Many software systems adopt isolation mechanisms of modern processors as software security building blocks. Reasoning about these building blocks means reasoning about elaborate assembly code, which can be very complex due to the loose structure of the code. A way to overcome this complexity is giving the code a more structured semantics. This paper presents one such semantics, namely a fully abstract trace semantics, for an assembly language enhanced with protection mechanisms of modern processors. The trace semantics represents the behaviour of protected assembly code with simple abstractions, unburdened by low-level details, at the maximum degree of precision. Additionally, it captures the capabilities of attackers to protected software ...
AbstractWe propose a method to analyze secure information flow in stack-based assembly languages, co...
Abstract. Non-interference is a desirable property of systems in a multilevel security architecture,...
International audienceGood programming languages provide helpful abstractions for writing secure cod...
Many software systems adopt isolation mechanisms of modern processors as software security building ...
Many software systems adopt isolation mechanisms of modern processors as software security building ...
Many software systems adopt isolation mechanisms of mod-ern processors as software security building...
Many software systems adopt isolation mechanisms of modern processors as software security building ...
Protected module architectures (PMA) are an isolation mechanism that emerg-ing processors provide as...
Fine-grained program counter-based memory access control mechanisms can be used to enhance low-level...
Fine-grained program counter-based memory access control mechanisms can be used to enhance low-level...
A fully abstract compiler prevents security features of the source language from being bypassed by a...
This paper presents an approach to analyze stack-based assembly code with respect to leakages of pri...
Modern-day imperative programming languages such as C++, C# and Java offer protection facilities suc...
© 2016 IEEE. Secure compilation studies compilers that generate target-level components that are as ...
We present a secure (fully abstract) compilation scheme to compile a high-level language to low-leve...
AbstractWe propose a method to analyze secure information flow in stack-based assembly languages, co...
Abstract. Non-interference is a desirable property of systems in a multilevel security architecture,...
International audienceGood programming languages provide helpful abstractions for writing secure cod...
Many software systems adopt isolation mechanisms of modern processors as software security building ...
Many software systems adopt isolation mechanisms of modern processors as software security building ...
Many software systems adopt isolation mechanisms of mod-ern processors as software security building...
Many software systems adopt isolation mechanisms of modern processors as software security building ...
Protected module architectures (PMA) are an isolation mechanism that emerg-ing processors provide as...
Fine-grained program counter-based memory access control mechanisms can be used to enhance low-level...
Fine-grained program counter-based memory access control mechanisms can be used to enhance low-level...
A fully abstract compiler prevents security features of the source language from being bypassed by a...
This paper presents an approach to analyze stack-based assembly code with respect to leakages of pri...
Modern-day imperative programming languages such as C++, C# and Java offer protection facilities suc...
© 2016 IEEE. Secure compilation studies compilers that generate target-level components that are as ...
We present a secure (fully abstract) compilation scheme to compile a high-level language to low-leve...
AbstractWe propose a method to analyze secure information flow in stack-based assembly languages, co...
Abstract. Non-interference is a desirable property of systems in a multilevel security architecture,...
International audienceGood programming languages provide helpful abstractions for writing secure cod...