Academic literature on the topic 'Secure Compilation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure Compilation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secure Compilation"
Vu, Son Tuan, Albert Cohen, Arnaud De Grandmaison, Christophe Guillon, and Karine Heydemann. "Reconciling optimization with secure compilation." Proceedings of the ACM on Programming Languages 5, OOPSLA (October 20, 2021): 1–30. http://dx.doi.org/10.1145/3485519.
Full textPatrignani, Marco, Amal Ahmed, and Dave Clarke. "Formal Approaches to Secure Compilation." ACM Computing Surveys 51, no. 6 (February 27, 2019): 1–36. http://dx.doi.org/10.1145/3280984.
Full textPatrignani, Marco, and Deepak Garg. "Robustly Safe Compilation, an Efficient Form of Secure Compilation." ACM Transactions on Programming Languages and Systems 43, no. 1 (April 2021): 1–41. http://dx.doi.org/10.1145/3436809.
Full textPatrignani, Marco, Pieter Agten, Raoul Strackx, Bart Jacobs, Dave Clarke, and Frank Piessens. "Secure Compilation to Protected Module Architectures." ACM Transactions on Programming Languages and Systems 37, no. 2 (April 16, 2015): 1–50. http://dx.doi.org/10.1145/2699503.
Full textAbate, Carmine, Roberto Blanco, Ştefan Ciobâcă, Adrien Durier, Deepak Garg, Cătălin Hritţcu, Marco Patrignani, Éric Tanter, and Jérémy Thibault. "An Extended Account of Trace-relating Compiler Correctness and Secure Compilation." ACM Transactions on Programming Languages and Systems 43, no. 4 (December 31, 2021): 1–48. http://dx.doi.org/10.1145/3460860.
Full textAndrici, Cezar-Constantin, Ștefan Ciobâcă, Cătălin Hriţcu, Guido Martínez, Exequiel Rivas, Éric Tanter, and Théo Winterhalter. "Securing Verified IO Programs Against Unverified Code in F*." Proceedings of the ACM on Programming Languages 8, POPL (January 5, 2024): 2226–59. http://dx.doi.org/10.1145/3632916.
Full textBlanton, Marina, Dennis Murphy, and Chen Yuan. "Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (January 2024): 74–97. http://dx.doi.org/10.56553/popets-2024-0006.
Full textG, Selvakumar. "A Novel Approach for Remote Compilation using Docker Containers." International Journal of Computer Communication and Informatics 1, no. 1 (May 30, 2019): 46–51. http://dx.doi.org/10.34256/ijcci1918.
Full textJawade, Prashant Balkrishna, and S. Ramachandram. "Multi-objective secure task scheduling based on SLA in multi-cloud environment." Multiagent and Grid Systems 18, no. 1 (May 23, 2022): 65–85. http://dx.doi.org/10.3233/mgs-220362.
Full textZhang, Denghui, Lijing Ren, and Zhaoquan Gu. "Enhancing the Privacy of Network Services through Trusted Computing." Applied Sciences 12, no. 18 (September 14, 2022): 9191. http://dx.doi.org/10.3390/app12189191.
Full textDissertations / Theses on the topic "Secure Compilation"
Raimondi, Gautier. "Secure compilation against side channel attacks." Electronic Thesis or Diss., Université de Rennes (2023-....), 2023. http://www.theses.fr/2023URENS094.
Full textGiven their ubiquity, the security of computer systems is a major issue. In this thesis, we aim to guarantee security against a certain type of attack: timing side-channel attacks. These attacks use the execution time of a program to deduce information about the system. In particular, a program is said to be constant-time when it is not sensitive to this type of attack. This requires constraints on the program, which must neither make decisions using secret values, nor use one of these secrets to access memory. In this document, we present a method for guaranteeing the constant-time property of a program. This method is a high-level transformation, followed by compilation using Jasmin to preserve the property. We also present a proof of the security and semantic preservation of this method
Zinzindohoué-Marsaudon, Jean-Karim. "Secure, fast and verified cryptographic applications : a scalable approach." Thesis, Paris Sciences et Lettres (ComUE), 2018. http://www.theses.fr/2018PSLEE052/document.
Full textThe security of Internet applications relies crucially on the secure design and robust implementations of cryptographic algorithms and protocols. This thesis presents a new, scalable and extensible approach for verifying state-of-the-art bignum algorithms, found in popular cryptographic implementations. Our code and proofs are written in F∗, a proof-oriented language which offers a very rich and expressive type system. The natural way of writing and verifying higher-order functional code in F∗ prioritizes code sharing and proof composition, but this results in low performance for cryptographic code. We propose a new language, Low∗, a fragment of F∗ which can be seen as a shallow embedding of C in F∗ and safely compiled to C code. Nonetheless, Low∗ retains the full expressiveness and verification power of the F∗ system, at the specification and proof level. We use Low∗ to implement cryptographic code, incorporating state-of-the-art optimizations from existing C libraries. We use F∗ to verify this code for functional correctness, memory safety and secret in- dependence. We present HACL∗, a full-fledged and fully verified cryptographic library which boasts performance on par, if not better, with the reference C code. Several algorithms from HACL∗ are now part of NSS, Mozilla’s cryptographic library, notably used in the Firefox web browser and the Red Hat operating system. Eventually, we apply our techniques to miTLS, a verified implementation of the Transport Layer Security protocol. We show how they extend to cryptographic proofs, state-machine implementations and message parsing verification
Büscher, Niklas [Verfasser], Stefan [Akademischer Betreuer] Katzenbeisser, and Florian [Akademischer Betreuer] Kerschbaum. "Compilation for More Practical Secure Multi-Party Computation / Niklas Büscher ; Stefan Katzenbeisser, Florian Kerschbaum." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2018. http://d-nb.info/1179361792/34.
