{FlowFence}: Practical data protection for emerging {IoT} application frameworks

E Fernandes, J Paupore, A Rahmati… - 25th USENIX security …, 2016 - usenix.org
Emerging IoT programming frameworks enable building apps that compute on sensitive
data produced by smart homes and wearables. However, these frameworks only support …

Hails: Protecting data privacy in untrusted web applications

DB Giffin, A Levy, D Stefan, D Terei… - … USENIX Symposium on …, 2012 - usenix.org
Modern extensible web platforms like Facebook and Yammer depend on third-party
software to offer a rich experience to their users. Unfortunately, users running a third-party …

Architectural support for software-defined metadata processing

U Dhawan, C Hritcu, R Rubin, N Vasilakis… - Proceedings of the …, 2015 - dl.acm.org
Optimized hardware for propagating and checking software-programmable metadata tags
can achieve low runtime overhead. We generalize prior work on hardware tagging by …

Secure serverless computing using dynamic information flow control

K Alpernas, C Flanagan, S Fouladi, L Ryzhyk… - Proceedings of the …, 2018 - dl.acm.org
The rise of serverless computing provides an opportunity to rethink cloud security. We
present an approach for securing serverless systems using a novel form of dynamic …

Protecting Users by Confining {JavaScript} with {COWL}

D Stefan, EZ Yang, P Marchenko, A Russo… - … USENIX Symposium on …, 2014 - usenix.org
Modern web applications are conglomerations of JavaScript written by multiple authors:
application developers routinely incorporate code from third-party libraries, and mashup …

HLIO: Mixing static and dynamic typing for information-flow control in Haskell

P Buiras, D Vytiniotis, A Russo - Proceedings of the 20th ACM SIGPLAN …, 2015 - dl.acm.org
Information-Flow Control (IFC) is a well-established approach for allowing untrusted code to
manipulate sensitive data without disclosing it. IFC is typically enforced via type systems and …

The case for writing a kernel in rust

A Levy, B Campbell, B Ghena, P Pannuto… - Proceedings of the 8th …, 2017 - dl.acm.org
An operating system kernel written in the Rust language would have extremely fine-grained
isolation boundaries, have no memory leaks, and be safe from a wide range of security …

Dijkstra monads for free

D Ahman, C Hriţcu, K Maillard, G Martínez… - Proceedings of the 44th …, 2017 - dl.acm.org
Dijkstra monads enable a dependent type theory to be enhanced with support for specifying
and verifying effectful code via weakest preconditions. Together with their closely related …

Practical {DIFC} Enforcement on Android

A Nadkarni, B Andow, W Enck, S Jha - 25th USENIX Security …, 2016 - usenix.org
Smartphone users often use private and enterprise data with untrusted third party
applications. The fundamental lack of secrecy guarantees in smartphone OSes, such as …

Cheesecloth:{Zero-Knowledge} Proofs of Real World Vulnerabilities

S Cuéllar, B Harris, J Parker, S Pernsteiner… - 32nd USENIX Security …, 2023 - usenix.org
Currently, when a security analyst discovers a vulnerability in critical software system, they
must navigate a fraught dilemma: immediately disclosing the vulnerability to the public could …