2021 IEEE 34th Computer Security Foundations Symposium (CSF) 2021
DOI: 10.1109/csf51468.2021.00036
|View full text |Cite
|
Sign up to set email alerts
|

CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities Principle

Abstract: Capability machines such as CHERI provide memory capabilities that can be used by compilers to provide security benefits for compiled code (e.g., memory safety). The C to CHERI compiler, for example, achieves memory safety by following a principle called "pointers as capabilities" (PAC ).Informally, PAC says that a compiler should represent a source language pointer as a machine code capability. But the security properties of PAC compilers are not yet well understood. We show that memory safety is only one asp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
16
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(16 citation statements)
references
References 45 publications
0
16
0
Order By: Relevance
“…Consequently, information needed to reconstruct how to access the shared pointer is missing from interaction traces, which makes the back-translation extremely difficult. Prior work that has even considered this situation [18,38] relied on extensive bookkeeping to reconstruct this missing information, which is unwieldy and complex. For instance, the source context generated by El-Korashy et al [18] had to fetch all reachable pointers every time it got control and store them in its internal state.…”
Section: Data-flow Back-translationmentioning
confidence: 99%
See 4 more Smart Citations
“…Consequently, information needed to reconstruct how to access the shared pointer is missing from interaction traces, which makes the back-translation extremely difficult. Prior work that has even considered this situation [18,38] relied on extensive bookkeeping to reconstruct this missing information, which is unwieldy and complex. For instance, the source context generated by El-Korashy et al [18] had to fetch all reachable pointers every time it got control and store them in its internal state.…”
Section: Data-flow Back-translationmentioning
confidence: 99%
“…Prior work that has even considered this situation [18,38] relied on extensive bookkeeping to reconstruct this missing information, which is unwieldy and complex. For instance, the source context generated by El-Korashy et al [18] had to fetch all reachable pointers every time it got control and store them in its internal state. This required complex simulation invariants, on top of the usual invariants between the states of the target and source contexts.…”
Section: Data-flow Back-translationmentioning
confidence: 99%
See 3 more Smart Citations