Refinement types: A tutorial

R Jhala, N Vazou - Foundations and Trends® in …, 2021 - nowpublishers.com
Refinement types enrich a language's type system with logical predicates that circumscribe
the set of values described by the type. These refinement predicates provide software …

Statically verified refinements for multiparty protocols

F Zhou, F Ferreira, R Hu, R Neykova… - Proceedings of the ACM …, 2020 - dl.acm.org
With distributed computing becoming ubiquitous in the modern era, safe distributed
programming is an open challenge. To address this, multiparty session types (MPST) …

Propr: property-based automatic program repair

MP Gissurarson, L Applis, A Panichella… - Proceedings of the 44th …, 2022 - dl.acm.org
Automatic program repair (APR) regularly faces the challenge of overfitting patches---
patches that pass the test suite, but do not actually address the problems when evaluated …

{STORM}: Refinement types for secure web applications

N Lehmann, R Kunkel, J Brown, J Yang… - … on Operating Systems …, 2021 - usenix.org
We present Storm, a web framework that allows developers to build MVC applications with
compile-time enforcement of centrally specified data-dependent security policies. Storm …

Sugarcoat: Programmatically generating privacy-preserving, web-compatible resource replacements for content blocking

M Smith, P Snyder, B Livshits, D Stefan - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Content blocking systems today exempt thousands of privacy-harming scripts. They do this
because blocking these scripts breaks the Web sites that rely on them. In this paper, we …

Sesame: Practical End-to-End Privacy Compliance with Policy Containers and Privacy Regions

K Dak Albab, A Agvanian, A Aby, C Tiffany… - Proceedings of the …, 2024 - dl.acm.org
Web applications are governed by privacy policies, but developers lack practical
abstractions to ensure that their code actually abides by these policies. This leads to …

Semantics for noninterference with interaction trees

L Silver, P He, E Cecchetti, AK Hirsch… - … Conference on Object …, 2023 - drops.dagstuhl.de
Noninterference is the strong information-security property that a program does not leak
secrets through publicly-visible behavior. In the presence of effects such as nontermination …

Enforcing the GDPR

F Hublet, D Basin, S Krstić - European Symposium on Research in …, 2023 - Springer
Violations of data protection laws such as the General Data Protection Regulation (GDPR)
are ubiquitous. Currently, building IT support to implement such laws is difficult and the …

RbSyn: type-and effect-guided program synthesis

SN Guria, JS Foster, D Van Horn - Proceedings of the 42nd ACM …, 2021 - dl.acm.org
In recent years, researchers have explored component-based synthesis, which aims to
automatically construct programs that operate by composing calls to existing APIs. However …

Access control for database applications: Beyond policy enforcement

W Zhang, A Panda, S Shenker - Proceedings of the 19th Workshop on …, 2023 - dl.acm.org
There have been many recent advances in enforcing finegrained access control for
database-backed applications. However, operators face significant challenges both before …