Tamara Rezk
Cited by
Cited by
Secure information flow by self-composition
G Barthe, PR D'argenio, T Rezk
Mathematical Structures in Computer Science 21 (6), 1207-1252, 2011
Constant-time foundations for the new spectre era
S Cauligi, C Disselkoen, K Gleissenthall, D Tullsen, D Stefan, T Rezk, ...
Proceedings of the 41st ACM SIGPLAN Conference on Programming Language …, 2020
A certified lightweight non-interference java bytecode verifier
G Barthe, D Pichardie, T Rezk
Programming Languages and Systems: 16th European Symposium on Programming …, 2007
Non-interference for a JVM-like language
G Barthe, T Rezk
Proceedings of the 2005 ACM SIGPLAN international workshop on Types in …, 2005
Cryptographically sound implementations for typed information-flow security
C Fournet, T Rezk
ACM SIGPLAN Notices 43 (1), 323-335, 2008
Preventing timing leaks through transactional branching instructions
G Barthe, T Rezk, M Warnier
Electronic Notes in Theoretical Computer Science 153 (2), 33-55, 2006
Deriving an information flow checker and certifying compiler for java
G Barthe, D Naumann, T Rezk
2006 IEEE Symposium on Security and Privacy (S&P'06), 13 pp.-242, 2006
Binsec/rel: Efficient relational symbolic execution for constant-time at binary-level
LA Daniel, S Bardin, T Rezk
2020 IEEE Symposium on Security and Privacy (SP), 1021-1038, 2020
Security types preserving compilation
G Barthe, A Basu, T Rezk
Verification, Model Checking, and Abstract Interpretation: 5th International …, 2004
Session types for access and information flow control
S Capecchi, I Castellani, M Dezani-Ciancaglini, T Rezk
CONCUR 2010-Concurrency Theory: 21th International Conference, CONCUR 2010 …, 2010
A taxonomy of information flow monitors
N Bielova, T Rezk
Principles of Security and Trust: 5th International Conference, POST 2016 …, 2016
An information flow monitor-inlining compiler for securing a core of JavaScript
JF Santos, T Rezk
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014
A security-preserving compiler for distributed programs: From information-flow policies to cryptographic mechanisms
C Fournet, G Le Guernic, T Rezk
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Stateful declassification policies for event-driven programs
M Vanhoef, W De Groef, D Devriese, F Piessens, T Rezk
2014 IEEE 27th Computer Security Foundations Symposium, 293-307, 2014
Hunting the haunter-efficient relational symbolic execution for spectre with haunted relse
LA Daniel, S Bardin, T Rezk
NDSS 2021-Network and Distributed Systems Security, 2021
Certificate translation for optimizing compilers
G Barthe, B Grégoire, C Kunz, T Rezk
International Static Analysis Symposium, 301-317, 2006
Proof obligations preserving compilation
G Barthe, T Rezk, A Saabas
Formal Aspects in Security and Trust: Thrid International Workshop, FAST …, 2006
Tractable enforcement of declassification policies
G Barthe, S Cavadini, T Rezk
2008 21st IEEE Computer Security Foundations Symposium, 83-97, 2008
Security types preserving compilation
G Barthe, T Rezk, A Basu
Computer Languages, Systems & Structures 33 (2), 35-59, 2007
High-assurance cryptography in the spectre era
G Barthe, S Cauligi, B Grégoire, A Koutsos, K Liao, T Oliveira, S Priya, ...
2021 IEEE Symposium on Security and Privacy (SP), 1884-1901, 2021
The system can't perform the operation now. Try again later.
Articles 1–20