Добірка наукової літератури з теми "Secure Compilation"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Secure Compilation".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Secure Compilation"
Vu, Son Tuan, Albert Cohen, Arnaud De Grandmaison, Christophe Guillon, and Karine Heydemann. "Reconciling optimization with secure compilation." Proceedings of the ACM on Programming Languages 5, OOPSLA (October 20, 2021): 1–30. http://dx.doi.org/10.1145/3485519.
Повний текст джерелаPatrignani, Marco, Amal Ahmed, and Dave Clarke. "Formal Approaches to Secure Compilation." ACM Computing Surveys 51, no. 6 (February 27, 2019): 1–36. http://dx.doi.org/10.1145/3280984.
Повний текст джерелаPatrignani, Marco, and Deepak Garg. "Robustly Safe Compilation, an Efficient Form of Secure Compilation." ACM Transactions on Programming Languages and Systems 43, no. 1 (April 2021): 1–41. http://dx.doi.org/10.1145/3436809.
Повний текст джерелаPatrignani, Marco, Pieter Agten, Raoul Strackx, Bart Jacobs, Dave Clarke, and Frank Piessens. "Secure Compilation to Protected Module Architectures." ACM Transactions on Programming Languages and Systems 37, no. 2 (April 16, 2015): 1–50. http://dx.doi.org/10.1145/2699503.
Повний текст джерелаAbate, Carmine, Roberto Blanco, Ştefan Ciobâcă, Adrien Durier, Deepak Garg, Cătălin Hritţcu, Marco Patrignani, Éric Tanter, and Jérémy Thibault. "An Extended Account of Trace-relating Compiler Correctness and Secure Compilation." ACM Transactions on Programming Languages and Systems 43, no. 4 (December 31, 2021): 1–48. http://dx.doi.org/10.1145/3460860.
Повний текст джерелаAndrici, Cezar-Constantin, Ștefan Ciobâcă, Cătălin Hriţcu, Guido Martínez, Exequiel Rivas, Éric Tanter, and Théo Winterhalter. "Securing Verified IO Programs Against Unverified Code in F*." Proceedings of the ACM on Programming Languages 8, POPL (January 5, 2024): 2226–59. http://dx.doi.org/10.1145/3632916.
Повний текст джерелаBlanton, Marina, Dennis Murphy, and Chen Yuan. "Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (January 2024): 74–97. http://dx.doi.org/10.56553/popets-2024-0006.
Повний текст джерелаG, Selvakumar. "A Novel Approach for Remote Compilation using Docker Containers." International Journal of Computer Communication and Informatics 1, no. 1 (May 30, 2019): 46–51. http://dx.doi.org/10.34256/ijcci1918.
Повний текст джерелаJawade, Prashant Balkrishna, and S. Ramachandram. "Multi-objective secure task scheduling based on SLA in multi-cloud environment." Multiagent and Grid Systems 18, no. 1 (May 23, 2022): 65–85. http://dx.doi.org/10.3233/mgs-220362.
Повний текст джерелаZhang, Denghui, Lijing Ren, and Zhaoquan Gu. "Enhancing the Privacy of Network Services through Trusted Computing." Applied Sciences 12, no. 18 (September 14, 2022): 9191. http://dx.doi.org/10.3390/app12189191.
Повний текст джерелаДисертації з теми "Secure Compilation"
Raimondi, Gautier. "Secure compilation against side channel attacks." Electronic Thesis or Diss., Université de Rennes (2023-....), 2023. http://www.theses.fr/2023URENS094.
Повний текст джерелаGiven their ubiquity, the security of computer systems is a major issue. In this thesis, we aim to guarantee security against a certain type of attack: timing side-channel attacks. These attacks use the execution time of a program to deduce information about the system. In particular, a program is said to be constant-time when it is not sensitive to this type of attack. This requires constraints on the program, which must neither make decisions using secret values, nor use one of these secrets to access memory. In this document, we present a method for guaranteeing the constant-time property of a program. This method is a high-level transformation, followed by compilation using Jasmin to preserve the property. We also present a proof of the security and semantic preservation of this method
Zinzindohoué-Marsaudon, Jean-Karim. "Secure, fast and verified cryptographic applications : a scalable approach." Thesis, Paris Sciences et Lettres (ComUE), 2018. http://www.theses.fr/2018PSLEE052/document.
