Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Data oblivious ISA extensions for side channel-resistant and high performance computing
Blocking microarchitectural (digital) side channels is one of the most pressing challenges in
hardware security today. Recently, there has been a surge of effort that attempts to block …
hardware security today. Recently, there has been a surge of effort that attempts to block …
[PDF][PDF] Mpcdiff: Testing and repairing mpc-hardened deep learning models
Secure multi-party computation (MPC) has recently become prominent as a concept to
enable multiple parties to perform privacy-preserving machine learning without leaking …
enable multiple parties to perform privacy-preserving machine learning without leaking …
A probabilistic separation logic
Probabilistic independence is a useful concept for describing the result of random sampling—
a basic operation in all probabilistic languages—and for reasoning about groups of random …
a basic operation in all probabilistic languages—and for reasoning about groups of random …
PP-CSA: Practical Privacy-Preserving Software Call Stack Analysis
Software call stack is a sequence of function calls that are executed during the runtime of a
software program. Software call stack analysis (CSA) is widely used in software engineering …
software program. Software call stack analysis (CSA) is widely used in software engineering …
Taype: A policy-agnostic language for oblivious computation
Secure multiparty computation (MPC) allows for joint computation over private data from
multiple entities, usually backed by powerful cryptographic techniques that protect sensitive …
multiple entities, usually backed by powerful cryptographic techniques that protect sensitive …
Oblivious algebraic data types
Secure computation allows multiple parties to compute joint functions over private data
without leaking any sensitive data, typically using powerful cryptographic techniques. Writing …
without leaking any sensitive data, typically using powerful cryptographic techniques. Writing …
Language-Based Security for Low-Level MPC
Secure Multi-Party Computation (MPC) is an important enabling technology for data privacy
in modern distributed applications. Currently, proof methods for low-level MPC protocols are …
in modern distributed applications. Currently, proof methods for low-level MPC protocols are …
Combining classical and probabilistic independence reasoning to verify the security of oblivious algorithms (extended version)
We consider the problem of how to verify the security of probabilistic oblivious algorithms
formally and systematically. Unfortunately, prior program logics fail to support a number of …
formally and systematically. Unfortunately, prior program logics fail to support a number of …
Probabilistic analysis of binary sessions
We study a probabilistic variant of binary session types that relate to a class of Finite-State
Markov Chains. The probability annotations in session types enable the reasoning on the …
Markov Chains. The probability annotations in session types enable the reasoning on the …
Verification of quantitative hyperproperties using trace enumeration relations
Many important cryptographic primitives offer probabilistic guarantees of security that can be
specified as quantitative hyperproperties; these are specifications that stipulate the …
specified as quantitative hyperproperties; these are specifications that stipulate the …