Author:
Algehed Maximilian,Russo Alejandro,Flanagan Cormac
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Tainted Secure Multi-Execution to Restrict Attacker Influence;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
2. Compositional Information Flow Monitoring for Reactive Programs;2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P);2022-06
3. Permissive runtime information flow control in the presence of exceptions;Journal of Computer Security;2021-06-18
4. Dynamic IFC Theorems for Free!;2021 IEEE 34th Computer Security Foundations Symposium (CSF);2021-06
5. A unified view of modalities in type systems;Proceedings of the ACM on Programming Languages;2020-08-02