Tamara Rezk
Title
Cited by
Cited by
Year
Secure information flow by self-composition
G Barthe, PR D'Argenio, T Rezk
Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 100-114, 2004
3762004
A certified lightweight non-interference java bytecode verifier
G Barthe, D Pichardie, T Rezk
European Symposium on Programming, 125-140, 2007
1002007
Secure information flow by self-composition
G Barthe, PR D'argenio, T Rezk
Mathematical Structures in Computer Science 21 (6), 1207, 2011
932011
Non-interference for a JVM-like language
G Barthe, T Rezk
Proceedings of the 2005 ACM SIGPLAN international workshop on Types in …, 2005
932005
Preventing timing leaks through transactional branching instructions
G Barthe, T Rezk, M Warnier
Electronic Notes in Theoretical Computer Science 153 (2), 33-55, 2006
772006
Cryptographically sound implementations for typed information-flow security
C Fournet, T Rezk
ACM SIGPLAN Notices 43 (1), 323-335, 2008
752008
Deriving an information flow checker and certifying compiler for java
G Barthe, D Naumann, T Rezk
2006 IEEE Symposium on Security and Privacy (S&P'06), 13 pp.-242, 2006
752006
Proof obligations preserving compilation
G Barthe, T Rezk, A Saabas
International Workshop on Formal Aspects in Security and Trust, 112-126, 2005
472005
Security types preserving compilation
G Barthe, A Basu, T Rezk
International Workshop on Verification, Model Checking, and Abstract …, 2004
472004
Stateful declassification policies for event-driven programs
M Vanhoef, W De Groef, D Devriese, F Piessens, T Rezk
2014 IEEE 27th Computer Security Foundations Symposium, 293-307, 2014
452014
Certificate translation for optimizing compilers
G Barthe, B Grégoire, C Kunz, T Rezk
International Static Analysis Symposium, 301-317, 2006
452006
Session types for access and information flow control
S Capecchi, I Castellani, M Dezani-Ciancaglini, T Rezk
International Conference on Concurrency Theory, 237-252, 2010
422010
A security-preserving compiler for distributed programs: From information-flow policies to cryptographic mechanisms
C Fournet, G Le Guernic, T Rezk
Proceedings of the 16th ACM conference on Computer and communications …, 2009
412009
A taxonomy of information flow monitors
N Bielova, T Rezk
International Conference on Principles of Security and Trust, 46-67, 2016
402016
Tractable enforcement of declassification policies
G Barthe, S Cavadini, T Rezk
2008 21st IEEE Computer Security Foundations Symposium, 83-97, 2008
392008
Security types preserving compilation
G Barthe, T Rezk, A Basu
Computer Languages, Systems & Structures 33 (2), 35-59, 2007
392007
Security of multithreaded programs by compilation
G Barthe, T Rezk, A Russo, A Sabelfeld
European Symposium on Research in Computer Security, 2-18, 2007
362007
An information flow monitor-inlining compiler for securing a core of javascript
JF Santos, T Rezk
IFIP International Information Security Conference, 278-292, 2014
312014
Security of multithreaded programs by compilation
G Barthe, T Rezk, A Russo, A Sabelfeld
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-32, 2010
312010
A certified lightweight non-interference java bytecode verifier
G Barthe, D Pichardie, T Rezk
292013
The system can't perform the operation now. Try again later.
Articles 1–20