2010
DOI: 10.1145/1809028.1806643
|View full text |Cite
|
Sign up to set email alerts
|

Type-preserving compilation of end-to-end verification of security enforcement

Abstract: A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in these languages are compiled without explicit security proofs, limiting their utility in settings where proofs are necessary, e.g., proof-carrying authorization. Others languages do include explicit proofs, but these are generally lambda calculi not intended for source programming, that must be further compiled to an executable form. A … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Jeeves privacy policies yield comparable expressiveness to stateof-the-art languages for verifying system security such as Jif [19], Fine [4], and Ur/Web [5]. These are static approaches that have no dynamic overhead.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Jeeves privacy policies yield comparable expressiveness to stateof-the-art languages for verifying system security such as Jif [19], Fine [4], and Ur/Web [5]. These are static approaches that have no dynamic overhead.…”
Section: Related Workmentioning
confidence: 99%
“…Ensuring compliance with privacy policies requires reasoning globally about both the flow of information and the interaction of different policies affecting this information. A number of tools have been developed to check code against privacy policies statically [4,19] and dynamically [27]. While these checking tools can help avoid data leaks, the programmer is still responsible for implementing applications that display enough information to satisfy the user's needs without violating privacy policies.…”
Section: Introductionmentioning
confidence: 99%