default search action
Musard Balliu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c32]Matvey Soloviev, Musard Balliu, Roberto Guanciale:
Security Properties through the Lens of Modal Logic. CSF 2024: 340-355 - [c31]Amir M. Ahmadian, Matvey Soloviev, Musard Balliu:
Disjunctive Policies for Database-Backed Programs. CSF 2024: 388-402 - [c30]Mahmoud Aghvamipanah, Morteza Amini, Cyrille Artho, Musard Balliu:
Activity Recognition Protection for IoT Trigger-Action Platforms. EuroS&P 2024: 600-616 - [c29]Marcus Birgersson, Cyrille Artho, Musard Balliu:
Sharing without Showing: Secure Cloud Analytics with Trusted Execution Environments. SecDev 2024: 105-116 - [c28]Eric Cornelissen, Mikhail Shcherbakov, Musard Balliu:
GHunter: Universal Prototype Pollution Gadgets in JavaScript Runtimes. USENIX Security Symposium 2024 - [c27]Mikhail Shcherbakov, Paul Moosbrugger, Musard Balliu:
Unveiling the Invisible: Detection and Evaluation of Prototype Pollution Gadgets with Dynamic Taint Analysis. WWW 2024: 1800-1811 - [i11]Eric Cornelissen, Mikhail Shcherbakov, Musard Balliu:
GHunter: Universal Prototype Pollution Gadgets in JavaScript Runtimes. CoRR abs/2407.10812 (2024) - [i10]Marcus Birgersson, Cyrille Artho, Musard Balliu:
Sharing without Showing: Secure Cloud Analytics with Trusted Execution Environments. CoRR abs/2410.10574 (2024) - 2023
- [j5]Musard Balliu, Benoit Baudry, Sofia Bobadilla, Mathias Ekstedt, Martin Monperrus, Javier Ron Arteaga, Aman Sharma, Gabriel Skoglund, César Soto-Valero, Martin Wittlinger:
Challenges of Producing Software Bill of Materials for Java. IEEE Secur. Priv. 21(6): 12-23 (2023) - [c26]Musard Balliu, Benoit Baudry, Sofia Bobadilla, Mathias Ekstedt, Martin Monperrus, Javier Ron, Aman Sharma, Gabriel Skoglund, César Soto-Valero, Martin Wittlinger:
Software Bill of Materials in Java. SCORED@CCS 2023: 75-76 - [c25]Mikhail Shcherbakov, Musard Balliu, Cristian-Alexandru Staicu:
Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js. USENIX Security Symposium 2023: 5521-5538 - [i9]Musard Balliu, Benoit Baudry, Sofia Bobadilla, Mathias Ekstedt, Martin Monperrus, Javier Ron, Aman Sharma, Gabriel Skoglund, César Soto-Valero, Martin Wittlinger:
Challenges of Producing Software Bill Of Materials for Java. CoRR abs/2303.11102 (2023) - [i8]Matvey Soloviev, Musard Balliu, Roberto Guanciale:
Security Properties through the Lens of Modal Logic. CoRR abs/2309.09542 (2023) - [i7]Mikhail Shcherbakov, Paul Moosbrugger, Musard Balliu:
Unveiling the Invisible: Detection and Evaluation of Prototype Pollution Gadgets with Dynamic Taint Analysis. CoRR abs/2311.03919 (2023) - [i6]Amir M. Ahmadian, Matvey Soloviev, Musard Balliu:
Disjunctive Policies for Database-Backed Programs. CoRR abs/2312.10441 (2023) - 2022
- [c24]Amir M. Ahmadian, Musard Balliu:
Dynamic Policies Revisited. EuroS&P 2022: 448-466 - [i5]Mikhail Shcherbakov, Musard Balliu, Cristian-Alexandru Staicu:
Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js. CoRR abs/2207.11171 (2022) - 2021
- [j4]Musard Balliu, Massimo Merro, Michele Pasqua, Mikhail Shcherbakov:
Friendly Fire: Cross-app Interactions in IoT Platforms. ACM Trans. Priv. Secur. 24(3): 16:1-16:40 (2021) - [c23]Mohammad M. Ahmadpanah, Musard Balliu, Daniel Hedin, Lars Eric Olsson, Andrei Sabelfeld:
Securing Node-RED Applications. Protocols, Strands, and Logic 2021: 1-21 - [c22]Aditya Oak, Amir M. Ahmadian, Musard Balliu, Guido Salvaneschi:
Language Support for Secure Software Development with Enclaves. CSF 2021: 1-16 - [c21]Mikhail Shcherbakov, Musard Balliu:
SerialDetector: Principled and Practical Exploration of Object Injection Vulnerabilities for the Web. NDSS 2021 - [c20]Marcus Birgersson, Cyrille Artho, Musard Balliu:
Security-Aware Multi-User Architecture for IoT. QRS 2021: 102-113 - [c19]Aditya Oak, Amir M. Ahmadian, Musard Balliu, Guido Salvaneschi:
