(2019) Robustly Safe Compilation.
In: ESOP.
Conference:
ESOP European Symposium on Programming
|
Text
rsc-esop.pdf - Accepted Version Download (705kB) | Preview |
|
|
Text
rsc-esop.pdf Download (705kB) | Preview |
Official URL: https://doi.org/10.1007/978-3-030-17184-1_17
Abstract
Secure compilers generate compiled code that withstands many target-level attacks such as alteration of control flow, data leaks or memory corruption. Many existing secure compilers are proven to be fully abstract, meaning that they reflect and preserve observational equivalence. Fully abstract compilation is strong and useful but, in certain cases, comes at the cost of requiring expensive runtime constructs in compiled code. These constructs may have no relevance for security, but are needed to accommodate differences between the source and target languages that fully abstract compilation necessarily needs.
Item Type: | Conference or Workshop Item (A Paper) (Paper) |
---|---|
Divisions: | Cyber Security Lab (CSL) |
Conference: | ESOP European Symposium on Programming |
Depositing User: | Marco Patrignani |
Date Deposited: | 13 Mar 2020 17:43 |
Last Modified: | 13 Mar 2020 17:43 |
Primary Research Area: | NRA2: Reliable Security Guarantees |
URI: | https://publications.cispa.saarland/id/eprint/3042 |
Actions
Actions (login required)
View Item |