Sound reasoning about the behavior of programs relies on program execution adhering to the language semantics. However, in a distributed computation, when a value is sent from one party to another, the receiver faces the question of whether the value is well-traced: could it have been produced by a computation that respects the language semantics? If not, then accepting the non-well-traced value may invalidate the receiver’s reasoning, leading to bugs or vulnerabilities. Proof-Carrying Data (PCD) is a recently-introduced cryptographic mechanism that allows messages in a distributed computation to be accompanied by proof that the message and the history leading to it complies with a specified predicate. Using PCD, a verifier can be convinced...
In distributed proof construction systems, information release policies can make it unlikely that an...
Inference rules are derived for proving partial correctness of concurrent programs that use message...
Abstract: Proof-carrying code approaches aim at the safe execution of untrusted code by having the c...
In this paper, we present an infrastructure for securing distributed computations between hosts, usi...
We design a core language of principals running distributed programs over a public network. Our lang...
AbstractThis paper presents a method for mechanically proving the soundness of a programming logic f...
Abstract. We are interested in computationally sound implementations for languages of distributed co...
Trustworthy computing systems must provide data confidentiality and data integrity, and must be ava...
Our project applies automated proof checking to two application domains: protecting host computers f...
What is the best way to build programs that compute with data sources controlled by multiple princip...
This paper presents a general framework for specification and detection of properties in distributed...
150 pagesModern software systems today have increasingly complex security requirements – such as sup...
In this paper we consider the verification and certification of computations that are done remotely....
In distributed proof construction systems, information release policies can make it unlikely that an...
Abstract. Proof-Carrying Code (PCC) is a general approach to mobile code safety in which programs ar...
In distributed proof construction systems, information release policies can make it unlikely that an...
Inference rules are derived for proving partial correctness of concurrent programs that use message...
Abstract: Proof-carrying code approaches aim at the safe execution of untrusted code by having the c...
In this paper, we present an infrastructure for securing distributed computations between hosts, usi...
We design a core language of principals running distributed programs over a public network. Our lang...
AbstractThis paper presents a method for mechanically proving the soundness of a programming logic f...
Abstract. We are interested in computationally sound implementations for languages of distributed co...
Trustworthy computing systems must provide data confidentiality and data integrity, and must be ava...
Our project applies automated proof checking to two application domains: protecting host computers f...
What is the best way to build programs that compute with data sources controlled by multiple princip...
This paper presents a general framework for specification and detection of properties in distributed...
150 pagesModern software systems today have increasingly complex security requirements – such as sup...
In this paper we consider the verification and certification of computations that are done remotely....
In distributed proof construction systems, information release policies can make it unlikely that an...
Abstract. Proof-Carrying Code (PCC) is a general approach to mobile code safety in which programs ar...
In distributed proof construction systems, information release policies can make it unlikely that an...
Inference rules are derived for proving partial correctness of concurrent programs that use message...
Abstract: Proof-carrying code approaches aim at the safe execution of untrusted code by having the c...