Skip to main content

Showing 1–21 of 21 results for author: Stefan, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.05831  [pdf, other

    cs.CR

    Robust Constant-Time Cryptography

    Authors: Matthew Kolosick, Basavesh Ammanaghatta Shivakumar, Sunjay Cauligi, Marco Patrignani, Marco Vassena, Ranjit Jhala, Deian Stefan

    Abstract: The constant-time property is considered the security standard for cryptographic code. Code following the constant-time discipline is free from secret-dependent branches and memory accesses, and thus avoids leaking secrets through cache and timing side-channels. The constant-time property makes a number of implicit assumptions that are fundamentally at odds with the reality of cryptographic code.… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

  2. arXiv:2208.13583  [pdf, other

    cs.CR cs.PL

    MSWasm: Soundly Enforcing Memory-Safe Execution of Unsafe Code

    Authors: Alexandra E. Michael, Anitha Gollamudi, Jay Bosamiya, Craig Disselkoen, Aidan Denlinger, Conrad Watt, Bryan Parno, Marco Patrignani, Marco Vassena, Deian Stefan

    Abstract: Most programs compiled to WebAssembly (Wasm) today are written in unsafe languages like C and C++. Unfortunately, memory-unsafe C code remains unsafe when compiled to Wasm -- and attackers can exploit buffer overflows and use-after-frees in Wasm almost as easily as they can on native platforms. Memory-Safe WebAssembly (MSWasm) proposes to extend Wasm with language-level memory-safety abstractions… ▽ More

    Submitted 26 September, 2022; v1 submitted 29 August, 2022; originally announced August 2022.

  3. arXiv:2208.13560  [pdf, ps, other

    cs.PL cs.CR

    From Fine- to Coarse-Grained Dynamic Information Flow Control and Back, a Tutorial on Dynamic Information Flow

    Authors: Marco Vassena, Alejandro Russo, Deepak Garg, Vineet Rajani, Deian Stefan

    Abstract: This tutorial provides a complete and homogeneous account of the latest advances in fine- and coarse-grained dynamic information-flow control (IFC) security. Since the 70s, the programming language and the operating system communities have proposed different IFC approaches. IFC operating systems track information flows in a coarse-grained fashion, at the granularity of a process. In contrast, trad… ▽ More

    Submitted 29 August, 2022; originally announced August 2022.

  4. arXiv:2208.01548  [pdf, other

    cs.CR

    A Turning Point for Verified Spectre Sandboxing

    Authors: Sunjay Cauligi, Marco Guarnieri, Daniel Moghimi, Deian Stefan, Marco Vassena

    Abstract: Spectre attacks enable an attacker to access restricted data in an application's memory. Both the academic community and industry veterans have developed several mitigations to block Spectre attacks, but to date, very few have been formally vetted; most are "best effort" strategies. Formal guarantees are particularly crucial for protecting isolated environments like sandboxing against Spectre atta… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

  5. arXiv:2203.03528  [pdf, other

    cs.CR

    Blocked or Broken? Automatically Detecting When Privacy Interventions Break Websites

    Authors: Michael Smith, Peter Snyder, Moritz Haller, Benjamin Livshits, Deian Stefan, Hamed Haddadi

    Abstract: A core problem in the development and maintenance of crowd-sourced filter lists is that their maintainers cannot confidently predict whether (and where) a new filter list rule will break websites. This is a result of enormity of the Web, which prevents filter list authors from broadly understanding the impact of a new blocking rule before they ship it to millions of users. The inability of filter… ▽ More

    Submitted 2 May, 2022; v1 submitted 7 March, 2022; originally announced March 2022.

  6. arXiv:2105.05801  [pdf, ps, other

    cs.CR cs.PL

    SoK: Practical Foundations for Software Spectre Defenses

    Authors: Sunjay Cauligi, Craig Disselkoen, Daniel Moghimi, Gilles Barthe, Deian Stefan

    Abstract: Spectre vulnerabilities violate our fundamental assumptions about architectural abstractions, allowing attackers to steal sensitive data despite previously state-of-the-art countermeasures. To defend against Spectre, developers of verification tools and compiler-based mitigations are forced to reason about microarchitectural details such as speculative execution. In order to aid developers with th… ▽ More

    Submitted 8 April, 2022; v1 submitted 12 May, 2021; originally announced May 2021.

