Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperNovember 2020
Short Paper: Probabilistically Almost-Oblivious Computation
PLAS'20: Proceedings of the 15th Workshop on Programming Languages and Analysis for SecurityNovember 2020, Pages 9–12https://doi.org/10.1145/3411506.3417598Memory-trace Obliviousness (MTO) is a noninterference property: programs that enjoy it have neither explicit nor implicit information leaks, even when the adversary can observe the program counter and the address trace of memory accesses. Probabilistic ...
- research-articleJune 2017
Decomposition instead of self-composition for proving the absence of timing channels
PLDI 2017: Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and ImplementationJune 2017, Pages 362–375https://doi.org/10.1145/3062341.3062378We present a novel approach to proving the absence of timing channels. The idea is to partition the program's execution traces in such a way that each partition component is checked for timing attack resilience by a time complexity analysis and that per-...
Also Published in:
ACM SIGPLAN Notices: Volume 52 Issue 6, June 2017 - research-articleJune 2014
Adapton: composable, demand-driven incremental computation
PLDI '14: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and ImplementationJune 2014, Pages 156–166https://doi.org/10.1145/2594291.2594324Many researchers have proposed programming languages that support incremental computation (IC), which allows programs to be efficiently re-executed after a small change to the input. However, existing implementations of such languages have two important ...
Also Published in:
ACM SIGPLAN Notices: Volume 49 Issue 6, June 2014 - research-articleJune 2013
Knowledge inference for optimizing secure multi-party computation
PLAS '13: Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and analysis for securityJune 2013, Pages 3–14https://doi.org/10.1145/2465106.2465117In secure multi-party computation, mutually distrusting parties cooperatively compute functions of their private data; in the process, they only learn certain results as per the protocol (e.g., the final output). The realization of these protocols uses ...
- research-articleJune 2012
Knowledge-oriented secure multiparty computation
PLAS '12: Proceedings of the 7th Workshop on Programming Languages and Analysis for SecurityJune 2012, Article No.: 2, Pages 1–12https://doi.org/10.1145/2336717.2336719Protocols for secure multiparty computation (SMC) allow a set of mutually distrusting parties to compute a function f of their private inputs while revealing nothing about their inputs beyond what is implied by the result. Depending on f, however, the ...
- research-articleJune 2009
Safe and timely updates to multi-threaded programs
PLDI '09: Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and ImplementationJune 2009, Pages 13–24https://doi.org/10.1145/1542476.1542479Many dynamic updating systems have been developed that enable a program to be patched while it runs, to fix bugs or add new features. This paper explores techniques for supporting dynamic updates to multi-threaded programs, focusing on the problem of ...
Also Published in:
ACM SIGPLAN Notices: Volume 44 Issue 6, June 2009 - research-articleJune 2009
Dynamic software updates: a VM-centric approach
PLDI '09: Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and ImplementationJune 2009, Pages 1–12https://doi.org/10.1145/1542476.1542478Software evolves to fix bugs and add features. Stopping and restarting programs to apply changes is inconvenient and often costly. Dynamic software updating (DSU) addresses this problem by updating programs while they execute, but existing DSU systems ...
Also Published in:
ACM SIGPLAN Notices: Volume 44 Issue 6, June 2009 - research-articleJune 2008
Verified enforcement of stateful information release policies
PLAS '08: Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for securityJune 2008, Pages 21–32https://doi.org/10.1145/1375696.1375700Many organizations specify information release policies to describe the terms under which sensitive information may be released to other organizations. This paper presents a new approach for ensuring that security-critical software correctly enforces ...
- proceedingJune 2007
PLAS '07: Proceedings of the 2007 workshop on Programming languages and analysis for security
It is my pleasure to present this proceedings of the 2nd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2007), which took place on June 14, 2007 in San Diego, California, USA. The workshop was held as part of ACM's ...
- ArticleJune 2006
LOCKSMITH: context-sensitive correlation analysis for race detection
PLDI '06: Proceedings of the 27th ACM SIGPLAN Conference on Programming Language Design and ImplementationJune 2006, Pages 320–331https://doi.org/10.1145/1133981.1134019One common technique for preventing data races in multi-threaded programs is to ensure that all accesses to shared locations are consistently protected by a lock. We present a tool called LOCKSMITH for detecting data races in C programs by looking for ...
Also Published in:
ACM SIGPLAN Notices: Volume 41 Issue 6, June 2006 - ArticleJune 2006
Practical dynamic software updating for C
PLDI '06: Proceedings of the 27th ACM SIGPLAN Conference on Programming Language Design and ImplementationJune 2006, Pages 72–83https://doi.org/10.1145/1133981.1133991Software updates typically require stopping and restarting an application, but many systems cannot afford to halt service, or would prefer not to. Dynamic software updating (DSU) addresses this difficulty by permitting programs to be updated while they ...
Also Published in:
ACM SIGPLAN Notices: Volume 41 Issue 6, June 2006 - ArticleJune 2006
Trusted declassification:: high-level policy for a security-typed language
PLAS '06: Proceedings of the 2006 workshop on Programming languages and analysis for securityJune 2006, Pages 65–74https://doi.org/10.1145/1134744.1134757Security-typed languages promise to be a powerful tool with which provably secure software applications may be developed. Programs written in these languages enforce a strong, global policy of noninterferencewhich ensures that high-security data will ...
- ArticleMay 2002
Region-based memory management in cyclone
PLDI '02: Proceedings of the ACM SIGPLAN 2002 conference on Programming language design and implementationJune 2002, Pages 282–293https://doi.org/10.1145/512529.512563Cyclone is a type-safe programming language derived from C. The primary design goal of Cyclone is to let programmers control data representation and memory management without sacrificing type-safety. In this paper, we focus on the region-based memory ...
Also Published in:
ACM SIGPLAN Notices: Volume 37 Issue 5, May 2002 - ArticleMay 2001
Dynamic software updating
PLDI '01: Proceedings of the ACM SIGPLAN 2001 conference on Programming language design and implementationJune 2001, Pages 13–23https://doi.org/10.1145/378795.378798Many important applications must run continuously and without interruption, yet must be changed to fix bugs or upgrade functionality. No prior general-purpose methodology for dynamic updating achieves a practical balance between flexibility, robustness, ...
Also Published in:
ACM SIGPLAN Notices: Volume 36 Issue 5, May 2001