JSFlow: Tracking information flow in JavaScript and its APIs D Hedin, A Birgisson, L Bello, A Sabelfeld Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1663-1671, 2014 | 248 | 2014 |
Macaroons: Cookies with contextual caveats for decentralized authorization in the cloud A Birgisson, JG Politz, U Erlingsson, A Taly, M Vrable, M Lentczner | 156 | 2014 |
Methods and systems of generating and using authentication credentials for decentralized authorization in the cloud A Taly, U Erlingsson, A Birgisson, JG Politz, M Lentczner US Patent 9,397,990, 2016 | 82 | 2016 |
Local device authentication A Birgisson, Y Gutnik, B Zhu, V Buka, JR Ederle, A Semenov, ML Jacoby, ... US Patent App. 15/392,316, 2017 | 79 | 2017 |
Unifying facets of information integrity A Birgisson, A Russo, A Sabelfeld International Conference on Information Systems Security, 48-65, 2010 | 45 | 2010 |
Enforcing authorization policies using transactional memory introspection A Birgisson, M Dhawan, U Erlingsson, V Ganapathy, L Iftode Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 45 | 2008 |
Boosting the permissiveness of dynamic information-flow tracking by testing A Birgisson, D Hedin, A Sabelfeld Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 39 | 2012 |
FIDO U2F Javascript API D Balfanz, A Birgisson, J Lang Methods 4, U2F, 2013 | 32 | 2013 |
Capabilities for information flow A Birgisson, A Russo, A Sabelfeld Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and …, 2011 | 23 | 2011 |
Rule formats for determinism and idempotence L Aceto, A Birgisson, A Ingolfsdottir, MR Mousavi, MA Reniers Science of Computer Programming 77 (7-8), 889-907, 2012 | 22 | 2012 |
Device access revocation A Birgisson, Y Gutnik US Patent 10,146,932, 2018 | 18 | 2018 |
Secure connections for low power devices A Birgisson, B Zhu, Y Gutnik US Patent App. 15/413,762, 2017 | 14 | 2017 |
Client to authenticator protocol (CTAP) C Brand, A Czeskis, J Ehrensvärd, MB Jones, A Kumar, R Lindemann, ... FIDO Alliance, 2019 | 10 | 2019 |
Multi-run security A Birgisson, A Sabelfeld Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011 | 8 | 2011 |
An implementation and semantics for transactional memory introspection in Haskell A Birgisson, U Erlingsson Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009 | 8 | 2009 |
Decompositional reasoning about the history of parallel processes L Aceto, A Birgisson, A Ingolfsdottir, MR Mousavi Fundamentals of Software Engineering: 4th IPM International Conference, FSEN …, 2012 | 7 | 2012 |
JSFlow D Hedin, A Birgisson, L Bello, A Sabelfeld Software release. Located at http://chalmerslbs. bitbucket. org/jsflow, 2013 | 5 | 2013 |
FIDO 2.0: Web API for accessing FIDO 2.0 credentials H Le Van Gong, D Balfanz, A Czeskis, A Birgisson, J Hodges World Wide Web Consortium (W3C) Member Submission, 2015 | 4 | 2015 |
Position Paper: Differential Privacy with Information Flow Control A Birgisson, M Abadi, F McSherry PLAS 2011, 2011 | 4* | 2011 |
Immersion through headtracking A Birgisson, B Kristjansson Unpublished student report. Retrieved from the Internet: http://www. hvergi …, 2008 | 2 | 2008 |