Vasilakis et al., 2021
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Vasilakis et al. | Preventing dynamic library compromise on node. js via rwx-based privilege reduction | |
| Wang et al. | Towards memory safe enclave programming with rust-sgx | |
| Chen et al. | Mystique: Uncovering information leakage from browser extensions | |
| Gudka et al. | Clean application compartmentalization with SOAAP | |
| Staicu et al. | Extracting taint specifications for javascript libraries | |
| Huang et al. | Securing web application code by static analysis and runtime protection | |
| Guarnieri et al. | Saving the world wide web from vulnerable JavaScript | |
| Reis et al. | BrowserShield: Vulnerability-driven filtering of dynamic HTML | |
| Mergendahl et al. | Cross-Language Attacks. | |
| Doupe et al. | deDacota: toward preventing server-side XSS via automatic code and data separation | |
| Gu et al. | Remote attestation on program execution | |
| Long et al. | Java coding guidelines: 75 recommendations for reliable and secure programs | |
| Izquierdo et al. | Collaboro: a collaborative (meta) modeling tool | |
| Cappos et al. | Retaining sandbox containment despite bugs in privileged memory-safe code | |
| Staicu et al. | Bilingual problems: Studying the security risks incurred by native extensions in scripting languages | |
| Wheeler | Countering trusting trust through diverse double-compiling | |
| Wang et al. | Hodor: Shrinking attack surface on node. js via system call limitation | |
| Gong | Dynamic analysis for JavaScript code | |
| AlHamdan et al. | Welcome to Jurassic Park: A Comprehensive Study of Security Risks in Deno and its Ecosystem | |
| Vasilakis et al. | MIR: Automated quantifiable privilege reduction against dynamic library compromise in JavaScript | |
| Goichon et al. | Static vulnerability detection in Java service-oriented components | |
| Rose et al. | IronNetInjector: Weaponizing. NET Dynamic Language Runtime Engines | |
| Jin et al. | Hardware control flow integrity | |
| Gudka et al. | Clean application compartmentalization with SOAAP (extended version) | |
| Bagheri et al. | Covert: Compositional analysis of android inter-app vulnerabilities |