Daniel Hedin
Daniel Hedin
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
JSFlow: Tracking information flow in JavaScript and its APIs
D Hedin, A Birgisson, L Bello, A Sabelfeld
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1663-1671, 2014
Information-flow security for a core of JavaScript
D Hedin, A Sabelfeld
2012 IEEE 25th Computer Security Foundations Symposium, 3-18, 2012
A perspective on information-flow control
D Hedin, A Sabelfeld
Software safety and security, 319-347, 2012
Timing aware information flow security for a javacard-like bytecode
D Hedin, D Sands
Electronic Notes in Theoretical Computer Science 141 (1), 163-182, 2005
A machine-checked formalization of sigma-protocols
G Barthe, D Hedin, SZ Béguelin, B Grégoire, S Heraud
2010 23rd IEEE Computer Security Foundations Symposium, 246-260, 2010
SeLINQ: tracking information across application-database boundaries
D Schoepe, D Hedin, A Sabelfeld
Proceedings of the 19th ACM SIGPLAN international conference on Functional …, 2014
Value-sensitive hybrid information flow control for a javascript-like language
D Hedin, L Bello, A Sabelfeld
2015 IEEE 28th Computer Security Foundations Symposium, 351-365, 2015
Boosting the permissiveness of dynamic information-flow tracking by testing
A Birgisson, D Hedin, A Sabelfeld
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
Cryptographically-masked flows
A Askarov, D Hedin, A Sabelfeld
Static Analysis: 13th International Symposium, SAS 2006, Seoul, Korea …, 2006
Securing interactive programs
W Rafnsson, D Hedin, A Sabelfeld
2012 IEEE 25th Computer Security Foundations Symposium, 293-307, 2012
Cryptographically-masked flows
A Askarov, D Hedin, A Sabelfeld
Theoretical Computer Science 402 (2-3), 82-101, 2008
Information-flow security for JavaScript and its APIs
D Hedin, L Bello, A Sabelfeld
Journal of Computer Security 24 (2), 181-234, 2016
Noninterference in the presence of non-opaque pointers
D Hedin, D Sands
19th IEEE Computer Security Foundations Workshop (CSFW'06), 13 pp.-229, 2006
Sandtrap: Securing javascript-driven trigger-action platforms
MM Ahmadpanah, D Hedin, M Balliu, LE Olsson, A Sabelfeld
USENIX Security Symposium (USENIX Security 2021), 2021
A principled approach to tracking information flow in the presence of libraries
D Hedin, A Sjösten, F Piessens, A Sabelfeld
Principles of Security and Trust: 6th International Conference, POST 2017 …, 2017
Architectures for inlining security monitors in web applications
J Magazinius, D Hedin, A Sabelfeld
Engineering Secure Software and Systems: 6th International Symposium, ESSoS …, 2014
A Perspective on Information-Flow
D Hedin, A Sabelfeld
Summer school Control Tools for Analysis and Verification of Software Safety …, 2011
Securing Node-RED Applications
MM Ahmadpanah, M Balliu, D Hedin, LE Olsson, A Sabelfeld
Protocols, Strands, and Logic: Essays Dedicated to Joshua Guttman on the …, 2021
Value sensitivity and observable abstract values for information flow control
L Bello, D Hedin, A Sabelfeld
Logic for Programming, Artificial Intelligence, and Reasoning: 20th …, 2015
Web application security using JSFlow
D Hedin, A Sabelfeld
2015 17th International Symposium on Symbolic and Numeric Algorithms for …, 2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20