Refinement types for secure implementations J Bengtson, K Bhargavan, C Fournet, AD Gordon, S Maffeis ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (2), 1-45, 2011 | 323 | 2011 |
An operational semantics for JavaScript S Maffeis, JC Mitchell, A Taly Programming Languages and Systems: 6th Asian Symposium, APLAS 2008 …, 2008 | 228 | 2008 |
Discovering concrete attacks on website authorization by formal analysis C Bansal, K Bhargavan, A Delignat-Lavaud, S Maffeis Journal of Computer Security 22 (4), 601-657, 2014 | 212 | 2014 |
A trusted mechanised JavaScript specification M Bodin, A Charguéraud, D Filaretti, P Gardner, S Maffeis, ... Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of …, 2014 | 169 | 2014 |
Object capabilities and isolation of untrusted web applications S Maffeis, JC Mitchell, A Taly 2010 IEEE Symposium on Security and Privacy, 125-140, 2010 | 157 | 2010 |
On the expressive power of polyadic synchronisation in pi-calculus M Carbone, S Maffeis Nord. J. Comput. 10 (2), 70-98, 2003 | 141 | 2003 |
Towards a program logic for JavaScript PA Gardner, S Maffeis, GD Smith Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2012 | 140 | 2012 |
Language-based isolation of untrusted Javascript S Maffeis, A Taly 2009 22nd IEEE Computer Security Foundations Symposium, 77-91, 2009 | 134 | 2009 |
Isolating JavaScript with filters, rewriting, and wrappers S Maffeis, JC Mitchell, A Taly Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 98 | 2009 |
A type discipline for authorization in distributed systems C Fournet, A Gordon, S Maffeis 20th IEEE Computer Security Foundations Symposium (CSF'07), 31-48, 2007 | 93 | 2007 |
A type discipline for authorization policies C Fournet, AD Gordon, S Maffeis European Symposium on Programming, 141-156, 2005 | 75 | 2005 |
An executable formal semantics of PHP D Filaretti, S Maffeis ECOOP 2014–Object-Oriented Programming: 28th European Conference, Uppsala …, 2014 | 73 | 2014 |
Vulberta: Simplified source code pre-training for vulnerability detection H Hanif, S Maffeis 2022 International joint conference on neural networks (IJCNN), 1-8, 2022 | 66 | 2022 |
Modelling dynamic web data P Gardner, S Maffeis Theoretical Computer Science 342 (1), 104-131, 2005 | 57 | 2005 |
A type discipline for authorization policies C Fournet, AD Gordon, S Maffeis ACM Transactions on Programming Languages and Systems (TOPLAS) 29 (5), 25-es, 2007 | 56 | 2007 |
On the computational strength of pure ambient calculi S Maffeis, I Phillips Theoretical Computer Science 330 (3), 501-551, 2005 | 55 | 2005 |
Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage C Bansal, K Bhargavan, A Delignat-Lavaud, S Maffeis Principles of Security and Trust: Second International Conference, POST 2013 …, 2013 | 54 | 2013 |
Language-based defenses against untrusted browser origins K Bhargavan, A Delignat-Lavaud, S Maffeis 22nd USENIX Security Symposium (USENIX Security 13), 653-670, 2013 | 53 | 2013 |
Adversarial machine learning beyond the image domain G Zizzo, C Hankin, S Maffeis, K Jones Proceedings of the 56th Annual Design Automation Conference 2019, 1-4, 2019 | 41 | 2019 |
Run-time enforcement of secure javascript subsets S Maffeis, JC Mitchell, A Taly Proc of W2SP 9, 2009 | 31 | 2009 |