Enclave-Based Secure Programming with JE. SecDev 2021: 71-78 - [c18]Rodothea-Myrsini Tsoupidi, Musard Balliu, Benoit Baudry:
Vivienne: Relational Verification of Cryptographic Implementations in WebAssembly. SecDev 2021: 94-102 - [c17]Mohammad M. Ahmadpanah, Daniel Hedin, Musard Balliu, Lars Eric Olsson, Andrei Sabelfeld:
SandTrap: Securing JavaScript-driven Trigger-Action Platforms. USENIX Security Symposium 2021: 2899-2916 - [i4]Rodothea-Myrsini Tsoupidi, Musard Balliu, Benoit Baudry:
Vivienne: Relational Verification of Cryptographic Implementations in WebAssembly. CoRR abs/2109.01386 (2021) - 2020
- [c16]Roberto Guanciale, Musard Balliu, Mads Dam:
InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis. CCS 2020: 1853-1869 - [c15]Iulia Bastys, Musard Balliu, Tamara Rezk, Andrei Sabelfeld:
Clockwork: Tracking Remote Timing Attacks. CSF 2020: 350-365
2010 – 2019
- 2019
- [j3]Musard Balliu, Iulia Bastys, Andrei Sabelfeld:
Securing IoT Apps. IEEE Secur. Priv. 17(5): 22-29 (2019) - [c14]Cristian-Alexandru Staicu, Daniel Schoepe, Musard Balliu, Michael Pradel, Andrei Sabelfeld:
An Empirical Study of Information Flows in Real-World JavaScript. PLAS@CCS 2019: 45-59 - [c13]Musard Balliu, Massimo Merro, Michele Pasqua:
Securing Cross-App Interactions in IoT Platforms. CSF 2019: 319-334 - [c12]Marco Guarnieri, Musard Balliu, Daniel Schoepe, David A. Basin, Andrei Sabelfeld:
Information-Flow Control for Database-Backed Applications. EuroS&P 2019: 79-94 - [c11]Katja Tuma, Riccardo Scandariato, Musard Balliu:
Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis. ICSA 2019: 191-200 - [i3]Cristian-Alexandru Staicu, Daniel Schoepe, Musard Balliu, Michael Pradel, Andrei Sabelfeld:
An Empirical Study of Information Flows in Real-World JavaScript. CoRR abs/1906.11507 (2019) - [i2]Musard Balliu, Mads Dam, Roberto Guanciale:
InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis. CoRR abs/1911.00868 (2019) - 2018
- [c10]Iulia Bastys, Musard Balliu, Andrei Sabelfeld:
If This Then What?: Controlling Flows in IoT Apps. CCS 2018: 1102-1119 - 2017
- [j2]Raúl Pardo, Musard Balliu, Gerardo Schneider:
Formalising privacy policies in social networks. J. Log. Algebraic Methods Program. 90: 125-157 (2017) - [c9]Musard Balliu, Daniel Schoepe, Andrei Sabelfeld:
We Are Family: Relating Information-Flow Trackers. ESORICS (1) 2017: 124-145 - 2016
- [c8]Musard Balliu, Benjamin Liebe, Daniel Schoepe, Andrei Sabelfeld:
JSLINQ: Building Secure Applications across Tiers. CODASPY 2016: 307-318 - [c7]Daniel Schoepe, Musard Balliu, Frank Piessens, Andrei Sabelfeld:
Let's Face It: Faceted Values for Taint Tracking. ESORICS (1) 2016: 561-580 - [c6]Daniel Schoepe, Musard Balliu, Benjamin C. Pierce, Andrei Sabelfeld:
Explicit Secrecy: A Policy for Taint Tracking. EuroS&P 2016: 15-30 - 2014
- [b1]Musard Balliu:
Logics for Information Flow Security:From Specification to Verification. Royal Institute of Technology, Stockholm, Sweden, 2014 - [c5]Musard Balliu, Mads Dam, Roberto Guanciale:
Automating Information Flow Analysis of Low Level Code. CCS 2014: 1080-1091 - 2013
- [c4]Musard Balliu:
A Logic for Information Flow Analysis of Distributed Programs. NordSec 2013: 84-99 - 2012
- [c3]Musard Balliu, Mads Dam, Gurvan Le Guernic:
ENCoVer: Symbolic Exploration for Information Flow Security. CSF 2012: 30-44 - [i1]Musard Balliu, Mads Dam, Gurvan Le Guernic:
Epistemic Temporal Logic for Information Flow Security. CoRR abs/1208.6106 (2012) - 2011
- [c2]Musard Balliu, Mads Dam, Gurvan Le Guernic:
Epistemic temporal logic for information flow security. PLAS 2011: 6 - 2010
- [j1]Musard Balliu, Isabella Mastroeni:
A Weakest Precondition Approach to Robustness. Trans. Comput. Sci. 10: 261-297 (2010)
2000 – 2009
- 2009
- [c1]Musard Balliu, Isabella Mastroeni:
A weakest precondition approach to active attacks analysis. PLAS 2009: 59-71
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint