Literatura académica sobre el tema "Secure Compilation"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Secure Compilation".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Secure Compilation"
Vu, Son Tuan, Albert Cohen, Arnaud De Grandmaison, Christophe Guillon y Karine Heydemann. "Reconciling optimization with secure compilation". Proceedings of the ACM on Programming Languages 5, OOPSLA (20 de octubre de 2021): 1–30. http://dx.doi.org/10.1145/3485519.
Texto completoPatrignani, Marco, Amal Ahmed y Dave Clarke. "Formal Approaches to Secure Compilation". ACM Computing Surveys 51, n.º 6 (27 de febrero de 2019): 1–36. http://dx.doi.org/10.1145/3280984.
Texto completoPatrignani, Marco y Deepak Garg. "Robustly Safe Compilation, an Efficient Form of Secure Compilation". ACM Transactions on Programming Languages and Systems 43, n.º 1 (abril de 2021): 1–41. http://dx.doi.org/10.1145/3436809.
Texto completoPatrignani, Marco, Pieter Agten, Raoul Strackx, Bart Jacobs, Dave Clarke y Frank Piessens. "Secure Compilation to Protected Module Architectures". ACM Transactions on Programming Languages and Systems 37, n.º 2 (16 de abril de 2015): 1–50. http://dx.doi.org/10.1145/2699503.
Texto completoAbate, Carmine, Roberto Blanco, Ştefan Ciobâcă, Adrien Durier, Deepak Garg, Cătălin Hritţcu, Marco Patrignani, Éric Tanter y Jérémy Thibault. "An Extended Account of Trace-relating Compiler Correctness and Secure Compilation". ACM Transactions on Programming Languages and Systems 43, n.º 4 (31 de diciembre de 2021): 1–48. http://dx.doi.org/10.1145/3460860.
Texto completoAndrici, Cezar-Constantin, Ștefan Ciobâcă, Cătălin Hriţcu, Guido Martínez, Exequiel Rivas, Éric Tanter y Théo Winterhalter. "Securing Verified IO Programs Against Unverified Code in F*". Proceedings of the ACM on Programming Languages 8, POPL (5 de enero de 2024): 2226–59. http://dx.doi.org/10.1145/3632916.
Texto completoBlanton, Marina, Dennis Murphy y Chen Yuan. "Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits". Proceedings on Privacy Enhancing Technologies 2024, n.º 1 (enero de 2024): 74–97. http://dx.doi.org/10.56553/popets-2024-0006.
Texto completoG, Selvakumar. "A Novel Approach for Remote Compilation using Docker Containers". International Journal of Computer Communication and Informatics 1, n.º 1 (30 de mayo de 2019): 46–51. http://dx.doi.org/10.34256/ijcci1918.
Texto completoJawade, Prashant Balkrishna y S. Ramachandram. "Multi-objective secure task scheduling based on SLA in multi-cloud environment". Multiagent and Grid Systems 18, n.º 1 (23 de mayo de 2022): 65–85. http://dx.doi.org/10.3233/mgs-220362.
Texto completoZhang, Denghui, Lijing Ren y Zhaoquan Gu. "Enhancing the Privacy of Network Services through Trusted Computing". Applied Sciences 12, n.º 18 (14 de septiembre de 2022): 9191. http://dx.doi.org/10.3390/app12189191.
Texto completoTesis sobre el tema "Secure Compilation"
Raimondi, Gautier. "Secure compilation against side channel attacks". Electronic Thesis or Diss., Université de Rennes (2023-....), 2023. http://www.theses.fr/2023URENS094.