Повний текст джерелаThe security of Internet applications relies crucially on the secure design and robust implementations of cryptographic algorithms and protocols. This thesis presents a new, scalable and extensible approach for verifying state-of-the-art bignum algorithms, found in popular cryptographic implementations. Our code and proofs are written in F∗, a proof-oriented language which offers a very rich and expressive type system. The natural way of writing and verifying higher-order functional code in F∗ prioritizes code sharing and proof composition, but this results in low performance for cryptographic code. We propose a new language, Low∗, a fragment of F∗ which can be seen as a shallow embedding of C in F∗ and safely compiled to C code. Nonetheless, Low∗ retains the full expressiveness and verification power of the F∗ system, at the specification and proof level. We use Low∗ to implement cryptographic code, incorporating state-of-the-art optimizations from existing C libraries. We use F∗ to verify this code for functional correctness, memory safety and secret in- dependence. We present HACL∗, a full-fledged and fully verified cryptographic library which boasts performance on par, if not better, with the reference C code. Several algorithms from HACL∗ are now part of NSS, Mozilla’s cryptographic library, notably used in the Firefox web browser and the Red Hat operating system. Eventually, we apply our techniques to miTLS, a verified implementation of the Transport Layer Security protocol. We show how they extend to cryptographic proofs, state-machine implementations and message parsing verification
Büscher, Niklas [Verfasser], Stefan [Akademischer Betreuer] Katzenbeisser, and Florian [Akademischer Betreuer] Kerschbaum. "Compilation for More Practical Secure Multi-Party Computation / Niklas Büscher ; Stefan Katzenbeisser, Florian Kerschbaum." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2018. http://d-nb.info/1179361792/34.
Повний текст джерелаScherer, Oliver [Verfasser], and V. [Akademischer Betreuer] Hagenmeyer. "Engineering of Reliable and Secure Software via Customizable Integrated Compilation Systems / Oliver Scherer ; Betreuer: V. Hagenmeyer." Karlsruhe : KIT-Bibliothek, 2021. http://d-nb.info/1238148239/34.
Повний текст джерелаPlanul, Jeremy. "Typage, compilation, et cryptographie pour la programmation repartie securisée." Phd thesis, Ecole Polytechnique X, 2012. http://pastel.archives-ouvertes.fr/pastel-00685356.
Повний текст джерелаBüscher, Niklas. "Compilation for More Practical Secure Multi-Party Computation." Phd thesis, 2018. https://tuprints.ulb.tu-darmstadt.de/8495/1/thesis_nbuescher_1.0.pdf.
Повний текст джерелаCheng, Yu-Ju, and 鄭育如. "A Study of the Compilation of Mao Jin's Jin Dai "Secret" Books and A Selected Version Analysis of Its Collection." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/63541603394235326586.
