Preventing dynamic library compromise on node. js via rwx-based privilege reduction

N Vasilakis, CA Staicu, G Ntousakis, K Kallas… - Proceedings of the …, 2021 - dl.acm.org
Third-party libraries ease the development of large-scale software systems. However,
libraries often execute with significantly more privilege than needed to complete their task …

Expressing information flow properties

E Kozyri, S Chong, AC Myers - Foundations and Trends® in …, 2022 - nowpublishers.com
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …

Reasoning about object capabilities with logical relations and effect parametricity

D Devriese, L Birkedal… - 2016 IEEE European …, 2016 - ieeexplore.ieee.org
Object capabilities are a technique for fine-grained privilege separation in programming
languages and systems, with important applications in security. However, current formal …

A capability-based module system for authority control

D Melicher, Y Shi, A Potanin… - … European Conference on …, 2017 - drops.dagstuhl.de
The principle of least authority states that each component of the system should be given
authority to access only the information and resources that it needs for its operation. This …

Enabling end-to-end orchestration of multi-cloud applications

K Alexander, C Lee, E Kim, S Helal - IEEE Access, 2017 - ieeexplore.ieee.org
The orchestration of application components across heterogeneous cloud providers is a
problem that has been tackled using various approaches, some of which led to the creation …

QR factorization of tall and skinny matrices in a grid computing environment

E Agullo, C Coti, J Dongarra, T Herault… - … on Parallel & …, 2010 - ieeexplore.ieee.org
Previous studies have reported that common dense linear algebra operations do not
achieve speed up by using multiple geographical sites of a computational grid. Because …

Extensible access control with authorization contracts

S Moore, C Dimoulas, RB Findler, M Flatt… - ACM SIGPLAN …, 2016 - dl.acm.org
Existing programming language access control frameworks do not meet the needs of all
software components. We propose an expressive framework for implementing access …

On access control, capabilities, their equivalence, and confused deputy attacks

V Rajani, D Garg, T Rezk - 2016 IEEE 29th Computer Security …, 2016 - ieeexplore.ieee.org
Motivated by the problem of understanding the difference between practical access control
and capability systems formally, we distill the essence of both in a language-based setting …

Necessity specifications for robustness

J Mackay, S Eisenbach, J Noble… - Proceedings of the ACM …, 2022 - dl.acm.org
Robust modules guarantee to do only what they are supposed to do–even in the presence
of untrusted malicious clients, and considering not just the direct behaviour of individual …

Capabilities: Effects for free

A Craig, A Potanin, L Groves, J Aldrich - Formal Methods and Software …, 2018 - Springer
Object capabilities are increasingly used to reason informally about the properties of secure
systems. But can capabilities also aid in formal reasoning? To answer this question, we …