A survey of challenges for runtime verification from advanced application domains (beyond software)

C Sánchez, G Schneider, W Ahrendt, E Bartocci… - Formal Methods in …, 2019 - Springer
Runtime verification is an area of formal methods that studies the dynamic analysis of
execution traces against formal specifications. Typically, the two main activities in runtime …

The case for writing a kernel in rust

A Levy, B Campbell, B Ghena, P Pannuto… - Proceedings of the 8th …, 2017 - dl.acm.org
An operating system kernel written in the Rust language would have extremely fine-grained
isolation boundaries, have no memory leaks, and be safe from a wide range of security …

Nonmalleable information flow control

E Cecchetti, AC Myers, O Arden - … of the 2017 ACM SIGSAC Conference …, 2017 - dl.acm.org
Noninterference is a popular semantic security condition because it offers strong end-to-end
guarantees, it is inherently compositional, and it can be enforced using a simple security …

Type-driven gradual security with references

M Toro, R Garcia, É Tanter - ACM Transactions on Programming …, 2018 - dl.acm.org
In security-typed programming languages, types statically enforce noninterference between
potentially conspiring values, such as the arguments and results of functions. But to adopt …

LWeb: Information flow security for multi-tier web applications

J Parker, N Vazou, M Hicks - Proceedings of the ACM on Programming …, 2019 - dl.acm.org
This paper presents LWeb, a framework for enforcing label-based, information flow policies
in database-using web applications. In a nutshell, LWeb marries the LIO Haskell IFC …

[PDF][PDF] An overview of vulnerabilities and mitigations of Intel SGX applications

J Randmets - URL: https://cyber. ee/research/reports/D-2-116-An …, 2021 - cyber.ee
This research report gives a high-level technical overview of avenues that can be used to
attack applications that use Software Guard Extensions as a privacy enhancing technology …

Sesame: Practical End-to-End Privacy Compliance with Policy Containers and Privacy Regions

K Dak Albab, A Agvanian, A Aby, C Tiffany… - Proceedings of the …, 2024 - dl.acm.org
Web applications are governed by privacy policies, but developers lack practical
abstractions to ensure that their code actually abides by these policies. This leads to …

Modular information flow through ownership

W Crichton, M Patrignani, M Agrawala… - Proceedings of the 43rd …, 2022 - dl.acm.org
Statically analyzing information flow, or how data influences other data within a program, is a
challenging task in imperative languages. Analyzing pointers and mutations requires access …

{STORM}: Refinement types for secure web applications

N Lehmann, R Kunkel, J Brown, J Yang… - … on Operating Systems …, 2021 - usenix.org
We present Storm, a web framework that allows developers to build MVC applications with
compile-time enforcement of centrally specified data-dependent security policies. Storm …

Secwasm: Information flow control for WebAssembly

I Bastys, M Algehed, A Sjösten, A Sabelfeld - International Static Analysis …, 2022 - Springer
We introduce SecWasm, the first general purpose information-flow control system for
WebAssembly (Wasm), thus extending the safety guarantees offered by Wasm with …