Повний текст джерела國立臺北大學
古典文獻學研究所
97
Mao Jin(1599-1659)is a renowned private book collector of the late Ming Dynasty. His outstanding achievements of a lifetime find expression in his Jigu Library Hall acquisition, his textual criticism of ancient books and his manuscript editing and block printing of them. Of these, The Jin Dai "Secret" Books is a collection of rare and extraordinary books encompassing all the Four Categories. And Xiaoxue ganzhu (a book about lesser learning by Wang Yinglin of the Sung Dynasty), Jindai shu (a book about local seasonal customs and activities by Hsiao tung of the Southern Dynasty of Liang) and Suihua jili (also about local seasonal customs and activities) were rare ancient books of very small circulation in Mao Jin’s time. They got to spread far and wide only after the publication of The Jin Dai "Secret" Books. Furthermore, when he compiled it for publication, Mao Jin laid special emphasis on the complete versions of its collection and prudently chose rare books and old editions for this purpose. Thus, The Jin Dai "Secret" Books represents, in a sense, the crown achievement of the Jigu Library Hall block-printed editions. It is far more valuable than what was published by booksellers of Mao Chin’s time and is no less than the icon of series of higher quality in the Ming Dynasty. This thesis focuses on two main themes: related literature on Mao Jin’s compilation of The Jin Dai "Secret" Books and a selected analysis of its collection. It consists of six chapters: Chapter 1 “Introduction” first explains the purpose of this thesis, then summarizes the results of previous studies and goes on to illustrate the scope and methodology of the research. Chapter 2 “The Story of Mao Jin’s Life, His Associations and His Achievements in Book Collection and Printing” tells the story of Mao’s life and illustrates his important associations as a lead for the understanding of the background to his career in book collection and publishing and his achievements in these fields. Chapter 3 “The Compilation of The Jin Dai "Secret" Books” examines the background to its compilation, the format in its compilation and printing, how the books were collected, special features of its layout and the circulation of the edition and its impact. Chapter 4 and Chapter 5 “A Selected Version Analysis of the Collection of The Jin Dai "Secret" Books (Part I &Part II, respectively)” look into certain titles included in The Jin Dai "Secret" Books with an aim to sort out the origins of their versions while conducting some textual criticism of them in comparison with other existing important series editions to check their quality and judge the value of their versions. In question are Za jia (the Miscellaneous schools), Lei shu (Encyclopedias) and Xiao shuo jia (Story tellers) under the Category of Zi (Masters or Philosophers), as well as Bie ji (Individual collections) under the Category of Ji (Collections). Chapter 6 “Conclusion” makes a summary of the features, value and drawbacks of The Jin Dai "Secret" Books and gives it a fair integral evaluation to highlight its value as literature and its academic standing, based on the results of this research.
Книги з теми "Secure Compilation"
Büscher, Niklas, and Stefan Katzenbeisser. Compilation for Secure Multi-party Computation. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0.
Повний текст джерелаKuvarika, Sekai. Acting to secure children's rights: Legal protection and recourse : a case study compilation and call to action : evidence from the work of Justice for Children Trust. Harare: Tatu Multimedia Productions (Private) Limited, 2010.
Знайти повний текст джерелаKatzenbeisser, Stefan, and Niklas Büscher. Compilation for Secure Multi-party Computation. Springer, 2017.
Знайти повний текст джерелаShin, Hyun Bang, Murray Mckenzie, and Do Young Oh, eds. COVID-19 in Southeast Asia: Insights for a post-pandemic world. LSE Press, 2022. http://dx.doi.org/10.31389/lsepress.cov.
Повний текст джерелаЧастини книг з теми "Secure Compilation"
Namjoshi, Kedar S., and Lucas M. Tabajara. "Witnessing Secure Compilation." In Lecture Notes in Computer Science, 1–22. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39322-9_1.
Повний текст джерелаTsampas, Stelios, Andreas Nuyts, Dominique Devriese, and Frank Piessens. "A Categorical Approach to Secure Compilation." In Coalgebraic Methods in Computer Science, 155–79. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57201-3_9.
Повний текст джерелаBüscher, Niklas, and Stefan Katzenbeisser. "Towards Scalable and Optimizing Compilation for MPC." In Compilation for Secure Multi-party Computation, 79–85. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_7.
Повний текст джерелаBüscher, Niklas, and Stefan Katzenbeisser. "Introduction." In Compilation for Secure Multi-party Computation, 1–4. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_1.
Повний текст джерелаBüscher, Niklas, and Stefan Katzenbeisser. "Background." In Compilation for Secure Multi-party Computation, 5–13. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_2.
Повний текст джерелаBüscher, Niklas, and Stefan Katzenbeisser. "Compiling ANSI-C Code into Boolean Circuits." In Compilation for Secure Multi-party Computation, 15–28. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_3.
