We present Flicker, an infrastructure for executing security-sensitive code in complete isolation while trusting as few as 250 lines of additional code. Flicker can also provide …
Airavat: Security and Privacy for MapReduce Page 1 Airavat: Security and Privacy for MapReduce Indrajit Roy, Srinath TV Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The …
S Zdancewic, AC Myers - 16th IEEE Computer Security …, 2003 - ieeexplore.ieee.org
Noninterference is a property of sequential programs that is useful for expressing security policies for data confidentiality and integrity. However, extending noninterference to …
D Brumley, D Song - USENIX Security Symposium, 2004 - usenix.org
Privilege separation partitions a single program into two parts: a privileged program called the monitor and an unprivileged program called the slave. All trust and privileges are …
A Rastogi, MA Hammer, M Hicks - 2014 IEEE Symposium on …, 2014 - ieeexplore.ieee.org
In a Secure Multiparty Computation (SMC), mutually distrusting parties use cryptographic techniques to cooperatively compute over their private data, in the process each party learns …
Large Language Model (LLM) systems are inherently compositional, with individual LLM serving as the core foundation with additional layers of objects such as plugins, sandbox …
Swift is a new, principled approach to building web applications that are secure by construction. In modern web applications, some application functionality is usually …
Computer worms—malicious, self-propagating programs—represent a significant threat to large networks. One possible defense, containment, seeks to limit a worm's spread by …
Inferring aliasing and buffer-size information is important to understanding a C program's memory layout, which is critical to program analysis and security-related tasks. However …