Papers, specs & tech reports

A chronological record of work in browser security, web policy, and program verification — from grad-school proofs to deployed standards. Most pieces are co-authored; my collaborators do the heavy lifting.

  1. 2016

    A Week to Remember: The Impact of Browser Warning Storage Policies

    SOUPS · Joel Weinberger and Adrienne Felt

    PDF
  2. 2016
  3. 2013

    Verifying Higher-order Programs with the Dijkstra Monad

    Programming Language Design and Implementation (PLDI) · Nikhil Swamy, Joel Weinberger, Cole Schlesinger, Juan Chen, and Ben Livshits

    PDF
  4. 2012

    Monadic Refinement Types for Verifying JavaScript Programs

    Microsoft Research Technical Report · Nikhil Swamy, Joel Weinberger, Juan Chen, Ben Livshits, and Cole Schlesinger

    PDF
  5. 2012

    Thesis: Analysis and Enforcement of Web Application Security Policies

    University of California, Berkeley, Thesis

    PDF
  6. 2011

    Diesel: Applying Privilege Separation to Database Access

    ACM Symposium on Information, Computer and Communications Security (ASIACCS) · Adrienne Felt, Matthew Finifter, Joel Weinberger, and David Wagner

    PDF
  7. 2011

    Towards Client-side HTML Security Policies

    the Workshop on Hot Topics in Security (HotSec) · Joel Weinberger, Adam Barth, and Dawn Song

    PDF
  8. 2011

    A Systematic Analysis of XSS Sanitization in Web Application Frameworks

    16th European Symposium on Research in Computer Security (ESORICS) · Joel Weinberger, Prateek Saxena, Devdatta Akhawe, Matthew Finifter, and Dawn Song

    PDF
  9. 2010

    Preventing Capability Leaks in Secure JavaScript Subests

    Network and Distributed System Security Symposium (NDSS) · Matthew Finifter, Joel Weinberger, and Adam Barth

    PDF
  10. 2009

    Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense

    USENIX Security Symposium · Adam Barth, Joel Weinberger, and Dawn Song

    PDF
  11. 2007

    Composition with Consistent Updates for Abstract State Machines

    the International ASM Workshop · Colin Gordon, Leo Meyerovich, Joel Weinberger, and Shriram Krishnamurthi

    PDF
  12. 2006

    ASM Relational Transducer Security Policies

    Brown University Technical Report CS-06-12 · Leo Meyerovich, Joel Weinberger, Colin Gordon, and Shriram Krishnamurthi

    PDF