Formal approaches to secure compilation: A survey of fully abstract compilation and related work

M Patrignani, A Ahmed, D Clarke - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Secure compilation is a discipline aimed at develo** compilers that preserve the security
properties of the source programs they take as input in the target programs they produce as …

[BOOK][B] Higher-order computability

J Longley, D Normann - 2015 - Springer
This book serves as an introduction to an area of computability theory that originated in the
1950s, and since then has fanned out in many different directions under the influence of …

Realizability toposes and language semantics

JR Longley - 1995 - era.ed.ac.uk
Realizability toposes are" models of constructive set theory" based on abstract notions of
computability. They arose originally in the study of mathematical logic, but since then various …

Fully abstract compilation via universal embedding

MS New, WJ Bowman, A Ahmed - Proceedings of the 21st ACM …, 2016 - dl.acm.org
A fully abstract compiler guarantees that two source components are observationally
equivalent in the source language if and only if their translations are observationally …

Protection in programming-language translations

M Abadi - Secure Internet Programming: Security Issues for …, 1999 - Springer
We discuss abstractions for protection and the correctness of their implementations. Relying
on the concept of full abstraction, we consider two examples:(1) the translation of Java …

An equivalence-preserving CPS translation via multi-language semantics

A Ahmed, M Blume - Proceedings of the 16th ACM SIGPLAN …, 2011 - dl.acm.org
Language-based security relies on the assumption that all potential attacks follow the rules
of the language in question. When programs are compiled into a different language, this is …

[PDF][PDF] Names and higher-order functions

IDB Stark - 1994 - Citeseer
Many functional programming languages rely on the elimination of 'impure'features:
assignment to variables, exceptions and even input/output. But some of these are genuinely …

Typed closure conversion preserves observational equivalence

A Ahmed, M Blume - Proceedings of the 13th ACM SIGPLAN …, 2008 - dl.acm.org
Language-based security relies on the assumption that all potential attacks are bound by the
rules of the language in question. When programs are compiled into a different language …

[BOOK][B] The structure of typed programming languages

DA Schmidt - 1994 - books.google.com
The Structure of Typed Programming Languages describes the fundamental syntactic and
semantic features of modern programming languages, carefully spelling out their impacts on …

Fully-abstract compilation by approximate back-translation

D Devriese, M Patrignani, F Piessens - Proceedings of the 43rd Annual …, 2016 - dl.acm.org
A compiler is fully-abstract if the compilation from source language programs to target
language programs reflects and preserves behavioural equivalence. Such compilers have …