Authors
Carmine Abate, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani, Jérémy Thibault
Publication date
2019/6/25
Conference
2019 IEEE 32nd Computer Security Foundations Symposium (CSF)
Pages
256-25615
Publisher
IEEE
Description
Good programming languages provide helpful abstractions for writing secure code, but the security properties of the source language are generally not preserved when compiling a program and linking it with adversarial code in a low-level target language (e.g., a library or a legacy application). Linked target code that is compromised or malicious may, for instance, read and write the compiled program^{\prime}s data and code, jump to arbitrary memory locations, or smash the stack, blatantly violating any source-level abstraction. By contrast, a fully abstract compilation chain protects source-level abstractions all the way down, ensuring that linked adversarial target code cannot observe more about the compiled program than what some linked source code could about the source program. However, while research in this area has so far focused on preserving observational equivalence, as needed for achieving full …
Total citations
2017201820192020202120222023202415161621101710
Scholar articles
C Abate, R Blanco, D Garg, C Hritcu, M Patrignani… - 2019 IEEE 32nd Computer Security Foundations …, 2019
D Garg, C Hritcu, M Patrignani, M Stronati, D Swasey - arXiv preprint arXiv:1710.07309, 2017
C Abate, R Blanco, D Garg, C Hritcu, M Patrignani… - arXiv preprint arXiv:1807.04603, 2018
C Abate, R Blanco, D Garg, C Hritcu, M Patrignani…