Ryoan: A distributed sandbox for untrusted computation on secret data

T Hunt, Z Zhu, Y Xu, S Peter, E Witchel - ACM Transactions on Computer …, 2018 - dl.acm.org
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …

On subnormal floating point and abnormal timing

M Andrysco, D Kohlbrenner, K Mowery… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
We identify a timing channel in the floating point instructions of modern x86 processors: the
running time of floating point addition and multiplication instructions can vary by two orders …

Multiple facets for dynamic information flow

TH Austin, C Flanagan - Proceedings of the 39th annual ACM SIGPLAN …, 2012 - dl.acm.org
JavaScript has become a central technology of the web, but it is also the source of many
security problems, including cross-site scripting attacks and malicious advertising code …

FlowFox: a web browser with flexible and precise information flow control

W De Groef, D Devriese, N Nikiforakis… - Proceedings of the 2012 …, 2012 - dl.acm.org
We present FlowFox, the first fully functional web browser that implements a precise and
general information flow control mechanism for web scripts based on the technique of …

Information flow control for secure cloud computing

J Bacon, D Eyers, TFJM Pasquier… - … on network and …, 2014 - ieeexplore.ieee.org
Security concerns are widely seen as an obstacle to the adoption of cloud computing
solutions. Information Flow Control (IFC) is a well understood Mandatory Access Control …

Language-based control and mitigation of timing channels

D Zhang, A Askarov, AC Myers - Proceedings of the 33rd ACM SIGPLAN …, 2012 - dl.acm.org
We propose a new language-based approach to mitigating timing channels. In this
language, well-typed programs provably leak only a bounded amount of information over …

Secure serverless computing using dynamic information flow control

K Alpernas, C Flanagan, S Fouladi, L Ryzhyk… - Proceedings of the …, 2018 - dl.acm.org
The rise of serverless computing provides an opportunity to rethink cloud security. We
present an approach for securing serverless systems using a novel form of dynamic …

Memory trace oblivious program execution

C Liu, M Hicks, E Shi - 2013 IEEE 26th Computer Security …, 2013 - ieeexplore.ieee.org
Cloud computing allows users to delegate data and computation to cloud service providers,
at the cost of giving up physical control of their computing infrastructure. An attacker (eg …

Expressing information flow properties

E Kozyri, S Chong, AC Myers - Foundations and Trends® in …, 2022 - nowpublishers.com
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …

Eliminating cache-based timing attacks with instruction-based scheduling

D Stefan, P Buiras, EZ Yang, A Levy, D Terei… - … –ESORICS 2013: 18th …, 2013 - Springer
Abstract Information flow control allows untrusted code to access sensitive and trustworthy
information without leaking this information. However, the presence of covert channels …