Hails: Protecting data privacy in untrusted web applications

DB Giffin, A Levy, D Stefan, D Terei… - … USENIX Symposium on …, 2012 - usenix.org
Modern extensible web platforms like Facebook and Yammer depend on third-party
software to offer a rich experience to their users. Unfortunately, users running a third-party …

Protecting Users by Confining {JavaScript} with {COWL}

D Stefan, EZ Yang, P Marchenko, A Russo… - … USENIX Symposium on …, 2014 - usenix.org
Modern web applications are conglomerations of JavaScript written by multiple authors:
application developers routinely incorporate code from third-party libraries, and mashup …

Preventing accidental data disclosure in modern operating systems

A Nadkarni, W Enck - Proceedings of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
Modern OSes such as Android, iOS, and Windows 8 have changed the way consumers
interact with computing devices. Tasks are often completed by stringing together a collection …

HLIO: Mixing static and dynamic typing for information-flow control in Haskell

P Buiras, D Vytiniotis, A Russo - Proceedings of the 20th ACM SIGPLAN …, 2015 - dl.acm.org
Information-Flow Control (IFC) is a well-established approach for allowing untrusted code to
manipulate sensitive data without disclosing it. IFC is typically enforced via type systems and …

A verified information-flow architecture

A Azevedo de Amorim, N Collins, A DeHon… - Proceedings of the 41st …, 2014 - dl.acm.org
SAFE is a clean-slate design for a highly secure computer system, with pervasive
mechanisms for tracking and limiting information flows. At the lowest level, the SAFE …

Coverage guided, property based testing

L Lampropoulos, M Hicks, BC Pierce - Proceedings of the ACM on …, 2019 - dl.acm.org
Property-based random testing, exemplified by frameworks such as Haskell's QuickCheck,
works by testing an executable predicate (a property) on a stream of randomly generated …

Expressing information flow properties

E Kozyri, S Chong, AC Myers - Foundations and Trends® in …, 2022 - nowpublishers.com
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …

LWeb: Information flow security for multi-tier web applications

J Parker, N Vazou, M Hicks - Proceedings of the ACM on Programming …, 2019 - dl.acm.org
This paper presents LWeb, a framework for enforcing label-based, information flow policies
in database-using web applications. In a nutshell, LWeb marries the LIO Haskell IFC …

Functional pearl: two can keep a secret, if one of them uses Haskell

A Russo - ACM SIGPLAN Notices, 2015 - dl.acm.org
For several decades, researchers from different communities have independently focused
on protecting confidentiality of data. Two distinct technologies have emerged for such …

Secure synthesis of distributed cryptographic applications (technical report)

C Acay, J Gancher, R Recto, AC Myers - arXiv preprint arXiv:2401.04131, 2024 - arxiv.org
Developing secure distributed systems is difficult, and even harder when advanced
cryptography must be used to achieve security goals. Following prior work, we advocate …