Core concepts, challenges, and future directions in blockchain: A centralized tutorial

J Kolb, M AbdelBaky, RH Katz, DE Culler - ACM Computing Surveys …, 2020 - dl.acm.org
Blockchains are a topic of immense interest in academia and industry, but their true nature is
often obscured by marketing and hype. In this tutorial, we explain the fundamental elements …

Formal approaches to secure compilation: A survey of fully abstract compilation and related work

M Patrignani, A Ahmed, D Clarke - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Secure compilation is a discipline aimed at developing compilers that preserve the security
properties of the source programs they take as input in the target programs they produce as …

Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

Refinement types for Haskell

N Vazou, EL Seidel, R Jhala, D Vytiniotis… - Proceedings of the 19th …, 2014 - dl.acm.org
SMT-based checking of refinement types for call-by-value languages is a well-studied
subject. Unfortunately, the classical translation of refinement types to verification conditions …

Multiparty asynchronous session types

K Honda, N Yoshida, M Carbone - Proceedings of the 35th annual ACM …, 2008 - dl.acm.org
Communication is becoming one of the central elements in software development. As a
potential typed foundation for structured communication-centred programming, session …

A hardware design language for timing-sensitive information-flow security

D Zhang, Y Wang, GE Suh, AC Myers - Acm Sigplan Notices, 2015 - dl.acm.org
Information security can be compromised by leakage via low-level hardware features. One
recently prominent example is cache probing attacks, which rely on timing channels created …

RefinedC: automating the foundational verification of C code with refined ownership types

M Sammler, R Lepigre, R Krebbers… - Proceedings of the …, 2021 - dl.acm.org
Given the central role that C continues to play in systems software, and the difficulty of
writing safe and correct C code, it remains a grand challenge to develop effective formal …

Propositions as types

P Wadler - Communications of the ACM, 2015 - dl.acm.org
Propositions as types Page 1 DECEMBER 2015 | VOL. 58 | NO. 12 | COMMUNICATIONS OF
THE ACM 75 DOI:10.1145/2699407 Connecting mathematical logic and computation, it …

Multiparty asynchronous session types

K Honda, N Yoshida, M Carbone - Journal of the ACM (JACM), 2016 - dl.acm.org
Communication is a central elements in software development. As a potential typed
foundation for structured communication-centered programming, session types have been …

Smart contract vulnerabilities: Vulnerable does not imply exploited

D Perez, B Livshits - … USENIX Security Symposium (USENIX Security 21 …, 2021 - usenix.org
In recent years, we have seen a great deal of both academic and practical interest in the
topic of vulnerabilities in smart contracts, particularly those developed for the Ethereum …