Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Anitha Gollamudi"'
Autor:
Alexandra E. Michael, Anitha Gollamudi, Jay Bosamiya, Evan Johnson, Aidan Denlinger, Craig Disselkoen, Conrad Watt, Bryan Parno, Marco Patrignani, Marco Vassena, Deian Stefan
Publikováno v:
Proceedings of the ACM on Programming Languages. 7:425-454
Most programs compiled to WebAssembly (Wasm) today are written in unsafe languages like C and C++. Unfortunately, memory-unsafe C code remains unsafe when compiled to Wasm—and attackers can exploit buffer overflows and use-after-frees in Wasm almos
Autor:
Anitha Gollamudi, Stephen Chong
Publikováno v:
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies.
Autor:
Anitha Gollamudi
Publikováno v:
Proceedings of the 15th Workshop on Programming Languages and Analysis for Security.
Publikováno v:
CSF
Distributed applications cannot assume that their security policies will be enforced on untrusted hosts. Trusted execution environments (TEEs) combined with cryptographic mechanisms enable execution of known code on an untrusted host and the exchange
Autor:
Karthikeyan Bhargavan, Georges Gonthier, Nadim Kobeissi, Cédric Fournet, Antoine Delignat-Lavaud, Thomas Sibut-Pinote, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin, Anitha Gollamudi, Natalia Kulatova
Publikováno v:
Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security
ACM Workshop on Programming Languages and Analysis for Security
ACM Workshop on Programming Languages and Analysis for Security, Oct 2016, Vienna, Austria. ⟨10.1145/2993600.2993611⟩
PLAS@CCS
ACM Workshop on Programming Languages and Analysis for Security
ACM Workshop on Programming Languages and Analysis for Security, Oct 2016, Vienna, Austria. ⟨10.1145/2993600.2993611⟩
PLAS@CCS
International audience; Ethereum is a framework for cryptocurrencies which uses blockchain technology to provide an open global computing platform, called the Ethereum Virtual Machine (EVM). EVM executes bytecode on a simple stack machine. Programmer
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bf7da49d907e8309780c621632870010
https://inria.hal.science/hal-01400469/document
https://inria.hal.science/hal-01400469/document
Autor:
Stephen Chong, Anitha Gollamudi
Publikováno v:
OOPSLA
Hardware-based enclave protection mechanisms, such as Intel's SGX, ARM's TrustZone, and Apple's Secure Enclave, can protect code and data from powerful low-level attackers. In this work, we use enclaves to enforce strong application-specific informat