Littérature scientifique sur le sujet « Secure Compilation »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Secure Compilation ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Secure Compilation"
Vu, Son Tuan, Albert Cohen, Arnaud De Grandmaison, Christophe Guillon et Karine Heydemann. « Reconciling optimization with secure compilation ». Proceedings of the ACM on Programming Languages 5, OOPSLA (20 octobre 2021) : 1–30. http://dx.doi.org/10.1145/3485519.
Texte intégralPatrignani, Marco, Amal Ahmed et Dave Clarke. « Formal Approaches to Secure Compilation ». ACM Computing Surveys 51, no 6 (27 février 2019) : 1–36. http://dx.doi.org/10.1145/3280984.
Texte intégralPatrignani, Marco, et Deepak Garg. « Robustly Safe Compilation, an Efficient Form of Secure Compilation ». ACM Transactions on Programming Languages and Systems 43, no 1 (avril 2021) : 1–41. http://dx.doi.org/10.1145/3436809.
Texte intégralPatrignani, Marco, Pieter Agten, Raoul Strackx, Bart Jacobs, Dave Clarke et Frank Piessens. « Secure Compilation to Protected Module Architectures ». ACM Transactions on Programming Languages and Systems 37, no 2 (16 avril 2015) : 1–50. http://dx.doi.org/10.1145/2699503.
Texte intégralAbate, Carmine, Roberto Blanco, Ştefan Ciobâcă, Adrien Durier, Deepak Garg, Cătălin Hritţcu, Marco Patrignani, Éric Tanter et Jérémy Thibault. « An Extended Account of Trace-relating Compiler Correctness and Secure Compilation ». ACM Transactions on Programming Languages and Systems 43, no 4 (31 décembre 2021) : 1–48. http://dx.doi.org/10.1145/3460860.
Texte intégralAndrici, Cezar-Constantin, Ștefan Ciobâcă, Cătălin Hriţcu, Guido Martínez, Exequiel Rivas, Éric Tanter et Théo Winterhalter. « Securing Verified IO Programs Against Unverified Code in F* ». Proceedings of the ACM on Programming Languages 8, POPL (5 janvier 2024) : 2226–59. http://dx.doi.org/10.1145/3632916.
Texte intégralBlanton, Marina, Dennis Murphy et Chen Yuan. « Efficiently Compiling Secure Computation Protocols From Passive to Active Security : Beyond Arithmetic Circuits ». Proceedings on Privacy Enhancing Technologies 2024, no 1 (janvier 2024) : 74–97. http://dx.doi.org/10.56553/popets-2024-0006.
Texte intégralG, Selvakumar. « A Novel Approach for Remote Compilation using Docker Containers ». International Journal of Computer Communication and Informatics 1, no 1 (30 mai 2019) : 46–51. http://dx.doi.org/10.34256/ijcci1918.
Texte intégralJawade, Prashant Balkrishna, et S. Ramachandram. « Multi-objective secure task scheduling based on SLA in multi-cloud environment ». Multiagent and Grid Systems 18, no 1 (23 mai 2022) : 65–85. http://dx.doi.org/10.3233/mgs-220362.
Texte intégralZhang, Denghui, Lijing Ren et Zhaoquan Gu. « Enhancing the Privacy of Network Services through Trusted Computing ». Applied Sciences 12, no 18 (14 septembre 2022) : 9191. http://dx.doi.org/10.3390/app12189191.
Texte intégralThèses sur le sujet "Secure Compilation"
Raimondi, Gautier. « Secure compilation against side channel attacks ». Electronic Thesis or Diss., Université de Rennes (2023-....), 2023. http://www.theses.fr/2023URENS094.
Texte intégralGiven their ubiquity, the security of computer systems is a major issue. In this thesis, we aim to guarantee security against a certain type of attack: timing side-channel attacks. These attacks use the execution time of a program to deduce information about the system. In particular, a program is said to be constant-time when it is not sensitive to this type of attack. This requires constraints on the program, which must neither make decisions using secret values, nor use one of these secrets to access memory. In this document, we present a method for guaranteeing the constant-time property of a program. This method is a high-level transformation, followed by compilation using Jasmin to preserve the property. We also present a proof of the security and semantic preservation of this method
Zinzindohoué-Marsaudon, Jean-Karim. « Secure, fast and verified cryptographic applications : a scalable approach ». Thesis, Paris Sciences et Lettres (ComUE), 2018. http://www.theses.fr/2018PSLEE052/document.