    Comments: To appear at Oakland '22

  7. Isolation Without Taxation: Near Zero Cost Transitions for SFI

    Authors: Matthew Kolosick, Shravan Narayan, Evan Johnson, Conrad Watt, Michael LeMay, Deepak Garg, Ranjit Jhala, Deian Stefan

    Abstract: Software sandboxing or software-based fault isolation (SFI) is a lightweight approach to building secure systems out of untrusted components. Mozilla, for example, uses SFI to harden the Firefox browser by sandboxing third-party libraries, and companies like Fastly and Cloudflare use SFI to safely co-locate untrusted tenants on their edge clouds. While there have been significant efforts to optimi… ▽ More

    Submitted 18 November, 2021; v1 submitted 30 April, 2021; originally announced May 2021.

  8. arXiv:2104.00461  [pdf, ps, other

    cs.CR cs.PL

    Solver-Aided Constant-Time Circuit Verification

    Authors: Rami Gokhan Kici, Klaus v. Gleissenthall, Deian Stefan, Ranjit Jhala

    Abstract: We present Xenon, a solver-aided method for formally verifying that Verilog hardware executes in constant-time. Xenon scales to realistic hardware designs by drastically reducing the effort needed to localize the root cause of verification failures via a new notion of constant-time counterexamples, which Xenon uses to automatically synthesize a minimal set of secrecy assumptions. Xenon further exp… ▽ More

    Submitted 1 April, 2021; originally announced April 2021.

  9. arXiv:2102.12730  [pdf, other

    cs.CR

    Swivel: Hardening WebAssembly against Spectre

    Authors: Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean Tullsen, Deian Stefan

    Abstract: We describe Swivel, a new compiler framework for hardening WebAssembly (Wasm) against Spectre attacks. Outside the browser, Wasm has become a popular lightweight, in-process sandbox and is, for example, used in production to isolate different clients on edge clouds and function-as-a-service platforms. Unfortunately, Spectre attacks can bypass Wasm's isolation guarantees. Swivel hardens Wasm agains… ▽ More

    Submitted 19 March, 2021; v1 submitted 25 February, 2021; originally announced February 2021.

    Comments: Accepted at USENIX 21

    MSC Class: D.4.6 ACM Class: D.4.6

  10. Automatically Eliminating Speculative Leaks from Cryptographic Code with Blade

    Authors: Marco Vassena, Craig Disselkoen, Klaus V. Gleissenthall, Sunjay Cauligi, Rami Gökhan Kici, Ranjit Jhala, Dean Tullsen, Deian Stefan

    Abstract: We introduce BLADE, a new approach to automatically and efficiently eliminate speculative leaks from cryptographic code. BLADE is built on the insight that to stop leaks via speculation, it suffices to $\textit{cut}$ the dataflow from expressions that speculatively introduce secrets ($\textit{sources}$) to those that leak them through the cache ($\textit{sinks}$), rather than prohibit speculation… ▽ More

    Submitted 7 December, 2020; v1 submitted 1 May, 2020; originally announced May 2020.

  11. arXiv:2003.00572  [pdf, other

    cs.CR

    Retrofitting Fine Grain Isolation in the Firefox Renderer (Extended Version)

    Authors: Shravan Narayan, Craig Disselkoen, Tal Garfinkel, Nathan Froyd, Eric Rahm, Sorin Lerner, Hovav Shacham, Deian Stefan

    Abstract: Firefox and other major browsers rely on dozens of third-party libraries to render audio, video, images, and other content. These libraries are a frequent source of vulnerabilities. To mitigate this threat, we are migrating Firefox to an architecture that isolates these libraries in lightweight sandboxes, dramatically reducing the impact of a compromise. Retrofitting isolation can be labor-inten… ▽ More

    Submitted 9 March, 2020; v1 submitted 1 March, 2020; originally announced March 2020.

    Comments: Accepted at Usenix Security 2020

    MSC Class: D.4.6 ACM Class: D.4.6

  12. arXiv:1912.02285  [pdf

    cs.CR

    Gobi: WebAssembly as a Practical Path to Library Sandboxing

    Authors: Shravan Narayan, Tal Garfinkel, Sorin Lerner, Hovav Shacham, Deian Stefan

    Abstract: Software based fault isolation (SFI) is a powerful approach to reduce the impact of security vulnerabilities in large C/C++ applications like Firefox and Apache. Unfortunately, practical SFI tools have not been broadly available. Develo** SFI toolchains are a significant engineering challenge. Only in recent years have browser vendors invested in building production quality SFI tools like Nati… ▽ More

    Submitted 4 December, 2019; originally announced December 2019.

