Nataliia Bielova
Nataliia Bielova
Permanent Researcher (CRCN) at Inria, @nataliabielova
Verified email at - Homepage
Cited by
Cited by
Reactive non-interference for a browser model
N Bielova, D Devriese, F Massacci, F Piessens
2011 5th International Conference on Network and System Security, 97-104, 2011
Crying wolf? on the price discrimination of online airline tickets
T Vissers, N Nikiforakis, N Bielova, W Joosen
7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2014), 2014
Survey on JavaScript security policies and their enforcement mechanisms in a web browser
N Bielova
The Journal of Logic and Algebraic Programming 82 (8), 243-262, 2013
Do you really mean what you actually enforced?
N Bielova, F Massacci
International Journal of Information Security 10 (4), 239-254, 2011
A taxonomy of information flow monitors
N Bielova, T Rezk
International Conference on Principles of Security and Trust, 46-67, 2016
Predictability of enforcement
N Bielova, F Massacci
International Symposium on Engineering Secure Software and Systems, 73-86, 2011
Hybrid information flow monitoring against web tracking
F Besson, N Bielova, T Jensen
2013 IEEE 26th Computer Security Foundations Symposium, 240-254, 2013
Matching in security-by-contract for mobile code
N Bielova, N Dragoni, F Massacci, K Naliuka, I Siahaan
The Journal of Logic and Algebraic Programming 78 (5), 340-358, 2009
Browser fingerprinting: A survey
P Laperdrix, N Bielova, B Baudry, G Avoine
ACM Transactions on the Web (TWEB) 14 (2), 1-33, 2020
Do Cookie Banners Respect my Choice?: Measuring Legal Compliance of Banners from IAB Europe’s Transparency and Consent Framework
C Matte, N Bielova, C Santos
2020 IEEE Symposium on Security and Privacy (SP), 791-809, 2020
To extend or not to extend: on the uniqueness of browser extensions and web logins
GG Gulyas, DF Some, N Bielova, C Castelluccia
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 14-27, 2018
Towards practical enforcement theories
N Bielova, F Massacci, A Micheletti
Nordic Conference on Secure IT Systems, 239-254, 2009
Missed by filter lists: Detecting unknown third-party trackers with invisible pixels
N Bielova, A Legout, N Sarafijanovic-Djukic
Proceedings on Privacy Enhancing Technologies 2020 (2), 499-518, 2020
On the content security policy violations due to the same-origin policy
DF Some, N Bielova, T Rezk
Proceedings of the 26th International Conference on World Wide Web, 877-886, 2017
Spot the difference: Secure multi-execution and multiple facets
N Bielova, T Rezk
European Symposium on Research in Computer Security, 501-519, 2016
Iterative enforcement by suppression: Towards practical enforcement theories
N Bielova, F Massacci
Journal of Computer Security 20 (1), 51-79, 2012
Matching policies with security claims of mobile applications
N Bielova, M Dalla Torre, N Dragoni, I Siahaan
2008 Third International Conference on Availability, Reliability and …, 2008
Hybrid monitoring of attacker knowledge
F Besson, N Bielova, T Jensen
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 225-238, 2016
Browser randomisation against fingerprinting: A quantitative information flow approach
F Besson, N Bielova, T Jensen
Nordic Conference on Secure IT Systems, 181-196, 2014
ROBERT: ROBust and privacy-presERving proximity Tracing
C Castelluccia, N Bielova, A Boutet, M Cunche, C Lauradoux, ...
The system can't perform the operation now. Try again later.
Articles 1–20