Proving only over source code that programs do not leak sensitive data leaves a gap between reasoning and reality that can only be filled by accounting for the behaviour of the compiler. Furthermore, software does not always have the luxury of limiting itself to single-threaded computation with resources statically dedicated to each user to ensure the confidentiality of their data. This results in mixed-sensitivity concurrent programs, which might reuse memory shared between their threads to hold data of different sensitivity levels at different times; for such programs, a compiler must preserve the value-dependent coordination of such mixed-sensitivity reuse despite the impact of concurrency. Here we demonstrate, using Isabelle/HOL, that ...
Methods for proving that concurrent software does not leak its secrets has remained an active topic ...
Severe low-level vulnerabilities abound in today's computer systems,allowing cyber-attackers to remo...
© 2016 IEEE. Secure compilation studies compilers that generate target-level components that are as ...
It is common to prove by reasoning over source code that programs do not leak sensitive data. But do...
Here, I pose the thesis that proving noninterference and its preservation by a compiler is feasible ...
Software is pervasive in our daily lives and we rely on it for many critical tasks. Despite the abun...
Modern-day imperative programming languages such as C++, C# and Java offer protection facilities suc...
International audienceSecure compilation is a discipline aimed at developing compilers that preserve...
International audienceGood programming languages provide helpful abstractions for writing secure cod...
International audienceWe propose a new formal criterion for evaluating secure compilation schemes fo...
The most prominent formal criterion for secure compilation is full abstraction, the preservation and...
Modern programming languages provide helpful high-level abstractions and mechanisms (e.g. types, mod...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
Methods for proving that concurrent software does not leak its secrets has remained an active topic ...
Severe low-level vulnerabilities abound in today's computer systems,allowing cyber-attackers to remo...
© 2016 IEEE. Secure compilation studies compilers that generate target-level components that are as ...
It is common to prove by reasoning over source code that programs do not leak sensitive data. But do...
Here, I pose the thesis that proving noninterference and its preservation by a compiler is feasible ...
Software is pervasive in our daily lives and we rely on it for many critical tasks. Despite the abun...
Modern-day imperative programming languages such as C++, C# and Java offer protection facilities suc...
International audienceSecure compilation is a discipline aimed at developing compilers that preserve...
International audienceGood programming languages provide helpful abstractions for writing secure cod...
International audienceWe propose a new formal criterion for evaluating secure compilation schemes fo...
The most prominent formal criterion for secure compilation is full abstraction, the preservation and...
Modern programming languages provide helpful high-level abstractions and mechanisms (e.g. types, mod...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
Methods for proving that concurrent software does not leak its secrets has remained an active topic ...
Severe low-level vulnerabilities abound in today's computer systems,allowing cyber-attackers to remo...
© 2016 IEEE. Secure compilation studies compilers that generate target-level components that are as ...