Unveiling the mystery of internet packet forwarding: A survey of network path validation

K Bu, A Laird, Y Yang, L Cheng, J Luo, Y Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Validating the network paths taken by packets is critical in constructing a secure Internet
architecture. Any feasible solution must both enforce packet forwarding along end-host …

Design, implementation and verification of an extensible and modular hypervisor framework

A Vasudevan, S Chaki, L Jia, J McCune… - … IEEE Symposium on …, 2013 - ieeexplore.ieee.org
We present the design, implementation, and verification of XMHF-an eXtensible and
Modular Hypervisor Framework. XMHF is designed to achieve three goals--modular …

Assumptions and guarantees for compositional noninterference

H Mantel, D Sands, H Sudbrock - 2011 IEEE 24th Computer …, 2011 - ieeexplore.ieee.org
The idea of building secure systems by plugging together" secure''components is appealing,
but this requires a definition of security which, in addition to taking care of top-level security …

Reasoning about object capabilities with logical relations and effect parametricity

D Devriese, L Birkedal… - 2016 IEEE European …, 2016 - ieeexplore.ieee.org
Object capabilities are a technique for fine-grained privilege separation in programming
languages and systems, with important applications in security. However, current formal …

Higher-order probabilistic adversarial computations: categorical semantics and program logics

A Aguirre, G Barthe, M Gaboardi, D Garg… - Proceedings of the …, 2021 - dl.acm.org
Adversarial computations are a widely studied class of computations where resource-
bounded probabilistic adversaries have access to oracles, ie, probabilistic procedures with …

Continuous tamper-proof logging using tpm 2.0

A Sinha, L Jia, P England, JR Lorch - … , Heraklion, Crete, June 30–July 2 …, 2014 - Springer
Auditing system logs is an important means of ensuring systems' security in situations where
run-time security mechanisms are not sufficient to completely prevent potentially malicious …

Test-based security certification of composite services

M Anisetti, C Ardagna, E Damiani… - ACM Transactions on the …, 2018 - dl.acm.org
The diffusion of service-based and cloud-based systems has created a scenario where
software is often made available as services, offered as commodities over corporate …

What's (not) validating network paths: A survey

K Bu, Y Yang, A Laird, J Luo, Y Li, K Ren - arXiv preprint arXiv:1804.03385, 2018 - arxiv.org
Validating network paths taken by packets is critical for a secure Internet architecture. Any
feasible solution must both enforce packet forwarding along endhost-specified paths and …

Mechanized network origin and path authenticity proofs

F Zhang, L Jia, C Basescu, THJ Kim, YC Hu… - Proceedings of the 2014 …, 2014 - dl.acm.org
A secure routing infrastructure is vital for secure and reliable Internet services. Source
authentication and path validation are two fundamental primitives for building a more secure …

On adversary models and compositional security

A Datta, J Franklin, D Garg, L Jia… - IEEE Security & …, 2010 - ieeexplore.ieee.org
A unified view of a wide range of adversary classes and composition principles for
reasoning about security properties of systems are cornerstones of a science of security …