Software systems are growing ever larger. Early software systems were singular units developed by small teams of programmers writing in the same programming language. Modern software systems, on the other hand, consist of numerous interoperating components written by different teams and in different programming languages. While this more modular and diversified approach to software development has enabled us to build ever larger and more complex software systems, it has, however, made it harder to ensure the reliability and security of software systems. In this thesis we study and remedy the security flaws that arise when attempting to resolve the difference in abstractions between components written in high-level functional programming lan...
© 2016 IEEE. Secure compilation studies compilers that generate target-level components that are as ...
Language: English Existing skills or strong desire to learn: • formal verification in the Coq proof ...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...
Software systems are growing ever larger. Early software systems were singular units developed by sm...
Modern-day imperative programming languages such as C++, C# and Java offer protection facilities suc...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Many high-level functional programming languages provide programmers with the ability to interoperat...
A fully abstract compilation scheme prevents the security features of the high-level language from b...
Process-based separation has long been the prevalent model for providing security and isolation to p...
Fine-grained program counter-based memory access control mechanisms can be used to enhance low-level...
Software is pervasive in our daily lives and we rely on it for many critical tasks. Despite the abun...
An important objective for low-level software security research is to develop techniques that make i...
We present a secure (fully abstract) compilation scheme to compile a high-level language to low-leve...
Compilers are at the foundation of software security. On the one hand, compilers are an ideal place ...
To counter man-at-the-end attacks such as reverse engineering and tampering, software is often prote...
© 2016 IEEE. Secure compilation studies compilers that generate target-level components that are as ...
Language: English Existing skills or strong desire to learn: • formal verification in the Coq proof ...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...
Software systems are growing ever larger. Early software systems were singular units developed by sm...
Modern-day imperative programming languages such as C++, C# and Java offer protection facilities suc...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Many high-level functional programming languages provide programmers with the ability to interoperat...
A fully abstract compilation scheme prevents the security features of the high-level language from b...
Process-based separation has long been the prevalent model for providing security and isolation to p...
Fine-grained program counter-based memory access control mechanisms can be used to enhance low-level...
Software is pervasive in our daily lives and we rely on it for many critical tasks. Despite the abun...
An important objective for low-level software security research is to develop techniques that make i...
We present a secure (fully abstract) compilation scheme to compile a high-level language to low-leve...
Compilers are at the foundation of software security. On the one hand, compilers are an ideal place ...
To counter man-at-the-end attacks such as reverse engineering and tampering, software is often prote...
© 2016 IEEE. Secure compilation studies compilers that generate target-level components that are as ...
Language: English Existing skills or strong desire to learn: • formal verification in the Coq proof ...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...