Interface-confinement is a common mechanism that secures untrusted code by executing it inside a sandbox. The sandbox limits (confines) the code’s interaction with key system resources to a restricted set of interfaces. This practice is seen in web browsers, hypervisors, and other security-critical systems. Motivated by these systems, we present a program logic, called System M, for modeling and proving safety properties of systems that execute adversary-supplied code via interface-confinement. In addition to using computation types to specify effects of computations, System M includes a novel invariant type to specify the properties of interface-confined code. The interpretation of invariant type includes terms whose effects satisfy an inv...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Abstract. Proof-carrying code (PCC) allows a code producer to asso-ciate to a program a machine-chec...
International audienceAssembly-level protection mechanisms (virtual memory, trusted execution enviro...
<p>Interface-confinement is a common mechanism that secures untrusted code by executing it inside a ...
Abstract—Interface-confinement is a common mechanism that secures untrusted code by executing it ins...
Abstract—Interface-confinement is a common mechanism that secures untrusted code by executing it ins...
We present a logic for reasoning about properties of secure systems. The logic is built around a con...
We present a logic for reasoning about properties of se-cure systems. The logic is built around a co...
This paper presents a formal framework for compositional reasoning about secure systems. A key insig...
AbstractThis paper presents a formal framework for compositional reasoning about secure systems. A k...
Abstract—This paper presents a formal framework for compositional reasoning about secure systems. A ...
Modern-day imperative programming languages such as C++, C# and Java offer protection facilities suc...
Programming has changed; programming languages have not. Modern software embraced reusable software ...
International audienceCompartmentalization is good security-engineering practice. By breaking a larg...
International audienceMobile programs, like applets, are not only ubiquitous but also potentially ma...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Abstract. Proof-carrying code (PCC) allows a code producer to asso-ciate to a program a machine-chec...
International audienceAssembly-level protection mechanisms (virtual memory, trusted execution enviro...
<p>Interface-confinement is a common mechanism that secures untrusted code by executing it inside a ...
Abstract—Interface-confinement is a common mechanism that secures untrusted code by executing it ins...
Abstract—Interface-confinement is a common mechanism that secures untrusted code by executing it ins...
We present a logic for reasoning about properties of secure systems. The logic is built around a con...
We present a logic for reasoning about properties of se-cure systems. The logic is built around a co...
This paper presents a formal framework for compositional reasoning about secure systems. A key insig...
AbstractThis paper presents a formal framework for compositional reasoning about secure systems. A k...
Abstract—This paper presents a formal framework for compositional reasoning about secure systems. A ...
Modern-day imperative programming languages such as C++, C# and Java offer protection facilities suc...
Programming has changed; programming languages have not. Modern software embraced reusable software ...
International audienceCompartmentalization is good security-engineering practice. By breaking a larg...
International audienceMobile programs, like applets, are not only ubiquitous but also potentially ma...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Abstract. Proof-carrying code (PCC) allows a code producer to asso-ciate to a program a machine-chec...
International audienceAssembly-level protection mechanisms (virtual memory, trusted execution enviro...