Author:
Deng Chaoqiang,Namjoshi Kedar S.
Funder
Defense Advanced Research Projects Agency
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Theoretical Computer Science,Software
Reference22 articles.
1. Abadi M (1998) Protection in programming-language translations. In: Larsen KG, Skyum S, Winskel G (eds) Automata, languages and programming, 25th international colloquium, ICALP’98, Aalborg, Denmark, July 13–17, 1998, Proceedings. Lecture notes in computer science, vol 1443. Springer, pp 868–883.
https://doi.org/10.1007/BFb0055109
2. Almeida JB, Barbosa M, Barthe G, Dupressoir F, Emmi M (2016) Verifying constant-time implementations. In: Holz T, Savage S (eds) 25th USENIX security symposium, USENIX security 16, Austin, TX, USA, August 10–12, 2016. USENIX Association, pp 53–70.
https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/almeida
3. Bell D, LaPadula L (1973) Secure computer systems: mathematical foundations, vol 1-III. Technical Report of ESD-TR-73-278, The MITRE Corporation
4. Ceara D, Mounier L, Potet M (2010) Taint dependency sequences: a characterization of insecure execution paths based on input-sensitive cause sequences. In: Third international conference on software testing, verification and validation, ICST 2010, Paris, France, April 7–9, 2010. Workshops Proceedings, pp 371–380.
https://doi.org/10.1109/ICSTW.2010.28
5. de Amorim AA, Collins N, DeHon A, Demange D, Hritcu C, Pichardie D, Pierce BC, Pollack R, Tolmach A (2014) A verified information-flow architecture. In: Jagannathan S, Sewell P (eds) The 41st annual ACM SIGPLAN-SIGACT symposium on principles of programming languages, POPL ’14, San Diego, CA, USA, January 20–21, 2014. ACM, pp 165–178.
https://doi.org/10.1145/2535838.2535839
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Not so fast: understanding and mitigating negative impacts of compiler optimizations on code reuse gadget sets;Proceedings of the ACM on Programming Languages;2021-10-20
2. NOP-Oriented Programming: Should we Care?;2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2020-09
3. Information-Flow Preservation in Compiler Optimisations;2019 IEEE 32nd Computer Security Foundations Symposium (CSF);2019-06