This tutorial provides a complete and homogeneous account of the latest
...
In a secure analytics platform, data sources consent to the exclusive us...
Security is a core responsibility for Function-as-a-Service (FaaS) provi...
We present Pirouette, a language for typed higher-order functional
chore...
Proving secure compilation of partial programs typically requires
back-t...
Adversarial computations are a widely studied class of computations wher...
Almost all SFI systems use heavyweight transitions that incur significan...
We propose a novel end-to-end solution that performs a Hierarchical Layo...
During the ongoing COVID-19 pandemic, there have been burgeoning efforts...
Capability machines such as CHERI provide memory capabilities that can b...
Causality has been the issue of philosophic debate since Hippocrates. It...
An important concern for many Cloud customers is data confidentiality. O...
Compiler correctness is, in its simplest form, defined as the inclusion ...
Relational type systems have been designed for several applications incl...
Relational cost analysis aims at formally establishing bounds on the
dif...
For fear of retribution, the victim of a crime may be willing to report ...
Probabilistic programming provides a convenient lingua franca for writin...
Good programming languages provide helpful abstractions for writing secu...
Good programming languages provide helpful abstractions for writing more...
Language-based information flow control (IFC) tracks dependencies within...
Secure compilers generate compiled code that withstands many target- lev...
We extend the simply-typed guarded λ-calculus with discrete
probabilitie...
Many applications can benefit from isolating sensitive data in a secure
...
Data retrieval systems such as online search engines and online social
n...
We present an instrumenting compiler for enforcing data confidentiality ...
We map the space of soundness criteria for secure compilation based on t...