Повний текст джерелаBüscher, Niklas, and Stefan Katzenbeisser. "Compiling Size-Optimized Circuits for Constant-Round MPC Protocols." In Compilation for Secure Multi-party Computation, 29–42. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_4.
Повний текст джерелаBüscher, Niklas, and Stefan Katzenbeisser. "Compiling Parallel Circuits." In Compilation for Secure Multi-party Computation, 43–59. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_5.
Повний текст джерелаBüscher, Niklas, and Stefan Katzenbeisser. "Compiling Depth-Optimized Circuits for Multi-Round MPC Protocols." In Compilation for Secure Multi-party Computation, 61–77. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_6.
Повний текст джерелаAbate, Carmine, Roberto Blanco, Ștefan Ciobâcă, Adrien Durier, Deepak Garg, Cătălin Hrițcu, Marco Patrignani, Éric Tanter, and Jérémy Thibault. "Trace-Relating Compiler Correctness and Secure Compilation." In Programming Languages and Systems, 1–28. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44914-8_1.
Повний текст джерелаТези доповідей конференцій з теми "Secure Compilation"
Blazy, Sandrine. "From Verified Compilation to Secure Compilation: a Semantic Approach." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3411506.3417601.
Повний текст джерелаAgten, Pieter, Raoul Strackx, Bart Jacobs, and Frank Piessens. "Secure Compilation to Modern Processors." In 2012 IEEE 25th Computer Security Foundations Symposium (CSF). IEEE, 2012. http://dx.doi.org/10.1109/csf.2012.12.
Повний текст джерелаPatrignani, Marco, and Deepak Garg. "Secure Compilation and Hyperproperty Preservation." In 2017 IEEE 30th Computer Security Foundations Symposium (CSF). IEEE, 2017. http://dx.doi.org/10.1109/csf.2017.13.
Повний текст джерелаBarthe, Gilles, Sandrine Blazy, Remi Hutin, and David Pichardie. "Secure Compilation of Constant-Resource Programs." In 2021 IEEE 34th Computer Security Foundations Symposium (CSF). IEEE, 2021. http://dx.doi.org/10.1109/csf51468.2021.00020.
Повний текст джерелаBaltopoulos, Ioannis G., and Andrew D. Gordon. "Secure compilation of a multi-tier web language." In the 4th international workshop. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1481861.1481866.
Повний текст джерелаVu, Son Tuan, Karine Heydemann, Arnaud de Grandmaison, and Albert Cohen. "Secure delivery of program properties through optimizing compilation." In CC '20: 29th International Conference on Compiler Construction. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3377555.3377897.
Повний текст джерелаRodriguez, Rafael, Derek Copold, Mark Milkovisch, Christopher Babin, Rafael Ramirez, and Ibrahim Ugah. "Light Intervention Platform for 28,500-psi Environments." In SPE 2023 Symposium Compilation. SPE, 2023. http://dx.doi.org/10.2118/215185-ms.
Повний текст джерелаAbate, Carmine, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani, and Jeremy Thibault. "Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation." In 2019 IEEE 32nd Computer Security Foundations Symposium (CSF). IEEE, 2019. http://dx.doi.org/10.1109/csf.2019.00025.
Повний текст джерелаBarthe, Gilles, Benjamin Gregoire, and Vincent Laporte. "Secure Compilation of Side-Channel Countermeasures: The Case of Cryptographic “Constant-Time”." In 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE, 2018. http://dx.doi.org/10.1109/csf.2018.00031.
Повний текст джерелаBruce, Thomas J., and Arild F. Stein. "A New Approach to Barrier Verification." In SPE 2021 Symposium Compilation. SPE, 2021. http://dx.doi.org/10.2118/205833-ms.
Повний текст джерелаЗвіти організацій з теми "Secure Compilation"
Hovorka, Susan. SECARB Finalize, Distribute and Archive Subsurface Data Compilation. Office of Scientific and Technical Information (OSTI), August 2012. http://dx.doi.org/10.2172/1821444.
Повний текст джерела