2020
DOI: 10.1007/978-3-030-44914-8_1
|View full text |Cite
|
Sign up to set email alerts
|

Trace-Relating Compiler Correctness and Secure Compilation

Abstract: Compiler correctness is, in its simplest form, defined as the inclusion of the set of traces of the compiled program into the set of traces of the original program, which is equivalent to the preservation of all trace properties. Here traces collect, for instance, the externally observable events of each execution. This definition requires, however, the set of traces of the source and target languages to be exactly the same, which is not the case when the languages are far apart or when observations are fine g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
14
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(15 citation statements)
references
References 65 publications
1
14
0
Order By: Relevance
“…We extend both languages by allowing safe pointers to be passed to and dereferenced by other components, thus introducing dynamic memory sharing. We then prove again that this extended compilation step is secure with respect to a criterion called "robust safety preservation" [4,5,37]. For this, we apply our two new techniques, data-flow back-translation and turn-taking simulations.…”
Section: Concrete Settingmentioning
confidence: 88%
“…We extend both languages by allowing safe pointers to be passed to and dereferenced by other components, thus introducing dynamic memory sharing. We then prove again that this extended compilation step is secure with respect to a criterion called "robust safety preservation" [4,5,37]. For this, we apply our two new techniques, data-flow back-translation and turn-taking simulations.…”
Section: Concrete Settingmentioning
confidence: 88%
“…A plethora of defense techniques and approaches have been proposed and applied in different domains and contexts for the above-mentioned issues. Among these techniques are Security Policy Enforcement ( Herrmann & Murari, 2004 ; Sicari et al, 2016 ; Neisse, Steri & Baldini, 2014 ; Keromytis & Wright, 2000 ; Adi, Hamza & Pene, 2018 ), Language-based Security ( Abadi, Morrisett & Sabelfeld, 2005 ; Bandi, Fellah & Bondalapati, 2019 ; Khan et al, 2019 ; Vaidya et al, 2019 ; Zigmond et al, 2019 ), Formal-language Verification ( Foughali et al, 2018 ; Fragoso Santos et al, 2017 ; Grimm, Lettnin & Hübner, 2018 ; Abbas et al, 2020 ; Halima et al, 2018 ), Software Verification ( Rodriguez, Piattini & Ebert, 2019 ; Feldt et al, 2010 ; Zheng et al, 2014 ; Miksa & Rauber, 2017 ; Zhang et al, 2019b ), and Developing Secure Compiler ( Busi & Galletta, 2019 ; Lee, Jeong & Son, 2017 ; Zúñiga et al, 2020 ; Abate et al, 2020 ; Hastings et al, 2019 ). All of these methods and others share the same approach.…”
Section: Current Conflicts’ Classifications and Detection Methodsmentioning
confidence: 99%
“…A plethora of defense techniques and approaches have been proposed and applied in different domains and contexts for the above-mentioned issues. Among these techniques are Security Policy Enforcement (Herrmann and Murari, 2004;Sicari et al, 2016;Neisse et al, 2014;Keromytis and Wright, 2000;Adi et al, 2018), Language-based Security (Abadi et al, 2005;Bandi et al, 2019;Khan et al, 2019;Vaidya et al, 2019;Zigmond et al, 2019), Formal-language Verification (Foughali et al, 2018;Fragoso Santos et al, 2017;Grimm et al, 2018;Abbas et al, 2020;Halima et al, 2018), Software Verification (Rodriguez et al, 2019;Feldt et al, 2010;Zheng et al, 2014;Miksa and Rauber, 2017;Zhang et al, 2019b), and Developing Secure Compiler (Busi and Galletta, 2019;Lee et al, 2017;Zúñiga et al, 2020;Abate et al, 2020;Hastings et al, 2019). All of these methods and others share the same approach.…”
Section: Current Conflicts' Classifications and Detection Methodsmentioning
confidence: 99%