RECENT SCHOLAR PUBLICATIONS
- Secwasm: Information flow control for WebAssemblyI Bastys, M Algehed, A Sjsten, A SabelfeldInternational Static Analysis Symposium, 74-103 2022
- Principled Flow Tracking in IoT and Low-Level ApplicationsI BastysChalmers University of Technology 2022
- Automatic Annotation of Confidential Data in Java CodeI Bastys, P Bolignano, F Raimondi, D SchoepeInternational Symposium on Foundations and Practice of Security, 146-161 2021
- Clockwork: Tracking remote timing attacksI Bastys, M Balliu, T Rezk, A Sabelfeld2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 350-365 2020
- Securing iot appsM Balliu, I Bastys, A SabelfeldIEEE Security & Privacy 17 (5), 22-29 2019
- If this then what? Controlling flows in IoT appsI Bastys, M Balliu, A SabelfeldProceedings of the 2018 ACM SIGSAC conference on computer and communications 2018
- Prudent design principles for information flow controlI Bastys, F Piessens, A SabelfeldProceedings of the 13th Workshop on Programming Languages and Analysis for 2018
- A Principled Approach to Securing IoT AppsI BastysChalmers Tekniska Hogskola (Sweden) 2018
- Tracking Information Flow via Delayed Output: Addressing Privacy in IoT and Emailing AppsI Bastys, F Piessens, A SabelfeldSecure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway 2018
- Towards an Architecture for Pseudonymous E-Commerce-Applying Privacy by Design to Online ShoppingS Pape, D Tasche, I Bastys, A Grosz, J Lssig, K RannenbergGesellschaft fr Informatik eV 2018
- Type systems for information flow control: The question of granularityV Rajani, I Bastys, W Rafnsson, D GargACM SIGLOG News 4 (1), 6-21 2017
- Asymmetric secure multi-execution with declassificationI Boloşteanu, D GargInternational Conference on Principles of Security and Trust, 24-45 2016
- Asymmetric Secure Multi-ExecutionI BastysSaarland University 2016