Formal approaches to secure compilation: A survey of fully abstract compilation and related work

M Patrignani, A Ahmed, D Clarke - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Secure compilation is a discipline aimed at develo** compilers that preserve the security
properties of the source programs they take as input in the target programs they produce as …

Formal verification of a constant-time preserving C compiler

G Barthe, S Blazy, B Grégoire, R Hutin… - Proceedings of the …, 2019 - dl.acm.org
Timing side-channels are arguably one of the main sources of vulnerabilities in
cryptographic implementations. One effective mitigation against timing side-channels is to …

Mswasm: Soundly enforcing memory-safe execution of unsafe code

AE Michael, A Gollamudi, J Bosamiya… - Proceedings of the …, 2023 - dl.acm.org
Most programs compiled to WebAssembly (Wasm) today are written in unsafe languages
like C and C++. Unfortunately, memory-unsafe C code remains unsafe when compiled to …

Preservation of speculative constant-time by compilation

S Arranz Olmos, G Barthe, L Blatter… - Proceedings of the …, 2025 - dl.acm.org
Compilers often weaken or even discard software-based countermeasures commonly used
to protect programs against side-channel attacks; worse, they may also introduce …

Expressing information flow properties

E Kozyri, S Chong, AC Myers - Foundations and Trends® in …, 2022 - nowpublishers.com
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …

Exorcising spectres with secure compilers

M Patrignani, M Guarnieri - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
ttackers can access sensitive information of programs by exploiting the side-effects of
speculatively-executed instructions using Spectre attacks. To mitigate these attacks, popular …

StkTokens: Enforcing well-bracketed control flow and stack encapsulation using linear capabilities

L Skorstengaard, D Devriese, L Birkedal - Proceedings of the ACM on …, 2019 - dl.acm.org
We propose and study StkTokens: a new calling convention that provably enforces well-
bracketed control flow and local state encapsulation on a capability machine. The calling …

The next 700 relational program logics

K Maillard, C Hriţcu, E Rivas… - Proceedings of the ACM on …, 2019 - dl.acm.org
We propose the first framework for defining relational program logics for arbitrary monadic
effects. The framework is embedded within a relational dependent type theory and is highly …

Provably secure isolation for interruptible enclaved execution on small microprocessors

M Busi, J Noorman, J Van Bulck… - 2020 IEEE 33rd …, 2020 - ieeexplore.ieee.org
Computer systems often provide hardware support for isolation mechanisms like privilege
levels, virtual memory, or enclaved execution. Over the past years, several successful …

When good components go bad: Formally secure compilation despite dynamic compromise

C Abate, A Azevedo de Amorim, R Blanco… - Proceedings of the …, 2018 - dl.acm.org
We propose a new formal criterion for evaluating secure compilation schemes for unsafe
languages, expressing end-to-end security guarantees for software components that may …