Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Trieu, Alix"'
Autor:
Trieu, Alix
Les attaques par canaux cachés sont une forme d'attaque particulièrement dangereuse. Dans cette thèse, nous nous intéressons au canal caché temporel. Un programme est dit ''constant-time'' lorsqu'il n'est pas vulnérable aux attaques par canal c
Externí odkaz:
http://www.theses.fr/2018REN1S099/document
Autor:
Georges, Aïna Linn, Guéneau, Armaël, Van Strydonck, Thomas, Timany, Amin, Trieu, Alix, Devriese, Dominique, Birkedal, Lars
Publikováno v:
Journal of the ACM; Feb2024, Vol. 71 Issue 1, p1-59, 59p
Autor:
Georges, Aïna Linn, Guéneau, Armaël, Van Strydonck, Thomas, Timany, Amin, Trieu, Alix, Devriese, Dominique, Birkedal, Lars
A capability machine is a type of CPU allowing fine-grained privilege separation using capabilities, machine words that represent certain kinds of authority. We present a mathematical model and accompanying proof methods that can be used for formal v
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______165::1cff7364922398b7cb44bb4b949e8da2
https://hal.science/hal-03826854/document
https://hal.science/hal-03826854/document
Autor:
Keller, Chantal, Bourke, Timothy, Blazy, Sandrine, Bour, Frédéric, Bury, Guillaume, Dumbrava, Stefania, Gallois-Wong, Diane, Guatto, Adrien, Janin, David, Kerjean, Marie, Pellissier, Luc, Pereira, Mário, Trieu, Alix, Zakowski, Yannick
Publikováno v:
Chantal Keller; Timothy Bourke., pp.1-292, 2022
International audience; Les 33èmes Journées Francophones des Langages Applicatifs (JFLA) se sont tenues à Saint-Médard-d'Excideuil, plus précisément Domaine d'Essendiéras (Périgord), du mardi 28 juin 2022 au vendredi 1er juillet 2022.Les JFLA
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::8576c5c241ab3e94a3ac0c7e870b372e
https://inria.hal.science/hal-03689075
https://inria.hal.science/hal-03689075
The Iris mechanization contains all the definitions and proofs presented in the paper "Efficient and Provable Local Capability Revocation using Uninitialized Capabilities" The zipped folder contains all of the source code, and the VM image contains a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::427863ff71cac6068f0659a0e8a36d97
Autor:
Barthe, Gilles, Blazy, Sandrine, Grégoire, Benjamin, Hutin, Rémi, Laporte, Vincent, Pichardie, David, Trieu, Alix
Publikováno v:
Barthe, G, Blazy, S, Grégoire, B, Hutin, R, Laporte, V, Pichardie, D & Trieu, A 2020, ' Formal Verification of a Constant-Time Preserving C Compiler ', Proceedings of the ACM on Programming Languages, vol. 4, no. POPL, 7 . https://doi.org/10.1145/3371075
Timing side-channels are arguably one of the main sources of vulnerabilities in cryptographic implementations. One effective mitigation against timing side-channels is to write programs that do not perform secret-dependent branches and memory accesse
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::dac9cd2e6f89ee22cb7f39877089a791
https://pure.au.dk/portal/da/publications/formal-verification-of-a-constanttime-preserving-c-compiler(cc501edc-356a-4f30-9e85-d3e41f018ca6).html
https://pure.au.dk/portal/da/publications/formal-verification-of-a-constanttime-preserving-c-compiler(cc501edc-356a-4f30-9e85-d3e41f018ca6).html
We present a static control flow analysis used in the Simple Unified Policy Programming Language (Suppl) compiler to detect internally inconsistent policies. For example, an access control policy can decide to both "allow" and "deny" access for a use
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::31af7e4d9c2306cb349cd46a83a0ccaf
https://hal.inria.fr/hal-01099124
https://hal.inria.fr/hal-01099124
Publikováno v:
Journal of Computer Security; 2019, Vol. 27 Issue 1, p137-163, 27p
Publikováno v:
Computer Security Foundations Symposium
Computer Security Foundations Symposium, Aug 2017, Santa-Barbara, United States
CSF
Computer Security Foundations Symposium, Aug 2017, Santa-Barbara, United States
CSF
International audience; Motivated by applications to security and high efficiency , we propose an automated methodology for validating on low-level intermediate representations the results of a source-level static analysis. Our methodology relies on
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::26c352b2790eb75c141e44485cdddb52
https://hal.inria.fr/hal-01588422/document
https://hal.inria.fr/hal-01588422/document