2021
DOI: 10.1017/s0956796821000162
|View full text |Cite
|
Sign up to set email alerts
|

Verified secure compilation for mixed-sensitivity concurrent programs

Abstract: Proving only over source code that programs do not leak sensitive data leaves a gap between reasoning and reality that can only be filled by accounting for the behaviour of the compiler. Furthermore, software does not always have the luxury of limiting itself to single-threaded computation with resources statically dedicated to each user to ensure the confidentiality of their data. This results in mixed-sensitivity concurrent programs, which might reuse memory shared between their threads to hold data of diffe… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(10 citation statements)
references
References 34 publications
0
10
0
Order By: Relevance
“…Secure compilation of information-flow guarantees A long line of work [8,9,10,11,12,34,44,45] develops proof techniques and verified compilers to ensure that information flow properties like non-interference, the constant-time policy, or side-channel resistance are preserved by compilation. These techniques, however, are all concerned with whole-programs, unlike our work that starts with the premise that partial programs will interact with untrusted code.…”
Section: Related Workmentioning
confidence: 99%
“…Secure compilation of information-flow guarantees A long line of work [8,9,10,11,12,34,44,45] develops proof techniques and verified compilers to ensure that information flow properties like non-interference, the constant-time policy, or side-channel resistance are preserved by compilation. These techniques, however, are all concerned with whole-programs, unlike our work that starts with the premise that partial programs will interact with untrusted code.…”
Section: Related Workmentioning
confidence: 99%
“…Discharging this once-off noncompositional proof obligation is crucial in enabling both composition of per-thread noninterference properties (using Theorem 2.8), and compositional whole-system secure refinement noninterference down to RISC by our compiler (using Theorem 2.23). Further details on the proof techniques for the per-thread noninterference and local-mode-compliance properties are relegated to Sison (2020), as well as Murray et al (2016b,c) from which they were adapted.…”
Section: Respects-own-guarantees (Tpsmentioning
confidence: 99%
“…To ensure that the While evaluation semantics is defined for all possible configurations, the LOCKINVALID rule defines a stuttering evaluation step for attempts to unlock(k) that are an apparent violation of the locking discipline due to not having previously acquired the lock k. Program developers can rely on a local mode compliance check to reject programs that misbehave in attempting to do this; details are relegated to Sison (2020).…”
Section: Locking Discipline and Its Semanticsmentioning
confidence: 99%
See 2 more Smart Citations