Texte intégralThe security of Internet applications relies crucially on the secure design and robust implementations of cryptographic algorithms and protocols. This thesis presents a new, scalable and extensible approach for verifying state-of-the-art bignum algorithms, found in popular cryptographic implementations. Our code and proofs are written in F∗, a proof-oriented language which offers a very rich and expressive type system. The natural way of writing and verifying higher-order functional code in F∗ prioritizes code sharing and proof composition, but this results in low performance for cryptographic code. We propose a new language, Low∗, a fragment of F∗ which can be seen as a shallow embedding of C in F∗ and safely compiled to C code. Nonetheless, Low∗ retains the full expressiveness and verification power of the F∗ system, at the specification and proof level. We use Low∗ to implement cryptographic code, incorporating state-of-the-art optimizations from existing C libraries. We use F∗ to verify this code for functional correctness, memory safety and secret in- dependence. We present HACL∗, a full-fledged and fully verified cryptographic library which boasts performance on par, if not better, with the reference C code. Several algorithms from HACL∗ are now part of NSS, Mozilla’s cryptographic library, notably used in the Firefox web browser and the Red Hat operating system. Eventually, we apply our techniques to miTLS, a verified implementation of the Transport Layer Security protocol. We show how they extend to cryptographic proofs, state-machine implementations and message parsing verification
Büscher, Niklas [Verfasser], Stefan [Akademischer Betreuer] Katzenbeisser et Florian [Akademischer Betreuer] Kerschbaum. « Compilation for More Practical Secure Multi-Party Computation / Niklas Büscher ; Stefan Katzenbeisser, Florian Kerschbaum ». Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2018. http://d-nb.info/1179361792/34.
Texte intégralScherer, Oliver [Verfasser], et V. [Akademischer Betreuer] Hagenmeyer. « Engineering of Reliable and Secure Software via Customizable Integrated Compilation Systems / Oliver Scherer ; Betreuer : V. Hagenmeyer ». Karlsruhe : KIT-Bibliothek, 2021. http://d-nb.info/1238148239/34.
Texte intégralPlanul, Jeremy. « Typage, compilation, et cryptographie pour la programmation repartie securisée ». Phd thesis, Ecole Polytechnique X, 2012. http://pastel.archives-ouvertes.fr/pastel-00685356.
Texte intégralBüscher, Niklas. « Compilation for More Practical Secure Multi-Party Computation ». Phd thesis, 2018. https://tuprints.ulb.tu-darmstadt.de/8495/1/thesis_nbuescher_1.0.pdf.
Texte intégralCheng, Yu-Ju, et 鄭育如. « A Study of the Compilation of Mao Jin's Jin Dai "Secret" Books and A Selected Version Analysis of Its Collection ». Thesis, 2009. http://ndltd.ncl.edu.tw/handle/63541603394235326586.
