Follow
Musard Balliu
Title
Cited by
Cited by
Year
If this then what? Controlling flows in IoT apps
I Bastys, M Balliu, A Sabelfeld
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
932018
Epistemic temporal logic for information flow security
M Balliu, M Dam, G Le Guernic
ACM SIGPLAN Sixth Workshop on Programming Languages and Analysis for …, 2011
632011
Explicit secrecy: A policy for taint tracking
D Schoepe, M Balliu, BC Pierce, A Sabelfeld
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 15-30, 2016
522016
Automating information flow analysis of low level code
M Balliu, M Dam, R Guanciale
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
462014
ENCOVER: Symbolic Exploration for Information Flow Security
M Balliu, M Dam, G Le Guernic
382012
Inspectre: Breaking and fixing microarchitectural vulnerabilities by formal analysis
R Guanciale, M Balliu, M Dam
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
332020
An empirical study of information flows in real-world javascript
CA Staicu, D Schoepe, M Balliu, M Pradel, A Sabelfeld
Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and …, 2019
222019
The internet of things: security challenges
PC Van Oorschot, SW Smith
IEEE Security & Privacy 17 (5), 7-9, 2019
222019
Flaws in flows: Unveiling design flaws via information flow analysis
K Tuma, R Scandariato, M Balliu
2019 IEEE International Conference on Software Architecture (ICSA), 191-200, 2019
222019
A logic for information flow analysis of distributed programs
M Balliu
Nordic Conference on Secure IT Systems, 84-99, 2013
212013
We are family: Relating information-flow trackers
M Balliu, D Schoepe, A Sabelfeld
European Symposium on Research in Computer Security, 124-145, 2017
192017
Let’s face it: Faceted values for taint tracking
D Schoepe, M Balliu, F Piessens, A Sabelfeld
European Symposium on Research in Computer Security, 561-580, 2016
192016
Securing IoT Apps
M Balliu, I Bastys, A Sabelfeld
IEEE Security & Privacy 17 (5), 22-29, 2019
172019
Formalising privacy policies in social networks
R Pardo, M Balliu, G Schneider
Journal of Logical and Algebraic Methods in Programming 90, 125-157, 2017
17*2017
Securing cross-app interactions in IoT platforms
M Balliu, M Merro, M Pasqua
2019 IEEE 32nd computer security foundations symposium (CSF), 319-31915, 2019
162019
A weakest precondition approach to active attacks analysis (abstract only)
M Balliu, I Mastroeni
ACM SIGPLAN Notices 44 (8), 5-5, 2009
15*2009
A weakest precondition approach to active attacks analysis
M Balliu, I Mastroeni
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009
152009
Principles of Security and Trust: 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague …
F Nielson, D Sands
Springer Nature, 2019
142019
Principles of Security and Trust: 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague …
F Nielson, D Sands
Springer Nature, 2019
142019
JSLINQ: building secure applications across tiers
M Balliu, B Liebe, D Schoepe, A Sabelfeld
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
122016
The system can't perform the operation now. Try again later.
Articles 1–20