Language-based information-flow security

A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …

Strong non-interference and type-directed higher-order masking

G Barthe, S Belaïd, F Dupressoir, PA Fouque… - Proceedings of the …, 2016 - dl.acm.org
Differential power analysis (DPA) is a side-channel attack in which an adversary retrieves
cryptographic material by measuring and analyzing the power consumption of the device on …

Fairplay-Secure Two-Party Computation System.

D Malkhi, N Nisan, B Pinkas, Y Sella - USENIX security symposium, 2004 - usenix.org
Proceedings of the 13th USENIX Security Symposium Page 1 USENIX Association
Proceedings of the 13th USENIX Security Symposium San Diego, CA, USA August 9–13 …

Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically

M Hicks, M Finnicum, ST King… - … IEEE symposium on …, 2010 - ieeexplore.ieee.org
The computer systems security arms race between attackers and defenders has largely
taken place in the domain of software systems, but as hardware complexity and design …

Bug isolation via remote program sampling

B Liblit, A Aiken, AX Zheng, MI Jordan - ACM Sigplan Notices, 2003 - dl.acm.org
We propose a low-overhead sampling infrastructure for gathering information from the
executions experienced by a program's user community. Several example applications …

Polyglot: An extensible compiler framework for Java

N Nystrom, MR Clarkson, AC Myers - International Conference on …, 2003 - Springer
Polyglot is an extensible compiler framework that supports the easy creation of compilers for
languages similar to Java, while avoiding code duplication. The Polyglot framework is useful …

[PDF][PDF] Automating configuration troubleshooting with dynamic information flow analysis

M Attariyan, J Flinn - 9th USENIX Symposium on Operating Systems …, 2010 - usenix.org
Software misconfigurations are time-consuming and enormously frustrating to troubleshoot.
In this paper, we show that dynamic information flow analysis helps solve these problems by …

[PDF][PDF] Securing Distributed Systems with Information Flow Control.

N Zeldovich, S Boyd-Wickizer, D Mazieres - NSDI, 2008 - usenix.org
ABSTRACT Recent operating systems [12, 21, 26] have shown that decentralized
information flow control (DIFC) can secure applications built from mostly untrusted code …

Wedge: Splitting applications into reduced-privilege compartments

A Bittau, P Marchenko, M Handley, B Karp - 2008 - usenix.org
Software vulnerabilities and bugs persist, and so exploits continue to cause significant
damage, particularly by divulging users' sensitive data to miscreants. Yet the vast majority of …

Hails: Protecting data privacy in untrusted web applications

DB Giffin, A Levy, D Stefan, D Terei… - … USENIX Symposium on …, 2012 - usenix.org
Modern extensible web platforms like Facebook and Yammer depend on third-party
software to offer a rich experience to their users. Unfortunately, users running a third-party …