezk, M Warnier Electronic Notes in Theoretical Computer Science 153 (2), 33-55, 2006 | 87 | 2006 |
Deriving an information flow checker and certifying compiler for java G Barthe, D Naumann, T Rezk 2006 IEEE Symposium on Security and Privacy (S&P'06), 13 pp.-242, 2006 | 86 | 2006 |
Session types for access and information flow control S Capecchi, I Castellani, M Dezani-Ciancaglini, T Rezk CONCUR 2010-Concurrency Theory: 21th International Conference, CONCUR 2010 …, 2010 | 58 | 2010 |
Security types preserving compilation G Barthe, A Basu, T Rezk Verification, Model Checking, and Abstract Interpretation: 5th International …, 2004 | 56 | 2004 |
Hunting the haunter-efficient relational symbolic execution for spectre with haunted relse LA Daniel, S Bardin, T Rezk NDSS 2021-Network and Distributed Systems Security, 2021 | 53 | 2021 |
A taxonomy of information flow monitors N Bielova, T Rezk Principles of Security and Trust: 5th International Conference, POST 2016 …, 2016 | 51 | 2016 |
A security-preserving compiler for distributed programs: From information-flow policies to cryptographic mechanisms C Fournet, G Le Guernic, T Rezk Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 51 | 2009 |
An information flow monitor-inlining compiler for securing a core of JavaScript JF Santos, T Rezk ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014 | 50 | 2014 |
Stateful declassification policies for event-driven programs M Vanhoef, W De Groef, D Devriese, F Piessens, T Rezk 2014 IEEE 27th Computer Security Foundations Symposium, 293-307, 2014 | 49 | 2014 |
Proof obligations preserving compilation G Barthe, T Rezk, A Saabas Formal Aspects in Security and Trust: Thrid International Workshop, FAST …, 2006 | 49 | 2006 |
High-assurance cryptography in the spectre era G Barthe, S Cauligi, B Grégoire, A Koutsos, K Liao, T Oliveira, S Priya, ... 2021 IEEE Symposium on Security and Privacy (SP), 1884-1901, 2021 | 48 | 2021 |
Certificate translation for optimizing compilers G Barthe, B Grégoire, C Kunz, T Rezk International Static Analysis Symposium, 301-317, 2006 | 48 | 2006 |
Tractable enforcement of declassification policies G Barthe, S Cavadini, T Rezk 2008 21st IEEE Computer Security Foundations Symposium, 83-97, 2008 | 45 | 2008 |
Security types preserving compilation G Barthe, T Rezk, A Basu Computer Languages, Systems & Structures 33 (2), 35-59, 2007 | 42 | 2007 |