Texto completoGiven their ubiquity, the security of computer systems is a major issue. In this thesis, we aim to guarantee security against a certain type of attack: timing side-channel attacks. These attacks use the execution time of a program to deduce information about the system. In particular, a program is said to be constant-time when it is not sensitive to this type of attack. This requires constraints on the program, which must neither make decisions using secret values, nor use one of these secrets to access memory. In this document, we present a method for guaranteeing the constant-time property of a program. This method is a high-level transformation, followed by compilation using Jasmin to preserve the property. We also present a proof of the security and semantic preservation of this method
Zinzindohoué-Marsaudon, Jean-Karim. "Secure, fast and verified cryptographic applications : a scalable approach". Thesis, Paris Sciences et Lettres (ComUE), 2018. http://www.theses.fr/2018PSLEE052/document.
Texto completoThe security of Internet applications relies crucially on the secure design and robust implementations of cryptographic algorithms and protocols. This thesis presents a new, scalable and extensible approach for verifying state-of-the-art bignum algorithms, found in popular cryptographic implementations. Our code and proofs are written in F∗, a proof-oriented language which offers a very rich and expressive type system. The natural way of writing and verifying higher-order functional code in F∗ prioritizes code sharing and proof composition, but this results in low performance for cryptographic code. We propose a new language, Low∗, a fragment of F∗ which can be seen as a shallow embedding of C in F∗ and safely compiled to C code. Nonetheless, Low∗ retains the full expressiveness and verification power of the F∗ system, at the specification and proof level. We use Low∗ to implement cryptographic code, incorporating state-of-the-art optimizations from existing C libraries. We use F∗ to verify this code for functional correctness, memory safety and secret in- dependence. We present HACL∗, a full-fledged and fully verified cryptographic library which boasts performance on par, if not better, with the reference C code. Several algorithms from HACL∗ are now part of NSS, Mozilla’s cryptographic library, notably used in the Firefox web browser and the Red Hat operating system. Eventually, we apply our techniques to miTLS, a verified implementation of the Transport Layer Security protocol. We show how they extend to cryptographic proofs, state-machine implementations and message parsing verification
Büscher, Niklas [Verfasser], Stefan [Akademischer Betreuer] Katzenbeisser y Florian [Akademischer Betreuer] Kerschbaum. "Compilation for More Practical Secure Multi-Party Computation / Niklas Büscher ; Stefan Katzenbeisser, Florian Kerschbaum". Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2018. http://d-nb.info/1179361792/34.
Texto completoScherer, Oliver [Verfasser] y V. [Akademischer Betreuer] Hagenmeyer. "Engineering of Reliable and Secure Software via Customizable Integrated Compilation Systems / Oliver Scherer ; Betreuer: V. Hagenmeyer". Karlsruhe : KIT-Bibliothek, 2021. http://d-nb.info/1238148239/34.
Texto completoPlanul, Jeremy. "Typage, compilation, et cryptographie pour la programmation repartie securisée". Phd thesis, Ecole Polytechnique X, 2012. http://pastel.archives-ouvertes.fr/pastel-00685356.
Texto completoBüscher, Niklas. "Compilation for More Practical Secure Multi-Party Computation". Phd thesis, 2018. https://tuprints.ulb.tu-darmstadt.de/8495/1/thesis_nbuescher_1.0.pdf.
Texto completoCheng, Yu-Ju y 鄭育如. "A Study of the Compilation of Mao Jin's Jin Dai "Secret" Books and A Selected Version Analysis of Its Collection". Thesis, 2009. http://ndltd.ncl.edu.tw/handle/63541603394235326586.
