Protecting the confidentiality of information manipulated by a computing system is one of the most important challenges facing today's cybersecurity community. Many complex systems, such as operating systems, hypervisors, web browsers, and distributed systems, require a user to trust that private information is properly isolated from other users. Real-world systems are full of bugs, however, so this assumption of trust is not reasonable. The goal of this dissertation is to apply formal methods to complex security-sensitive systems, in such a way that we can guarantee to users that these systems really are trustworthy. Unfortunately, there are numerous prohibitive challenges standing in the way of achieving this goal. One challenge is how to...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
We propose a new formal criterion for secure compilation, giving strong end-to-end security guarante...
It is common to prove by reasoning over source code that programs do not leak sensitive data. But do...
Security protocols, such as TLS or Kerberos, and security devices such as the Trusted Platform Modul...
Hardware support for isolated execution (such as Intel SGX) enables development of applications that...
SAFE is a clean-slate design for a highly secure computer system, with pervasive mechanisms for trac...
Hardware support for isolated execution (such as Intel SGX) enables development of applications that...
Security protocols, such as TLS or Kerberos, and security devices such as the Trusted Platform Modul...
AbstractWith today’s dissemination of embedded systems manipulating sensitive data, it has become im...
International audienceSAFE is a clean-slate design for a highly secure computer system, with pervasi...
International audienceSAFE is a clean-slate design for a highly secure computer system, with pervasi...
Severe low-level vulnerabilities abound in today's computer systems,allowing cyber-attackers to remo...
International audienceSAFE is a clean-slate design for a highly secure computer system, with pervasi...
In our increasingly computer-oriented society, the computer programs we rely on tend to increase in ...
Security protocols and APIs are difficult to specify and implement. Most of the time, for example fo...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
We propose a new formal criterion for secure compilation, giving strong end-to-end security guarante...
It is common to prove by reasoning over source code that programs do not leak sensitive data. But do...
Security protocols, such as TLS or Kerberos, and security devices such as the Trusted Platform Modul...
Hardware support for isolated execution (such as Intel SGX) enables development of applications that...
SAFE is a clean-slate design for a highly secure computer system, with pervasive mechanisms for trac...
Hardware support for isolated execution (such as Intel SGX) enables development of applications that...
Security protocols, such as TLS or Kerberos, and security devices such as the Trusted Platform Modul...
AbstractWith today’s dissemination of embedded systems manipulating sensitive data, it has become im...
International audienceSAFE is a clean-slate design for a highly secure computer system, with pervasi...
International audienceSAFE is a clean-slate design for a highly secure computer system, with pervasi...
Severe low-level vulnerabilities abound in today's computer systems,allowing cyber-attackers to remo...
International audienceSAFE is a clean-slate design for a highly secure computer system, with pervasi...
In our increasingly computer-oriented society, the computer programs we rely on tend to increase in ...
Security protocols and APIs are difficult to specify and implement. Most of the time, for example fo...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
We propose a new formal criterion for secure compilation, giving strong end-to-end security guarante...
It is common to prove by reasoning over source code that programs do not leak sensitive data. But do...