| 2007 |  |  |  |  | 
          
            | R. Amadio |  | A synchronous pi-calculus |  | Information and Computation | 
          
            | R. Amadio, F. Dabrowski |  | Feasible reactivity in a synchronous pi-calculus |  | PPDP'07 | 
	  
            | G. Barthe, D. Pichardie, T. Rezk |  | A certified lightweight non-interference Java bytecode verifier |  | ESOP'07 | 
	  
            | G. Barthe, T. Rezk, A. Russo, A. Sabelfeld |  | Security of multithreaded programs by compilation |  | ESORICS'07 | 
	  
	    | G. Boudol, M. Kolundzija |  | Access control and declassification |  | MMM-ACNS07 | 
	  
	    | G. Boudol |  | Fair cooperative multithreading |  | CONCUR'07 | 
          
            | I. Castellani |  | State-oriented noninterference for CCS |  | SecCo'07 | 
          
            | S. Crafa, D. Varacca, N. Yoshida |  | Event Structure Semantics for the Internal pi-calculus |  | CONCUR'07 | 
          
            | G. Le Guernic |  | Automaton-based confidentiality monitoring of concurrent programs |  | CSFS20 | 
          
            | M. Huisman, C. Hurlin |  | The stability problem for verification of concurrent object-oriented programs |  | VAMP'07 | 
	  	  
            | M. Huisman and G. Petri |  | The Java memory model: a formal explanation |  | VAMP'07 | 
          
            | D. Varacca, N. Yoshida |  | Probabilistic pi-calculus and Event Structures |  | QAPL'07 | 
          
  	  | 2008 |  |  |  |  | 
          
            | R. Amadio, M. Dogguy |  | Determinacy in a synchronous pi-calculus |  | CUP | 
          
            | R. Amadio |  | On convergence-sensitive bisimulation and the embedding of CCS in timed CCS |  | EXPRESS 08 | 
          
            | R. Amadio, M. Dogguy |  | On affine usages in signal-based communication |  | APLAS 08 | 
          
            | G. Barthe, S. Cavadini, T. Rezk |  | Tractable Enforcement of Declassification Policies |  | CSF 08 | 
          
            | F. Besson, G. Dufay, T. Jensen, D. Pichardie |  | Verifying resource access control on mobile interactive devices |  | JCS | 
	
          | G. Boudol |  | Secure information flow as a safety property |  | FAST'08 | 
          
            | F. Boussinot, F. Dabrowski |  | Safe reactive programming: the FunLoft proposal |  | MULTIPROG | 
          
            | M. Dezani-Ciancaglini, S. Ghilezan, J. Pantovic, D. Varacca |  | Security types for dynamic web data |  | TCS | 
          
            | C. Fournet, T. Rezk |  | Cryptographically sound implementations for typed information-flow |  | POPL'08 | 
	  
	    | C. Haack, C. Hurlin |  | Separation logic contracts for a Java-like language with fork/join |  | AMAST'08 | 
	  
	    | C. Haack, C. Hurlin |  | Resource usage protocols for iterators |  | IWACO'08 | 
	  
	    | C. Haack, M. Huisman, C. Hurlin |  | Reasoning about Java's Reentrant Locks |  | APLAS'08 | 
          
            | A. Hobor, A. Appel, F. Zappa Nardelli |  | Oracle semantics for concurrent separation logic |  | ESOP'08 | 
          
            | L. Hubert, T. Jensen, D. Pichardie |  | Semantic Foundations and Inference of Non-null Annotations |  | FMOODS'08 | 
          
            | D. Pichardie |  | Building certified static analysers by modular construction of well-founded lattices |  | FICS 08 | 
	  
       	    | 2009 |  |  |  |  | 
          
            | J. Alglave, A. Fox, S. Isthiaq, M. Myreen, S. Sarkar, P. Sewell, F. Zappa Nardelli |  | The semantics of Power and Arm multiprocessor machine code |  | DAMP'09 | 
          
            | R. Amadio |  | On stratified regions |  | APLAS'09 | 
          
            | R. Amadio, P. Baillot, A. Madet |  | An affine-intuitionistic system of types and effects: confluence and termination |  | Tech. rep. | 
          
            | G.Barthe, B.Gregoire, C.Kunz, T.Rezk |  | Certificate Translation for Optimizing Compilers |  | TOPLAS | 
          
            | F. Besson, D. Cachera, T. Jensen, D. Pichardie |  | Certified Static Analysis by Abstract Interpretation |  | FOSAD'09 | 
	  
            | G. Boudol |  | A Deadlock-Free Semnatics for Shared Memory Concurrency |  | ICTAC'09 | 
	  
            | G. Boudol, G. Petri |  | Relaxed Memory Models: an Operational Approach |  | POPL'09 | 
          
            | G. Castagna, L. Padovani |  | Contracts for Mobile Processes |  | CONCUR'09 | 
          
            | F. Dabrowski, D. Pichardie |  | A Certified Data Race Analysis for a Java-like Language |  | TPHOLs'09 | 
          
            | C.Fournet, G.Le Guernic,T.Rezk |  | A Security-Preserving Compiler for Distributed Programs |  | CCS | 
	  
	    | C. Hurlin |  | Specifying and Checking Protocols of Multithreaded Classes |  | SAC'09 | 
    
          
            | S. Sarkar, P. Sewell, F. Zappa Nardelli, S. Owens, T. Ridge, T. Braibant, M. Myreen, J. Alglave |  | The semantics of x86-CC multiprocessor machine code |  | POPL'09 | 
          
            | F. Zappa Nardelli, P. Sewell, J. Sevcik, S. Sarkar, S. Owens, L. Maranget, M. Batty, J. Alglave |  | Relaxed Memory Models must be Rigorous |  | EC^2'09 | 
	  
       	    | 2010 |  |  |  |  | 
          
            | J. Alglave, L. Maranget, P. Sewell, S. Sarkar |  | Fences in Weak Memory Models |  | CAV 10 | 
 
          
            | G. Barthe, A. Hevia, Z. Luo, T. Rezk, B. Warinschi |  | Robust Guarantees for Anonymity |  | CSF 10 | 
 
          
            | G. Boudol |  | Typing termination in a higher-order concurrent imperative language |  | Information and Computation 208 | 
 
          
            | G.Boudol,Z.Luo, T.Rezk, M.Serrano |  | Towards Reasoning for Web Applications: An Operational Semantics for Hop |  | APLWACA | 
	  
            | G. Boudol, G. Petri |  | A theory of speculative computations |  | ESOP 2010 | 
          
            | S.Capecchi, I.Castellani, M.Dezani-Ciacaglini, T.Rezk |  | Session Types for Access and Information Flow Control |  | CONCUR | 
          
            | M. Dogguy, S. Glondu, S. Le Gall, S. Zacchiroli |  | Enforcing type-safe linking using inter-package relationships |  | JFLA'10 | 
	  
            | L. Hubert, T. Jensen, V. Monfort, D. Pichardie. |  | Enforcing secure object initialization in Java |  | ESORICS 2010 | 
          
            | T. Wrigstad, F. Zappa Nardelli, S. Lebresne, J. Ostlund, J. Vitek |  | Integrating Typed and Untyped Code in a Scripting Language |  | POPL'10 | 
          
  	  | 2011 |  |  |  |  | 
          
            | J. Sevcik, V. Vafeiadis, F. Zappa Nardelli, S. Jagannathan, P. Sewell |  | Relaxed-Memory Concurrency and Verified Compilation |  | POPL'11 |