Follow
Tamara Rezk
Title
Cited by
Cited by
Year
Secure information flow by self-composition
G Barthe, PR D'argenio, T Rezk
Mathematical Structures in Computer Science 21 (6), 1207-1252, 2011
5382011
A certified lightweight non-interference java bytecode verifier
G Barthe, D Pichardie, T Rezk
European Symposium on Programming, 125-140, 2007
1102007
Non-interference for a JVM-like language
G Barthe, T Rezk
Proceedings of the 2005 ACM SIGPLAN international workshop on Types in …, 2005
982005
Cryptographically sound implementations for typed information-flow security
C Fournet, T Rezk
ACM SIGPLAN Notices 43 (1), 323-335, 2008
882008
Deriving an information flow checker and certifying compiler for java
G Barthe, D Naumann, T Rezk
2006 IEEE Symposium on Security and Privacy (S&P'06), 13 pp.-242, 2006
842006
Preventing timing leaks through transactional branching instructions
G Barthe, T Rezk, M Warnier
Electronic Notes in Theoretical Computer Science 153 (2), 33-55, 2006
832006
A security-preserving compiler for distributed programs: From information-flow policies to cryptographic mechanisms
C Fournet, G Le Guernic, T Rezk
Proceedings of the 16th ACM conference on Computer and communications …, 2009
512009
Security types preserving compilation
G Barthe, A Basu, T Rezk
International Workshop on Verification, Model Checking, and Abstract …, 2004
502004
A taxonomy of information flow monitors
N Bielova, T Rezk
International Conference on Principles of Security and Trust, 46-67, 2016
482016
Stateful declassification policies for event-driven programs
M Vanhoef, W De Groef, D Devriese, F Piessens, T Rezk
2014 IEEE 27th Computer Security Foundations Symposium, 293-307, 2014
482014
Proof obligations preserving compilation
G Barthe, T Rezk, A Saabas
International Workshop on Formal Aspects in Security and Trust, 112-126, 2005
482005
Certificate translation for optimizing compilers
G Barthe, B Grégoire, C Kunz, T Rezk
International Static Analysis Symposium, 301-317, 2006
462006
Session types for access and information flow control
S Capecchi, I Castellani, M Dezani-Ciancaglini, T Rezk
International Conference on Concurrency Theory, 237-252, 2010
452010
An information flow monitor-inlining compiler for securing a core of javascript
JF Santos, T Rezk
IFIP International Information Security Conference, 278-292, 2014
432014
Tractable enforcement of declassification policies
G Barthe, S Cavadini, T Rezk
2008 21st IEEE Computer Security Foundations Symposium, 83-97, 2008
432008
Constant-time foundations for the new spectre era
S Cauligi, C Disselkoen, K Gleissenthall, D Tullsen, D Stefan, T Rezk, ...
Proceedings of the 41st ACM SIGPLAN Conference on Programming Language …, 2020
422020
Security types preserving compilation
G Barthe, T Rezk, A Basu
Computer Languages, Systems & Structures 33 (2), 35-59, 2007
402007
A certified lightweight non-interference java bytecode verifier
G Barthe, D Pichardie, T Rezk
Mathematical Structures in Computer Science 23 (5), 1032-1081, 2013
372013
Security of multithreaded programs by compilation
G Barthe, T Rezk, A Russo, A Sabelfeld
European Symposium on Research in Computer Security, 2-18, 2007
352007
Binsec/rel: Efficient relational symbolic execution for constant-time at binary-level
LA Daniel, S Bardin, T Rezk
2020 IEEE Symposium on Security and Privacy (SP), 1021-1038, 2020
332020
The system can't perform the operation now. Try again later.
Articles 1–20