Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Marco Guarnieri"'
Publikováno v:
IEEE Symposium on Security and Privacy
Since the discovery of Spectre, a large number of hardware mechanisms for secure speculation has been proposed. Intuitively, more defensive mechanisms are less efficient but can securely execute a larger class of programs, while more permissive mecha
Publikováno v:
PLDI
We show how to infer deterministic cache replacement policies using off-the-shelf automata learning and program synthesis techniques. For this, we construct and chain two abstractions that expose the cache replacement policy of any set in the cache h
Autor:
Marco Patrignani, Marco Guarnieri
Publikováno v:
CCS
Attackers can access sensitive information of programs by exploiting the side-effects of speculatively-executed instructions using Spectre attacks. To mitigate theses attacks, popular compilers deployed a wide range of countermeasures. The security o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cef9cc892085b5796941a65dc014d8ba
http://arxiv.org/abs/1910.08607
http://arxiv.org/abs/1910.08607
Publikováno v:
EuroS&P
Securing database-backed applications requires tracking information across the application program and the database together, since securing each component in isolation may still result in an overall insecure system. Current research extends language
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2f15522947dfac5f60923ca7c8d485c4
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-249678
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-249678
Publikováno v:
CCS
Existing probabilistic privacy enforcement approaches permit the execution of a program that processes sensitive data only if the information it leaks is within the bounds specified by a given policy. Thus, to extract any information, users must manu
Publikováno v:
CSF
Databases can leak confidential information when users combine query results with probabilistic data dependencies and prior knowledge. Current research offers mechanisms that either handle a limited class of dependencies or lack tractable enforcement
Publikováno v:
ISSTA
Test isolation is a prerequisite for the correct execution of test suites on web applications. We present Test Execution Checkpointing, a method for efficient test isolation. Our method instruments web applications to support checkpointing and exploi
Publikováno v:
EuroS&P
Existing SQL access control mechanisms are extremely limited. Attackers can leak information and escalate their privileges using advanced database features such as views, triggers, and integrity constraints. This is not merely a problem of vendors la
Publikováno v:
SACMAT
The evolution of information systems sees an increasing need of flexible and sophisticated approaches for the automated detection of anomalies in security policies. One of these anomalies is redundancy, which may increase the total cost of management
Publikováno v:
ICST
Code coverage is usually used as a measurement of testing quality and as adequacy criterion. Unfortunately, code coverage is very sensitive to modifications of the code structure, and, therefore, we can achieve the same degree of coverage with differ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3c250e3959844197bd0ae6baa953dc92
http://hdl.handle.net/10446/29200
http://hdl.handle.net/10446/29200