Tamara Rezk

Orcid: 0000-0003-3744-0248

Affiliations:
  • INRIA, Sophia Antipolis, France


According to our database1, Tamara Rezk authored at least 55 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On Kernel's Safety in the Spectre Era (Extended Version).
CoRR, 2024

On Kernel's Safety in the Spectre Era (And KASLR is Formally Dead).
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure.
ACM Trans. Priv. Secur., May, 2023

ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version).
CoRR, 2023

Sound Symbolic Execution via Abstract Interpretation and Its Application to Security.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2023

ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Statically identifying XSS using deep learning.
Sci. Comput. Program., 2022

Comparing the Detection of XSS Vulnerabilities in Node.js and a Multi-tier JavaScript-based Language via Deep Learning.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2021
High-Assurance Cryptography in the Spectre Era.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

SecureJS compiler: portable memory isolation in JavaScript.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Hunting the Haunter - Efficient Relational Symbolic Execution for Spectre with Haunted RelSE.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
High-Assurance Cryptography Software in the Spectre Era.
IACR Cryptol. ePrint Arch., 2020

Strenghtening Content Security Policy via Monitoring and URL Parameters Filtering.
Proceedings of the WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020

Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Constant-time foundations for the new spectre era.
Proceedings of the 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2020

Type-Based Declassification for Free.
Proceedings of the Formal Methods and Software Engineering, 2020

Security Analysis of ElGamal Implementations.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Clockwork: Tracking Remote Timing Attacks.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

2019
Towards Constant-Time Foundations for the New Spectre Era.
CoRR, 2019

Typed-based Relaxed Noninterference for Free.
CoRR, 2019

2018
A Better Facet of Dynamic Information Flow Control.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Secure Programming.
, 2018

2017
Type Abstraction for Relaxed Noninterference (Artifact).
Dagstuhl Artifacts Ser., 2017

On the Content Security Policy Violations due to the Same-Origin Policy.
Proceedings of the 26th International Conference on World Wide Web, 2017

Control What You Include! - Server-Side Protection Against Third Party Web Tracking.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

Type Abstraction for Relaxed Noninterference.
Proceedings of the 31st European Conference on Object-Oriented Programming, 2017

2016
Mashic compiler: Mashup sandboxing based on inter-frame communication.
J. Comput. Secur., 2016

A Taxonomy of Information Flow Monitors.
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016

Spot the Difference: Secure Multi-execution and Multiple Facets.
Proceedings of the Computer Security - ESORICS 2016, 2016

On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

2015
Modular Monitor Extensions for Information Flow Security in JavaScript.
Proceedings of the Trustworthy Global Computing - 10th International Symposium, 2015

Hybrid Typing of Secure Information Flow in a JavaScript-Like Language.
Proceedings of the Trustworthy Global Computing - 10th International Symposium, 2015

2014
An Information Flow Monitor for a Core of DOM - Introducing References and Live Primitives.
Proceedings of the Trustworthy Global Computing - 9th International Symposium, 2014

An Information Flow Monitor-Inlining Compiler for Securing a Core of JavaScript.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Stateful Declassification Policies for Event-Driven Programs.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2013
A certified lightweight non-interference Java bytecode verifier.
Math. Struct. Comput. Sci., 2013

2012
Reasoning about Web Applications: An Operational Semantics for HOP.
ACM Trans. Program. Lang. Syst., 2012

Mashic Compiler: Mashup Sandboxing Based on Inter-frame Communication.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

2011
Secure information flow by self-composition.
Math. Struct. Comput. Sci., 2011

Automated Code Injection Prevention for Web Applications.
Proceedings of the Theory of Security and Applications - Joint Workshop, 2011

Information-flow types for homomorphic encryptions.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Security of multithreaded programs by compilation.
ACM Trans. Inf. Syst. Secur., 2010

Robustness Guarantees for Anonymity.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

Session Types for Access and Information Flow Control.
Proceedings of the CONCUR 2010 - Concurrency Theory, 21th International Conference, 2010

2009
Certificate translation for optimizing compilers.
ACM Trans. Program. Lang. Syst., 2009

A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Cryptographically sound implementations for typed information-flow security.
Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2008

Tractable Enforcement of Declassification Policies.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

2007
Security types preserving compilation.
Comput. Lang. Syst. Struct., 2007

2006
Deriving an Information Flow Checker and Certifying Compiler for Java.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

2005
Preventing Timing Leaks Through Transactional Branching Instructions.
Proceedings of the Third Workshop on Quantitative Aspects of Programming Languages, 2005

Non-interference for a JVM-like language.
Proceedings of TLDI'05: 2005 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation, 2005

Proof Obligations Preserving Compilation.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

2004
Security Types Preserving Compilation: (Extended Abstract).
Proceedings of the Verification, 2004


  Loading...