Modern-day imperative programming languages such as C++, C# and Java offer protection facilities such as abstract data types, field access modifiers, and module systems. Such abstractions were mainly designed to enforce software engineering principles such as information hiding and encapsulation, but they can also be used to enforce security properties of programs. Unfortunately, these source-level security properties are typically lost during compilation to low-level machine code. For instance, access to private instance fields is restricted by the programming language's type system at the source-code level, but such restrictions are not in place at the assembly level. This can leave a software module vulnerable to attacks at the assembly ...
Capability machines such as CHERI provide memory capabilities that can be used by compilers to provi...
Secure compilers generate compiled code that withstands many target-level attacks such as alteration...
AbstractSemantics preservation between source and target program is the commonly accepted minimum re...
Modern-day imperative programming languages such as C++, C# and Java offer protection facilities suc...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
A fully abstract compilation scheme prevents the security features of the high-level language from b...
Secure compilation is an emerging field that puts together advances in security, programming languag...
Software is pervasive in our daily lives and we rely on it for many critical tasks. Despite the abun...
Modern programming languages provide helpful high-level abstractions and mechanisms (e.g. types, mod...
© 2016 IEEE. Secure compilation studies compilers that generate target-level components that are as ...
Our society has been growingly dependent on computer systems and this tendency will not slow down in...
—Good programming languages provide helpful abstractions for writing secure code, but the security p...
Severe low-level vulnerabilities abound in today's computer systems,allowing cyber-attackers to remo...
We propose a new formal criterion for secure compilation, giving strong end-to-end security guarante...
International audienceCompartmentalization is good security-engineering practice. By breaking a larg...
Capability machines such as CHERI provide memory capabilities that can be used by compilers to provi...
Secure compilers generate compiled code that withstands many target-level attacks such as alteration...
AbstractSemantics preservation between source and target program is the commonly accepted minimum re...
Modern-day imperative programming languages such as C++, C# and Java offer protection facilities suc...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
A fully abstract compilation scheme prevents the security features of the high-level language from b...
Secure compilation is an emerging field that puts together advances in security, programming languag...
Software is pervasive in our daily lives and we rely on it for many critical tasks. Despite the abun...
Modern programming languages provide helpful high-level abstractions and mechanisms (e.g. types, mod...
© 2016 IEEE. Secure compilation studies compilers that generate target-level components that are as ...
Our society has been growingly dependent on computer systems and this tendency will not slow down in...
—Good programming languages provide helpful abstractions for writing secure code, but the security p...
Severe low-level vulnerabilities abound in today's computer systems,allowing cyber-attackers to remo...
We propose a new formal criterion for secure compilation, giving strong end-to-end security guarante...
International audienceCompartmentalization is good security-engineering practice. By breaking a larg...
Capability machines such as CHERI provide memory capabilities that can be used by compilers to provi...
Secure compilers generate compiled code that withstands many target-level attacks such as alteration...
AbstractSemantics preservation between source and target program is the commonly accepted minimum re...