POPL 2020 (series) / PriSC 2020 (series) / Principles of Secure Compilation 2020 /
Exploits as Insecure Compilation
Sat 25 Jan 2020 14:00 - 14:24 at Rosalie - New outlooks on secure compilation Chair(s): Cristina Cifuentes
The study of secure compilation is typically focused on building compilers that do not introduce security vulner- abilities. Unfortunately, the compilers used in practice are not secure, and linking compiled components with untrusted contexts can introduce significant security vul- nerabilities. We propose repurposing the framework of secure compilation to study insecure compilers and the vulnerabilities they give rise to.
Slides (prisc2020-expanded.pdf) | 421KiB |
Sat 25 JanDisplayed time zone: Saskatchewan, Central America change
Sat 25 Jan
Displayed time zone: Saskatchewan, Central America change
14:00 - 15:05 | |||
14:00 24mTalk | Exploits as Insecure Compilation PriSC Jennifer Paykin Galois, Inc., Eric Mertens Galois, Inc., Mark Tullsen Galois, Inc, Luke Maurer Galois, Inc, Benoit Razet Galois, Inc, Alexander Bakst Galois, Inc, Scott Moore Galois, Inc Pre-print Media Attached File Attached | ||
14:24 24mTalk | Universal Composability is Secure Compilation PriSC Marco Patrignani Stanford University & CISPA , Riad S. Wahby Stanford University, USA, Robert Künnemann CISPA, Saarland University Media Attached File Attached | ||
14:48 8mTalk | Short Talk: Automatically Eliminating Speculative Leaks With Blade PriSC Marco Vassena CISPA Helmholtz Center for Information Security, Klaus v. Gleissenthall University of California at San Diego, USA, Rami Gökhan Kıcı University of California at San Diego, USA Media Attached File Attached | ||
14:56 8mTalk | Short Talk: Everparse PriSC Tahina Ramananandro Microsoft Research, n.n. Media Attached |