Skip to main content

Showing 1–3 of 3 results for author: Kolosick, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.05831  [pdf, other

    cs.CR

    Robust Constant-Time Cryptography

    Authors: Matthew Kolosick, Basavesh Ammanaghatta Shivakumar, Sunjay Cauligi, Marco Patrignani, Marco Vassena, Ranjit Jhala, Deian Stefan

    Abstract: The constant-time property is considered the security standard for cryptographic code. Code following the constant-time discipline is free from secret-dependent branches and memory accesses, and thus avoids leaking secrets through cache and timing side-channels. The constant-time property makes a number of implicit assumptions that are fundamentally at odds with the reality of cryptographic code.… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

  2. arXiv:2105.01954  [pdf, other

    cs.PL

    Refinements of Futures Past: Higher-Order Specification with Implicit Refinement Types (Extended Version)

    Authors: Anish Tondwalkar, Matthew Kolosick, Ranjit Jhala

    Abstract: Refinement types decorate types with assertions that enable automatic verification. Like assertions, refinements are limited to binders that are in scope, and hence, cannot express higher-order specifications. Ghost variables circumvent this limitation but are prohibitively tedious to use as the programmer must divine and explicate their values at all call-sites. We introduce Implicit Refinement T… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

    Comments: To appear at the 35th European Conference on Object-Oriented Programming (ECOOP 2021) Artifact available at: https://github.com/ucsd-progsys/mist/tree/ecoop21

    ACM Class: F.3.1; F.3.3

  3. Isolation Without Taxation: Near Zero Cost Transitions for SFI

    Authors: Matthew Kolosick, Shravan Narayan, Evan Johnson, Conrad Watt, Michael LeMay, Deepak Garg, Ranjit Jhala, Deian Stefan

    Abstract: Software sandboxing or software-based fault isolation (SFI) is a lightweight approach to building secure systems out of untrusted components. Mozilla, for example, uses SFI to harden the Firefox browser by sandboxing third-party libraries, and companies like Fastly and Cloudflare use SFI to safely co-locate untrusted tenants on their edge clouds. While there have been significant efforts to optimi… ▽ More

    Submitted 18 November, 2021; v1 submitted 30 April, 2021; originally announced May 2021.