Texte intégral國立臺北大學
古典文獻學研究所
97
Mao Jin(1599-1659)is a renowned private book collector of the late Ming Dynasty. His outstanding achievements of a lifetime find expression in his Jigu Library Hall acquisition, his textual criticism of ancient books and his manuscript editing and block printing of them. Of these, The Jin Dai "Secret" Books is a collection of rare and extraordinary books encompassing all the Four Categories. And Xiaoxue ganzhu (a book about lesser learning by Wang Yinglin of the Sung Dynasty), Jindai shu (a book about local seasonal customs and activities by Hsiao tung of the Southern Dynasty of Liang) and Suihua jili (also about local seasonal customs and activities) were rare ancient books of very small circulation in Mao Jin’s time. They got to spread far and wide only after the publication of The Jin Dai "Secret" Books. Furthermore, when he compiled it for publication, Mao Jin laid special emphasis on the complete versions of its collection and prudently chose rare books and old editions for this purpose. Thus, The Jin Dai "Secret" Books represents, in a sense, the crown achievement of the Jigu Library Hall block-printed editions. It is far more valuable than what was published by booksellers of Mao Chin’s time and is no less than the icon of series of higher quality in the Ming Dynasty. This thesis focuses on two main themes: related literature on Mao Jin’s compilation of The Jin Dai "Secret" Books and a selected analysis of its collection. It consists of six chapters: Chapter 1 “Introduction” first explains the purpose of this thesis, then summarizes the results of previous studies and goes on to illustrate the scope and methodology of the research. Chapter 2 “The Story of Mao Jin’s Life, His Associations and His Achievements in Book Collection and Printing” tells the story of Mao’s life and illustrates his important associations as a lead for the understanding of the background to his career in book collection and publishing and his achievements in these fields. Chapter 3 “The Compilation of The Jin Dai "Secret" Books” examines the background to its compilation, the format in its compilation and printing, how the books were collected, special features of its layout and the circulation of the edition and its impact. Chapter 4 and Chapter 5 “A Selected Version Analysis of the Collection of The Jin Dai "Secret" Books (Part I &Part II, respectively)” look into certain titles included in The Jin Dai "Secret" Books with an aim to sort out the origins of their versions while conducting some textual criticism of them in comparison with other existing important series editions to check their quality and judge the value of their versions. In question are Za jia (the Miscellaneous schools), Lei shu (Encyclopedias) and Xiao shuo jia (Story tellers) under the Category of Zi (Masters or Philosophers), as well as Bie ji (Individual collections) under the Category of Ji (Collections). Chapter 6 “Conclusion” makes a summary of the features, value and drawbacks of The Jin Dai "Secret" Books and gives it a fair integral evaluation to highlight its value as literature and its academic standing, based on the results of this research.
Livres sur le sujet "Secure Compilation"
Büscher, Niklas, et Stefan Katzenbeisser. Compilation for Secure Multi-party Computation. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0.
Texte intégralKuvarika, Sekai. Acting to secure children's rights : Legal protection and recourse : a case study compilation and call to action : evidence from the work of Justice for Children Trust. Harare : Tatu Multimedia Productions (Private) Limited, 2010.
Trouver le texte intégralKatzenbeisser, Stefan, et Niklas Büscher. Compilation for Secure Multi-party Computation. Springer, 2017.
Trouver le texte intégralShin, Hyun Bang, Murray Mckenzie et Do Young Oh, dir. COVID-19 in Southeast Asia : Insights for a post-pandemic world. LSE Press, 2022. http://dx.doi.org/10.31389/lsepress.cov.
Texte intégralChapitres de livres sur le sujet "Secure Compilation"
Namjoshi, Kedar S., et Lucas M. Tabajara. « Witnessing Secure Compilation ». Dans Lecture Notes in Computer Science, 1–22. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39322-9_1.
Texte intégralTsampas, Stelios, Andreas Nuyts, Dominique Devriese et Frank Piessens. « A Categorical Approach to Secure Compilation ». Dans Coalgebraic Methods in Computer Science, 155–79. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57201-3_9.
Texte intégralBüscher, Niklas, et Stefan Katzenbeisser. « Towards Scalable and Optimizing Compilation for MPC ». Dans Compilation for Secure Multi-party Computation, 79–85. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_7.
Texte intégralBüscher, Niklas, et Stefan Katzenbeisser. « Introduction ». Dans Compilation for Secure Multi-party Computation, 1–4. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_1.
Texte intégralBüscher, Niklas, et Stefan Katzenbeisser. « Background ». Dans Compilation for Secure Multi-party Computation, 5–13. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_2.
Texte intégralBüscher, Niklas, et Stefan Katzenbeisser. « Compiling ANSI-C Code into Boolean Circuits ». Dans Compilation for Secure Multi-party Computation, 15–28. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_3.
Texte intégralBüscher, Niklas, et Stefan Katzenbeisser. « Compiling Size-Optimized Circuits for Constant-Round MPC Protocols ». Dans Compilation for Secure Multi-party Computation, 29–42. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_4.
