Musard Balliu
Title
Cited by
Cited by
Year
If this then what? Controlling flows in IoT apps
I Bastys, M Balliu, A Sabelfeld
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
772018
Epistemic temporal logic for information flow security
M Balliu, M Dam, G Le Guernic
ACM SIGPLAN Sixth Workshop on Programming Languages and Analysis for …, 2011
572011
Explicit secrecy: A policy for taint tracking
D Schoepe, M Balliu, BC Pierce, A Sabelfeld
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 15-30, 2016
462016
Automating information flow analysis of low level code
M Balliu, M Dam, R Guanciale
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
412014
ENCOVER: Symbolic Exploration for Information Flow Security
M Balliu, M Dam, G Le Guernic
342012
Inspectre: Breaking and fixing microarchitectural vulnerabilities by formal analysis
R Guanciale, M Balliu, M Dam
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
242020
An empirical study of information flows in real-world javascript
CA Staicu, D Schoepe, M Balliu, M Pradel, A Sabelfeld
Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and …, 2019
202019
Flaws in flows: Unveiling design flaws via information flow analysis
K Tuma, R Scandariato, M Balliu
2019 IEEE International Conference on Software Architecture (ICSA), 191-200, 2019
202019
The internet of things: Security challenges
PC Van Oorschot, SW Smith
IEEE Security & Privacy 17 (5), 7-9, 2019
182019
We are family: Relating information-flow trackers
M Balliu, D Schoepe, A Sabelfeld
European Symposium on Research in Computer Security, 124-145, 2017
182017
Let’s face it: Faceted values for taint tracking
D Schoepe, M Balliu, F Piessens, A Sabelfeld
European Symposium on Research in Computer Security, 561-580, 2016
182016
Securing IoT Apps
M Balliu, I Bastys, A Sabelfeld
IEEE Security & Privacy 17 (5), 22-29, 2019
172019
A logic for information flow analysis of distributed programs
M Balliu
Nordic Conference on Secure IT Systems, 84-99, 2013
152013
Formalising privacy policies in social networks
R Pardo, M Balliu, G Schneider
Journal of logical and algebraic methods in programming 90, 125-157, 2017
14*2017
A weakest precondition approach to active attacks analysis (abstract only)
M Balliu, I Mastroeni
ACM SIGPLAN Notices 44 (8), 5-5, 2009
13*2009
A weakest precondition approach to active attacks analysis
M Balliu, I Mastroeni
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009
132009
Jslinq: Building secure applications across tiers
M Balliu, B Liebe, D Schoepe, A Sabelfeld
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
122016
Securing cross-app interactions in IoT platforms
M Balliu, M Merro, M Pasqua
2019 IEEE 32nd computer security foundations symposium (CSF), 319-31915, 2019
112019
A weakest precondition approach to robustness
M Balliu, I Mastroeni
Transactions on computational science X, 261-297, 2010
92010
Friendly fire: cross-app interactions in IoT platforms
M Balliu, M Merro, M Pasqua, M Shcherbakov
ACM Transactions on Privacy and Security (TOPS) 24 (3), 1-40, 2021
72021
The system can't perform the operation now. Try again later.
Articles 1–20