M. Abadi, Protection in programming-language translations, ICALP, pp.868-883, 1998.

M. Abadi and G. D. Plotkin, On protection by layout randomization, IEEE CSF, pp.337-351, 2010.

M. Abadi, C. Fournet, and G. Gonthier, Secure Implementation of Channel Abstractions, Information and Computation, vol.174, issue.1, pp.37-83, 2002.
DOI : 10.1006/inco.2002.3086

R. Agten, B. Strackx, F. Jacobs, and . Piessens, Secure Compilation to Modern Processors, 2012 IEEE 25th Computer Security Foundations Symposium, pp.171-185, 2012.
DOI : 10.1109/CSF.2012.12

A. Ahmed and M. Blume, Typed closure conversion preserves observational equivalence, ICFP, 2008.
DOI : 10.1145/1411203.1411227

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.326

. Caja, Attack vectors for privilege escalation, 2012.

E. Cooper, S. Lindley, P. Wadler, and J. Yallop, Links: Web Programming Without Tiers, FMCO, 2006.
DOI : 10.1007/978-3-540-74792-5_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.167.3825

L. De-moura and N. Bjørner, Z3: An Efficient SMT Solver, TACAS, 2008.
DOI : 10.1007/978-3-540-78800-3_24

A. Guha, C. Saftoiu, and S. Krishnamurthi, The Essence of JavaScript, ECOOP, 2010.
DOI : 10.1007/978-3-642-14107-2_7

A. Kennedy, Securing the .NET programming model, Theoretical Computer Science, vol.364, issue.3, 2006.
DOI : 10.1016/j.tcs.2006.08.014

S. Lassen, Eager Normal Form Bisimulation, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), 2005.
DOI : 10.1109/LICS.2005.15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.2914

S. Maffeis, J. C. Mitchell, and A. Taly, An Operational Semantics for JavaScript, APLAS, 2008.
DOI : 10.1007/11601524_11

J. Mccarthy, Towards a Mathematical Science of Computation, IFIP Congress, pp.21-28, 1962.
DOI : 10.1007/978-94-011-1793-7_2

L. A. Meyerovich and V. B. Livshits, ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.36

J. C. Mitchell, On abstraction and the expressive power of programming languages, Science of Computer Programming, vol.21, issue.2, pp.141-163, 1993.
DOI : 10.1016/0167-6423(93)90004-9

J. H. Morris, Protection in programming languages, Communications of the ACM, vol.16, issue.1, 1973.
DOI : 10.1145/361932.361937

J. Politz, M. Carroll, B. Lerner, J. Pombrio, and S. Krishnamurthi, A tested semantics for getters, setters, and eval in JavaScript, Proceedings of the 8th symposium on Dynamic languages, DLS '12, 2012.
DOI : 10.1145/2384577.2384579

C. Schlesinger and N. Swamy, Verification condition generation with the Dijkstra state monad, 2012.

M. Serrano, E. Gallesio, and F. Loitsch, Hop, Companion to the 21st ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications , OOPSLA '06, pp.975-985, 2006.
DOI : 10.1145/1176617.1176756

URL : https://hal.archives-ouvertes.fr/hal-00498507

E. Sumii and B. C. Pierce, A bisimulation for type abstraction and recursion, POPL, 2005.

N. Swamy, J. Chen, C. Fournet, P. Strub, K. Bhargavan et al., Secure distributed programming with value-dependent types, ICFP, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00939188

N. Swamy, J. Weinberger, C. Schlesinger, J. Chen, and B. Livshits, Towards JavaScript verification with the Dijkstra state monad, 2012.

A. Taly, U. Erlingsson, J. C. Mitchell, M. S. Miller, and J. Nagra, Automated Analysis of Security-Critical JavaScript APIs, 2011 IEEE Symposium on Security and Privacy, 2011.
DOI : 10.1109/SP.2011.39