Full textScherer, Oliver [Verfasser], and V. [Akademischer Betreuer] Hagenmeyer. "Engineering of Reliable and Secure Software via Customizable Integrated Compilation Systems / Oliver Scherer ; Betreuer: V. Hagenmeyer." Karlsruhe : KIT-Bibliothek, 2021. http://d-nb.info/1238148239/34.
Full textPlanul, Jeremy. "Typage, compilation, et cryptographie pour la programmation repartie securisée." Phd thesis, Ecole Polytechnique X, 2012. http://pastel.archives-ouvertes.fr/pastel-00685356.
Full textBüscher, Niklas. "Compilation for More Practical Secure Multi-Party Computation." Phd thesis, 2018. https://tuprints.ulb.tu-darmstadt.de/8495/1/thesis_nbuescher_1.0.pdf.
Full textCheng, Yu-Ju, and 鄭育如. "A Study of the Compilation of Mao Jin's Jin Dai "Secret" Books and A Selected Version Analysis of Its Collection." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/63541603394235326586.
Full text國立臺北大學
古典文獻學研究所
97
Mao Jin(1599-1659)is a renowned private book collector of the late Ming Dynasty. His outstanding achievements of a lifetime find expression in his Jigu Library Hall acquisition, his textual criticism of ancient books and his manuscript editing and block printing of them. Of these, The Jin Dai "Secret" Books is a collection of rare and extraordinary books encompassing all the Four Categories. And Xiaoxue ganzhu (a book about lesser learning by Wang Yinglin of the Sung Dynasty), Jindai shu (a book about local seasonal customs and activities by Hsiao tung of the Southern Dynasty of Liang) and Suihua jili (also about local seasonal customs and activities) were rare ancient books of very small circulation in Mao Jin’s time. They got to spread far and wide only after the publication of The Jin Dai "Secret" Books. Furthermore, when he compiled it for publication, Mao Jin laid special emphasis on the complete versions of its collection and prudently chose rare books and old editions for this purpose. Thus, The Jin Dai "Secret" Books represents, in a sense, the crown achievement of the Jigu Library Hall block-printed editions. It is far more valuable than what was published by booksellers of Mao Chin’s time and is no less than the icon of series of higher quality in the Ming Dynasty. This thesis focuses on two main themes: related literature on Mao Jin’s compilation of The Jin Dai "Secret" Books and a selected analysis of its collection. It consists of six chapters: Chapter 1 “Introduction” first explains the purpose of this thesis, then summarizes the results of previous studies and goes on to illustrate the scope and methodology of the research. Chapter 2 “The Story of Mao Jin’s Life, His Associations and His Achievements in Book Collection and Printing” tells the story of Mao’s life and illustrates his important associations as a lead for the understanding of the background to his career in book collection and publishing and his achievements in these fields. Chapter 3 “The Compilation of The Jin Dai "Secret" Books” examines the background to its compilation, the format in its compilation and printing, how the books were collected, special features of its layout and the circulation of the edition and its impact. Chapter 4 and Chapter 5 “A Selected Version Analysis of the Collection of The Jin Dai "Secret" Books (Part I &Part II, respectively)” look into certain titles included in The Jin Dai "Secret" Books with an aim to sort out the origins of their versions while conducting some textual criticism of them in comparison with other existing important series editions to check their quality and judge the value of their versions. In question are Za jia (the Miscellaneous schools), Lei shu (Encyclopedias) and Xiao shuo jia (Story tellers) under the Category of Zi (Masters or Philosophers), as well as Bie ji (Individual collections) under the Category of Ji (Collections). Chapter 6 “Conclusion” makes a summary of the features, value and drawbacks of The Jin Dai "Secret" Books and gives it a fair integral evaluation to highlight its value as literature and its academic standing, based on the results of this research.
Books on the topic "Secure Compilation"
Büscher, Niklas, and Stefan Katzenbeisser. Compilation for Secure Multi-party Computation. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0.
Full textKuvarika, Sekai. Acting to secure children's rights: Legal protection and recourse : a case study compilation and call to action : evidence from the work of Justice for Children Trust. Harare: Tatu Multimedia Productions (Private) Limited, 2010.
Find full textKatzenbeisser, Stefan, and Niklas Büscher. Compilation for Secure Multi-party Computation. Springer, 2017.