Texte intégralBüscher, Niklas, et Stefan Katzenbeisser. « Compiling Parallel Circuits ». Dans Compilation for Secure Multi-party Computation, 43–59. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_5.
Texte intégralBüscher, Niklas, et Stefan Katzenbeisser. « Compiling Depth-Optimized Circuits for Multi-Round MPC Protocols ». Dans Compilation for Secure Multi-party Computation, 61–77. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_6.
Texte intégralAbate, Carmine, Roberto Blanco, Ștefan Ciobâcă, Adrien Durier, Deepak Garg, Cătălin Hrițcu, Marco Patrignani, Éric Tanter et Jérémy Thibault. « Trace-Relating Compiler Correctness and Secure Compilation ». Dans Programming Languages and Systems, 1–28. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44914-8_1.
Texte intégralActes de conférences sur le sujet "Secure Compilation"
Blazy, Sandrine. « From Verified Compilation to Secure Compilation : a Semantic Approach ». Dans CCS '20 : 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA : ACM, 2020. http://dx.doi.org/10.1145/3411506.3417601.
Texte intégralAgten, Pieter, Raoul Strackx, Bart Jacobs et Frank Piessens. « Secure Compilation to Modern Processors ». Dans 2012 IEEE 25th Computer Security Foundations Symposium (CSF). IEEE, 2012. http://dx.doi.org/10.1109/csf.2012.12.
Texte intégralPatrignani, Marco, et Deepak Garg. « Secure Compilation and Hyperproperty Preservation ». Dans 2017 IEEE 30th Computer Security Foundations Symposium (CSF). IEEE, 2017. http://dx.doi.org/10.1109/csf.2017.13.
Texte intégralBarthe, Gilles, Sandrine Blazy, Remi Hutin et David Pichardie. « Secure Compilation of Constant-Resource Programs ». Dans 2021 IEEE 34th Computer Security Foundations Symposium (CSF). IEEE, 2021. http://dx.doi.org/10.1109/csf51468.2021.00020.
Texte intégralBaltopoulos, Ioannis G., et Andrew D. Gordon. « Secure compilation of a multi-tier web language ». Dans the 4th international workshop. New York, New York, USA : ACM Press, 2008. http://dx.doi.org/10.1145/1481861.1481866.
Texte intégralVu, Son Tuan, Karine Heydemann, Arnaud de Grandmaison et Albert Cohen. « Secure delivery of program properties through optimizing compilation ». Dans CC '20 : 29th International Conference on Compiler Construction. New York, NY, USA : ACM, 2020. http://dx.doi.org/10.1145/3377555.3377897.
Texte intégralRodriguez, Rafael, Derek Copold, Mark Milkovisch, Christopher Babin, Rafael Ramirez et Ibrahim Ugah. « Light Intervention Platform for 28,500-psi Environments ». Dans SPE 2023 Symposium Compilation. SPE, 2023. http://dx.doi.org/10.2118/215185-ms.
Texte intégralAbate, Carmine, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani et Jeremy Thibault. « Journey Beyond Full Abstraction : Exploring Robust Property Preservation for Secure Compilation ». Dans 2019 IEEE 32nd Computer Security Foundations Symposium (CSF). IEEE, 2019. http://dx.doi.org/10.1109/csf.2019.00025.
Texte intégralBarthe, Gilles, Benjamin Gregoire et Vincent Laporte. « Secure Compilation of Side-Channel Countermeasures : The Case of Cryptographic “Constant-Time” ». Dans 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE, 2018. http://dx.doi.org/10.1109/csf.2018.00031.
Texte intégralBruce, Thomas J., et Arild F. Stein. « A New Approach to Barrier Verification ». Dans SPE 2021 Symposium Compilation. SPE, 2021. http://dx.doi.org/10.2118/205833-ms.
Texte intégralRapports d'organisations sur le sujet "Secure Compilation"
Hovorka, Susan. SECARB Finalize, Distribute and Archive Subsurface Data Compilation. Office of Scientific and Technical Information (OSTI), août 2012. http://dx.doi.org/10.2172/1821444.
Texte intégral