Tamara Rezk
TitleCited byYear
Secure information flow by self-composition
G Barthe, PR D'Argenio, T Rezk
Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 100-114, 2004
3522004
A certified lightweight non-interference java bytecode verifier
G Barthe, D Pichardie, T Rezk
European Symposium on Programming, 125-140, 2007
972007
Non-interference for a JVM-like language
G Barthe, T Rezk
TLDI 5, 103-112, 2005
872005
Secure information flow by self-composition
G Barthe, PR D'argenio, T Rezk
Mathematical Structures in Computer Science 21 (6), 1207-1252, 2011
772011
Deriving an information flow checker and certifying compiler for java
G Barthe, D Naumann, T Rezk
2006 IEEE Symposium on Security and Privacy (S&P'06), 13 pp.-242, 2006
732006
Cryptographically sound implementations for typed information-flow security
C Fournet, T Rezk
ACM SIGPLAN Notices 43 (1), 323-335, 2008
722008
Preventing timing leaks through transactional branching instructions
G Barthe, T Rezk, M Warnier
Electronic Notes in Theoretical Computer Science 153 (2), 33-55, 2006
702006
Security types preserving compilation
G Barthe, A Basu, T Rezk
International Workshop on Verification, Model Checking, and Abstract …, 2004
472004
Certificate translation for optimizing compilers
G Barthe, B Grégoire, C Kunz, T Rezk
International Static Analysis Symposium, 301-317, 2006
452006
Proof obligations preserving compilation
G Barthe, T Rezk, A Saabas
International Workshop on Formal Aspects in Security and Trust, 112-126, 2005
432005
Stateful declassification policies for event-driven programs
M Vanhoef, W De Groef, D Devriese, F Piessens, T Rezk
2014 IEEE 27th Computer Security Foundations Symposium, 293-307, 2014
392014
Session types for access and information flow control
S Capecchi, I Castellani, M Dezani-Ciancaglini, T Rezk
International Conference on Concurrency Theory, 237-252, 2010
382010
A Security-Preserving Compiler for Distributed Programs From Information-Flow Policies to Cryptographic...
C Fournet, G Le Guernic
372009
Tractable enforcement of declassification policies
G Barthe, S Cavadini, T Rezk
2008 21st IEEE Computer Security Foundations Symposium, 83-97, 2008
362008
Security types preserving compilation
G Barthe, T Rezk, A Basu
Computer Languages, Systems & Structures 33 (2), 35-59, 2007
362007
A taxonomy of information flow monitors
N Bielova, T Rezk
International Conference on Principles of Security and Trust, 46-67, 2016
352016
Security of multithreaded programs by compilation
G Barthe, T Rezk, A Russo, A Sabelfeld
European Symposium on Research in Computer Security, 2-18, 2007
332007
Security of multithreaded programs by compilation
G Barthe, T Rezk, A Russo, A Sabelfeld
ACM Transactions on Information and System Security (TISSEC) 13 (3), 21, 2010
302010
An information flow monitor-inlining compiler for securing a core of javascript
JF Santos, T Rezk
IFIP International Information Security Conference, 278-292, 2014
282014
A certified lightweight non-interference Java bytecode verifier
G Barthe, D Pichardie, T Rezk
Mathematical Structures in Computer Science 23 (5), 1032-1081, 2013
252013
The system can't perform the operation now. Try again later.
Articles 1–20