To ensure that secure applications do not leak their secrets, they are
r...
Modern processors employ different prediction mechanisms to speculate ov...
Most programs compiled to WebAssembly (Wasm) today are written in unsafe...
Statically analyzing information flow, or how data influences other data...
A program that maintains key safety properties even when interacting wit...
Microarchitectural attacks exploit the abstraction gap between the
Instr...
Recursive types extend the simply-typed lambda calculus (STLC) with the
...
Capability machines such as CHERI provide memory capabilities that can b...
Syntax highlighting in the form of colours and font diversification, is ...
WebAssembly (Wasm) is a next-generation portable compilation target for
...
Universal composability is a framework for the specification and analysi...
Speculative execution has been demonstrated to leak information about
ex...
Compiler correctness is, in its simplest form, defined as the inclusion ...
Good programming languages provide helpful abstractions for writing secu...
Good programming languages provide helpful abstractions for writing more...
Secure compilers generate compiled code that withstands many target- lev...
We map the space of soundness criteria for secure compilation based on t...