Texto completo國立臺北大學
古典文獻學研究所
97
Mao Jin(1599-1659)is a renowned private book collector of the late Ming Dynasty. His outstanding achievements of a lifetime find expression in his Jigu Library Hall acquisition, his textual criticism of ancient books and his manuscript editing and block printing of them. Of these, The Jin Dai "Secret" Books is a collection of rare and extraordinary books encompassing all the Four Categories. And Xiaoxue ganzhu (a book about lesser learning by Wang Yinglin of the Sung Dynasty), Jindai shu (a book about local seasonal customs and activities by Hsiao tung of the Southern Dynasty of Liang) and Suihua jili (also about local seasonal customs and activities) were rare ancient books of very small circulation in Mao Jin’s time. They got to spread far and wide only after the publication of The Jin Dai "Secret" Books. Furthermore, when he compiled it for publication, Mao Jin laid special emphasis on the complete versions of its collection and prudently chose rare books and old editions for this purpose. Thus, The Jin Dai "Secret" Books represents, in a sense, the crown achievement of the Jigu Library Hall block-printed editions. It is far more valuable than what was published by booksellers of Mao Chin’s time and is no less than the icon of series of higher quality in the Ming Dynasty. This thesis focuses on two main themes: related literature on Mao Jin’s compilation of The Jin Dai "Secret" Books and a selected analysis of its collection. It consists of six chapters: Chapter 1 “Introduction” first explains the purpose of this thesis, then summarizes the results of previous studies and goes on to illustrate the scope and methodology of the research. Chapter 2 “The Story of Mao Jin’s Life, His Associations and His Achievements in Book Collection and Printing” tells the story of Mao’s life and illustrates his important associations as a lead for the understanding of the background to his career in book collection and publishing and his achievements in these fields. Chapter 3 “The Compilation of The Jin Dai "Secret" Books” examines the background to its compilation, the format in its compilation and printing, how the books were collected, special features of its layout and the circulation of the edition and its impact. Chapter 4 and Chapter 5 “A Selected Version Analysis of the Collection of The Jin Dai "Secret" Books (Part I &Part II, respectively)” look into certain titles included in The Jin Dai "Secret" Books with an aim to sort out the origins of their versions while conducting some textual criticism of them in comparison with other existing important series editions to check their quality and judge the value of their versions. In question are Za jia (the Miscellaneous schools), Lei shu (Encyclopedias) and Xiao shuo jia (Story tellers) under the Category of Zi (Masters or Philosophers), as well as Bie ji (Individual collections) under the Category of Ji (Collections). Chapter 6 “Conclusion” makes a summary of the features, value and drawbacks of The Jin Dai "Secret" Books and gives it a fair integral evaluation to highlight its value as literature and its academic standing, based on the results of this research.
Libros sobre el tema "Secure Compilation"
Büscher, Niklas y Stefan Katzenbeisser. Compilation for Secure Multi-party Computation. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0.
Texto completoKuvarika, Sekai. Acting to secure children's rights: Legal protection and recourse : a case study compilation and call to action : evidence from the work of Justice for Children Trust. Harare: Tatu Multimedia Productions (Private) Limited, 2010.
Buscar texto completoKatzenbeisser, Stefan y Niklas Büscher. Compilation for Secure Multi-party Computation. Springer, 2017.
Buscar texto completoShin, Hyun Bang, Murray Mckenzie y Do Young Oh, eds. COVID-19 in Southeast Asia: Insights for a post-pandemic world. LSE Press, 2022. http://dx.doi.org/10.31389/lsepress.cov.
Texto completoCapítulos de libros sobre el tema "Secure Compilation"
Namjoshi, Kedar S. y Lucas M. Tabajara. "Witnessing Secure Compilation". En Lecture Notes in Computer Science, 1–22. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39322-9_1.
Texto completoTsampas, Stelios, Andreas Nuyts, Dominique Devriese y Frank Piessens. "A Categorical Approach to Secure Compilation". En Coalgebraic Methods in Computer Science, 155–79. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57201-3_9.
Texto completoBüscher, Niklas y Stefan Katzenbeisser. "Towards Scalable and Optimizing Compilation for MPC". En Compilation for Secure Multi-party Computation, 79–85. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_7.
Texto completoBüscher, Niklas y Stefan Katzenbeisser. "Introduction". En Compilation for Secure Multi-party Computation, 1–4. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_1.
Texto completoBüscher, Niklas y Stefan Katzenbeisser. "Background". En Compilation for Secure Multi-party Computation, 5–13. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_2.
Texto completoBüscher, Niklas y Stefan Katzenbeisser. "Compiling ANSI-C Code into Boolean Circuits". En Compilation for Secure Multi-party Computation, 15–28. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_3.
