A survey of challenges for runtime verification from advanced application domains (beyond software)
Runtime verification is an area of formal methods that studies the dynamic analysis of
execution traces against formal specifications. Typically, the two main activities in runtime …
execution traces against formal specifications. Typically, the two main activities in runtime …
The case for writing a kernel in rust
An operating system kernel written in the Rust language would have extremely fine-grained
isolation boundaries, have no memory leaks, and be safe from a wide range of security …
isolation boundaries, have no memory leaks, and be safe from a wide range of security …
Nonmalleable information flow control
Noninterference is a popular semantic security condition because it offers strong end-to-end
guarantees, it is inherently compositional, and it can be enforced using a simple security …
guarantees, it is inherently compositional, and it can be enforced using a simple security …
Type-driven gradual security with references
In security-typed programming languages, types statically enforce noninterference between
potentially conspiring values, such as the arguments and results of functions. But to adopt …
potentially conspiring values, such as the arguments and results of functions. But to adopt …
LWeb: Information flow security for multi-tier web applications
This paper presents LWeb, a framework for enforcing label-based, information flow policies
in database-using web applications. In a nutshell, LWeb marries the LIO Haskell IFC …
in database-using web applications. In a nutshell, LWeb marries the LIO Haskell IFC …
[PDF][PDF] An overview of vulnerabilities and mitigations of Intel SGX applications
J Randmets - URL: https://cyber. ee/research/reports/D-2-116-An …, 2021 - cyber.ee
This research report gives a high-level technical overview of avenues that can be used to
attack applications that use Software Guard Extensions as a privacy enhancing technology …
attack applications that use Software Guard Extensions as a privacy enhancing technology …
Sesame: Practical End-to-End Privacy Compliance with Policy Containers and Privacy Regions
Web applications are governed by privacy policies, but developers lack practical
abstractions to ensure that their code actually abides by these policies. This leads to …
abstractions to ensure that their code actually abides by these policies. This leads to …
Modular information flow through ownership
Statically analyzing information flow, or how data influences other data within a program, is a
challenging task in imperative languages. Analyzing pointers and mutations requires access …
challenging task in imperative languages. Analyzing pointers and mutations requires access …
{STORM}: Refinement types for secure web applications
We present Storm, a web framework that allows developers to build MVC applications with
compile-time enforcement of centrally specified data-dependent security policies. Storm …
compile-time enforcement of centrally specified data-dependent security policies. Storm …
Secwasm: Information flow control for WebAssembly
We introduce SecWasm, the first general purpose information-flow control system for
WebAssembly (Wasm), thus extending the safety guarantees offered by Wasm with …
WebAssembly (Wasm), thus extending the safety guarantees offered by Wasm with …