A survey of multitier programming

P Weisenburger, J Wirth, G Salvaneschi - ACM Computing Surveys …, 2020 - dl.acm.org
Multitier programming deals with developing the components that pertain to different tiers in
the system (eg, client and server), mixing them in the same compilation unit. In this …

Flicker: An execution infrastructure for TCB minimization

JM McCune, BJ Parno, A Perrig, MK Reiter… - Proceedings of the 3rd …, 2008 - dl.acm.org
We present Flicker, an infrastructure for executing security-sensitive code in complete
isolation while trusting as few as 250 lines of additional code. Flicker can also provide …

[PDF][PDF] Airavat: Security and privacy for MapReduce.

I Roy, STV Setty, A Kilzer, V Shmatikov, E Witchel - NSDI, 2010 - usenix.org
Airavat: Security and Privacy for MapReduce Page 1 Airavat: Security and Privacy for
MapReduce Indrajit Roy, Srinath TV Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The …

Observational determinism for concurrent program security

S Zdancewic, AC Myers - 16th IEEE Computer Security …, 2003 - ieeexplore.ieee.org
Noninterference is a property of sequential programs that is useful for expressing security
policies for data confidentiality and integrity. However, extending noninterference to …

Privtrans: Automatically partitioning programs for privilege separation

D Brumley, D Song - USENIX Security Symposium, 2004 - usenix.org
Privilege separation partitions a single program into two parts: a privileged program called
the monitor and an unprivileged program called the slave. All trust and privileges are …

Wysteria: A programming language for generic, mixed-mode multiparty computations

A Rastogi, MA Hammer, M Hicks - 2014 IEEE Symposium on …, 2014 - ieeexplore.ieee.org
In a Secure Multiparty Computation (SMC), mutually distrusting parties use cryptographic
techniques to cooperatively compute over their private data, in the process each party learns …

A new era in llm security: Exploring security concerns in real-world llm-based systems

F Wu, N Zhang, S Jha, P McDaniel, C Xiao - arXiv preprint arXiv …, 2024 - arxiv.org
Large Language Model (LLM) systems are inherently compositional, with individual LLM
serving as the core foundation with additional layers of objects such as plugins, sandbox …

Secure web applications via automatic partitioning

S Chong, J Liu, AC Myers, X Qi, K Vikram… - ACM SIGOPS …, 2007 - dl.acm.org
Swift is a new, principled approach to building web applications that are secure by
construction. In modern web applications, some application functionality is usually …

Very fast containment of scanning worms, revisited

N Weaver, S Staniford, V Paxson - Malware Detection, 2007 - Springer
Computer worms—malicious, self-propagating programs—represent a significant threat to
large networks. One possible defense, containment, seeks to limit a worm's spread by …

Abslearn: a gnn-based framework for aliasing and buffer-size information retrieval

K Liang, J Tan, D Zeng, Y Huang, X Huang… - Pattern Analysis and …, 2023 - Springer
Inferring aliasing and buffer-size information is important to understanding a C program's
memory layout, which is critical to program analysis and security-related tasks. However …