Find full textShin, Hyun Bang, Murray Mckenzie, and Do Young Oh, eds. COVID-19 in Southeast Asia: Insights for a post-pandemic world. LSE Press, 2022. http://dx.doi.org/10.31389/lsepress.cov.
Full textBook chapters on the topic "Secure Compilation"
Namjoshi, Kedar S., and Lucas M. Tabajara. "Witnessing Secure Compilation." In Lecture Notes in Computer Science, 1–22. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39322-9_1.
Full textTsampas, Stelios, Andreas Nuyts, Dominique Devriese, and Frank Piessens. "A Categorical Approach to Secure Compilation." In Coalgebraic Methods in Computer Science, 155–79. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57201-3_9.
Full textBüscher, Niklas, and Stefan Katzenbeisser. "Towards Scalable and Optimizing Compilation for MPC." In Compilation for Secure Multi-party Computation, 79–85. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_7.
Full textBüscher, Niklas, and Stefan Katzenbeisser. "Introduction." In Compilation for Secure Multi-party Computation, 1–4. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_1.
Full textBüscher, Niklas, and Stefan Katzenbeisser. "Background." In Compilation for Secure Multi-party Computation, 5–13. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_2.
Full textBüscher, Niklas, and Stefan Katzenbeisser. "Compiling ANSI-C Code into Boolean Circuits." In Compilation for Secure Multi-party Computation, 15–28. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_3.
Full textBüscher, Niklas, and Stefan Katzenbeisser. "Compiling Size-Optimized Circuits for Constant-Round MPC Protocols." In Compilation for Secure Multi-party Computation, 29–42. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_4.
Full textBüscher, Niklas, and Stefan Katzenbeisser. "Compiling Parallel Circuits." In Compilation for Secure Multi-party Computation, 43–59. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_5.
Full textBüscher, Niklas, and Stefan Katzenbeisser. "Compiling Depth-Optimized Circuits for Multi-Round MPC Protocols." In Compilation for Secure Multi-party Computation, 61–77. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_6.
Full textAbate, Carmine, Roberto Blanco, Ștefan Ciobâcă, Adrien Durier, Deepak Garg, Cătălin Hrițcu, Marco Patrignani, Éric Tanter, and Jérémy Thibault. "Trace-Relating Compiler Correctness and Secure Compilation." In Programming Languages and Systems, 1–28. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44914-8_1.
Full textConference papers on the topic "Secure Compilation"
Blazy, Sandrine. "From Verified Compilation to Secure Compilation: a Semantic Approach." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3411506.3417601.
Full textAgten, Pieter, Raoul Strackx, Bart Jacobs, and Frank Piessens. "Secure Compilation to Modern Processors." In 2012 IEEE 25th Computer Security Foundations Symposium (CSF). IEEE, 2012. http://dx.doi.org/10.1109/csf.2012.12.
Full textPatrignani, Marco, and Deepak Garg. "Secure Compilation and Hyperproperty Preservation." In 2017 IEEE 30th Computer Security Foundations Symposium (CSF). IEEE, 2017. http://dx.doi.org/10.1109/csf.2017.13.
Full textBarthe, Gilles, Sandrine Blazy, Remi Hutin, and David Pichardie. "Secure Compilation of Constant-Resource Programs." In 2021 IEEE 34th Computer Security Foundations Symposium (CSF). IEEE, 2021. http://dx.doi.org/10.1109/csf51468.2021.00020.
Full textBaltopoulos, Ioannis G., and Andrew D. Gordon. "Secure compilation of a multi-tier web language." In the 4th international workshop. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1481861.1481866.
Full textVu, Son Tuan, Karine Heydemann, Arnaud de Grandmaison, and Albert Cohen. "Secure delivery of program properties through optimizing compilation." In CC '20: 29th International Conference on Compiler Construction. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3377555.3377897.
Full textRodriguez, Rafael, Derek Copold, Mark Milkovisch, Christopher Babin, Rafael Ramirez, and Ibrahim Ugah. "Light Intervention Platform for 28,500-psi Environments." In SPE 2023 Symposium Compilation. SPE, 2023. http://dx.doi.org/10.2118/215185-ms.
Full textAbate, Carmine, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani, and Jeremy Thibault. "Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation." In 2019 IEEE 32nd Computer Security Foundations Symposium (CSF). IEEE, 2019. http://dx.doi.org/10.1109/csf.2019.00025.
Full textBarthe, Gilles, Benjamin Gregoire, and Vincent Laporte. "Secure Compilation of Side-Channel Countermeasures: The Case of Cryptographic “Constant-Time”." In 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE, 2018. http://dx.doi.org/10.1109/csf.2018.00031.
Full textBruce, Thomas J., and Arild F. Stein. "A New Approach to Barrier Verification." In SPE 2021 Symposium Compilation. SPE, 2021. http://dx.doi.org/10.2118/205833-ms.
Full textReports on the topic "Secure Compilation"
Hovorka, Susan. SECARB Finalize, Distribute and Archive Subsurface Data Compilation. Office of Scientific and Technical Information (OSTI), August 2012. http://dx.doi.org/10.2172/1821444.
Full text