Modern computer systems still have various security and reliability vulnerabilities. Well-known dynamic analyses solutions can mitigate them using runtime monitors that serve as lifeguards. But the additional work in enforcing these security and safety properties incurs exorbitant performance costs, and such tools are rarely used in practice. Our work addresses this problem by constructing a novel technique- Cautiously Optimistic Program Analysis (COPA). COPA is optimistic- it infers likely program invariants from dynamic observations, and assumes them in its static reasoning to precisely identify and elide wasteful runtime monitors. The resulting system is fast, but also ensures soundness by recovering to a conservatively optimized analys...
This dissertation makes the case that programs can be updated while they run, with modest programme...
Modern computer systems play important roles in our society and everyday lives. Their performance, s...
Analyzing standard safety properties of a given program has traditionally been the primary focus of...
Modern computer systems still have various security and reliability vulnerabilities. Well-known dyna...
textSoftware systems are ubiquitous in today's world and yet, remain vulnerable to the fallibility o...
We have to face a simple, yet, disturbing fact: current computing is inherently insecure. The system...
The computer security problems that we face begin in computer programs that we write. The exploitat...
Software vulnerabilities originating from insecure code are one of the leading causes of security pr...
Software security and reliability are aspects of major concern for software development enterprises ...
The complexity of computer programs has been increasing for multiple decades. As a result, the numbe...
Formal methods techniques for improving software correctness and reliability fall into two categorie...
Today almost every device depends on a piece of software. As a result, our life increasingly depends...
As hardware performance and dependability have dramatically improved in the past few decades, the so...
textHow can a client extract useful work from a server without trusting it to compute correctly? A m...
Despite years of intensive research in the field of software vulnerabilities discovery, exploits are...
This dissertation makes the case that programs can be updated while they run, with modest programme...
Modern computer systems play important roles in our society and everyday lives. Their performance, s...
Analyzing standard safety properties of a given program has traditionally been the primary focus of...
Modern computer systems still have various security and reliability vulnerabilities. Well-known dyna...
textSoftware systems are ubiquitous in today's world and yet, remain vulnerable to the fallibility o...
We have to face a simple, yet, disturbing fact: current computing is inherently insecure. The system...
The computer security problems that we face begin in computer programs that we write. The exploitat...
Software vulnerabilities originating from insecure code are one of the leading causes of security pr...
Software security and reliability are aspects of major concern for software development enterprises ...
The complexity of computer programs has been increasing for multiple decades. As a result, the numbe...
Formal methods techniques for improving software correctness and reliability fall into two categorie...
Today almost every device depends on a piece of software. As a result, our life increasingly depends...
As hardware performance and dependability have dramatically improved in the past few decades, the so...
textHow can a client extract useful work from a server without trusting it to compute correctly? A m...
Despite years of intensive research in the field of software vulnerabilities discovery, exploits are...
This dissertation makes the case that programs can be updated while they run, with modest programme...
Modern computer systems play important roles in our society and everyday lives. Their performance, s...
Analyzing standard safety properties of a given program has traditionally been the primary focus of...