Texto completoBüscher, Niklas y Stefan Katzenbeisser. "Compiling Size-Optimized Circuits for Constant-Round MPC Protocols". En Compilation for Secure Multi-party Computation, 29–42. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_4.
Texto completoBüscher, Niklas y Stefan Katzenbeisser. "Compiling Parallel Circuits". En Compilation for Secure Multi-party Computation, 43–59. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_5.
Texto completoBüscher, Niklas y Stefan Katzenbeisser. "Compiling Depth-Optimized Circuits for Multi-Round MPC Protocols". En Compilation for Secure Multi-party Computation, 61–77. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_6.
Texto completoAbate, Carmine, Roberto Blanco, Ștefan Ciobâcă, Adrien Durier, Deepak Garg, Cătălin Hrițcu, Marco Patrignani, Éric Tanter y Jérémy Thibault. "Trace-Relating Compiler Correctness and Secure Compilation". En Programming Languages and Systems, 1–28. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44914-8_1.
Texto completoActas de conferencias sobre el tema "Secure Compilation"
Blazy, Sandrine. "From Verified Compilation to Secure Compilation: a Semantic Approach". En CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3411506.3417601.
Texto completoAgten, Pieter, Raoul Strackx, Bart Jacobs y Frank Piessens. "Secure Compilation to Modern Processors". En 2012 IEEE 25th Computer Security Foundations Symposium (CSF). IEEE, 2012. http://dx.doi.org/10.1109/csf.2012.12.
Texto completoPatrignani, Marco y Deepak Garg. "Secure Compilation and Hyperproperty Preservation". En 2017 IEEE 30th Computer Security Foundations Symposium (CSF). IEEE, 2017. http://dx.doi.org/10.1109/csf.2017.13.
Texto completoBarthe, Gilles, Sandrine Blazy, Remi Hutin y David Pichardie. "Secure Compilation of Constant-Resource Programs". En 2021 IEEE 34th Computer Security Foundations Symposium (CSF). IEEE, 2021. http://dx.doi.org/10.1109/csf51468.2021.00020.
Texto completoBaltopoulos, Ioannis G. y Andrew D. Gordon. "Secure compilation of a multi-tier web language". En the 4th international workshop. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1481861.1481866.
Texto completoVu, Son Tuan, Karine Heydemann, Arnaud de Grandmaison y Albert Cohen. "Secure delivery of program properties through optimizing compilation". En CC '20: 29th International Conference on Compiler Construction. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3377555.3377897.
Texto completoRodriguez, Rafael, Derek Copold, Mark Milkovisch, Christopher Babin, Rafael Ramirez y Ibrahim Ugah. "Light Intervention Platform for 28,500-psi Environments". En SPE 2023 Symposium Compilation. SPE, 2023. http://dx.doi.org/10.2118/215185-ms.
Texto completoAbate, Carmine, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani y Jeremy Thibault. "Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation". En 2019 IEEE 32nd Computer Security Foundations Symposium (CSF). IEEE, 2019. http://dx.doi.org/10.1109/csf.2019.00025.
Texto completoBarthe, Gilles, Benjamin Gregoire y Vincent Laporte. "Secure Compilation of Side-Channel Countermeasures: The Case of Cryptographic “Constant-Time”". En 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE, 2018. http://dx.doi.org/10.1109/csf.2018.00031.
Texto completoBruce, Thomas J. y Arild F. Stein. "A New Approach to Barrier Verification". En SPE 2021 Symposium Compilation. SPE, 2021. http://dx.doi.org/10.2118/205833-ms.
Texto completoInformes sobre el tema "Secure Compilation"
Hovorka, Susan. SECARB Finalize, Distribute and Archive Subsurface Data Compilation. Office of Scientific and Technical Information (OSTI), agosto de 2012. http://dx.doi.org/10.2172/1821444.
Texto completo