    MSC Class: D.4.6 ACM Class: D.4.6

  13. arXiv:1910.03111  [pdf, other

    cs.CR

    Iodine: Verifying Constant-Time Execution of Hardware

    Authors: Klaus v. Gleissenthall, Rami Gökhan Kıcı, Deian Stefan, Ranjit Jhala

    Abstract: To be secure, cryptographic algorithms crucially rely on the underlying hardware to avoid inadvertent leakage of secrets through timing side channels. Unfortunately, such timing channels are ubiquitous in modern hardware, due to its labyrinthine fast-paths and optimizations. A promising way to avoid timing vulnerabilities is to devise --- and verify --- conditions under which a hardware design is… ▽ More

    Submitted 7 October, 2019; originally announced October 2019.

    Journal ref: USENIX Security Symposium 2019: 1411-1428

  14. arXiv:1910.01755  [pdf, other

    cs.CR cs.PL

    Constant-Time Foundations for the New Spectre Era

    Authors: Sunjay Cauligi, Craig Disselkoen, Klaus v. Gleissenthall, Dean Tullsen, Deian Stefan, Tamara Rezk, Gilles Barthe

    Abstract: The constant-time discipline is a software-based countermeasure used for protecting high assurance cryptographic implementations against timing side-channel attacks. Constant-time is effective (it protects against many known attacks), rigorous (it can be formalized using program semantics), and amenable to automated verification. Yet, the advent of micro-architectural attacks makes constant-time a… ▽ More

    Submitted 8 May, 2020; v1 submitted 3 October, 2019; originally announced October 2019.

    Comments: To appear at PLDI '20

  15. arXiv:1808.01348  [pdf, other

    cs.CR cs.PL

    CT-Wasm: Type-Driven Secure Cryptography for the Web Ecosystem

    Authors: Conrad Watt, John Renner, Natalie Popescu, Sunjay Cauligi, Deian Stefan

    Abstract: A significant amount of both client and server-side cryptography is implemented in JavaScript. Despite widespread concerns about its security, no other language has been able to match the convenience that comes from its ubiquitous support on the "web ecosystem" - the wide variety of technologies that collectively underpins the modern World Wide Web. With the new introduction of the WebAssembly byt… ▽ More

    Submitted 17 December, 2018; v1 submitted 3 August, 2018; originally announced August 2018.

    Comments: 29 pages, 9 figures

  16. arXiv:1607.03445  [pdf, other

    cs.PL

    Liquid Information Flow Control

    Authors: Nadia Polikarpova, Deian Stefan, Jean Yang, Shachar Itzhaky, Travis Hance, Armando Solar-Lezama

    Abstract: We present Lifty, a domain-specific language for data-centric applications that manipulate sensitive data. A Lifty programmer annotates the sources of sensitive data with declarative security policies, and the language statically and automatically verifies that the application handles the data according to the policies. Moreover, if verification fails, Lifty suggests a provably correct repair, the… ▽ More

    Submitted 30 June, 2020; v1 submitted 12 July, 2016; originally announced July 2016.

  17. arXiv:1507.06189  [pdf, ps, other

    cs.CR cs.PL

    On Dynamic Flow-Sensitive Floating-Label Systems

    Authors: Pablo Buiras, Deian Stefan, Alejandro Russo

    Abstract: Flow-sensitive analysis for information-flow control (IFC) allows data structures to have mutable security labels, i.e., labels that can change over the course of the computation. This feature is often used to boost the permissiveness of the IFC monitor, by rejecting fewer runs of programs, and to reduce the burden of explicit label annotations. However, adding flow-sensitive constructs (e.g., ref… ▽ More

    Submitted 22 July, 2015; originally announced July 2015.

  18. arXiv:1505.00424  [pdf, other

    cs.CV physics.ins-det

    Electron Neutrino Classification in Liquid Argon Time Projection Chamber Detector

    Authors: Piotr Płoński, Dorota Stefan, Robert Sulej, Krzysztof Zaremba

    Abstract: Neutrinos are one of the least known elementary particles. The detection of neutrinos is an extremely difficult task since they are affected only by weak sub-atomic force or gravity. Therefore large detectors are constructed to reveal neutrino's properties. Among them the Liquid Argon Time Projection Chamber (LAr-TPC) detectors provide excellent imaging and particle identification ability for stud… ▽ More

    Submitted 3 May, 2015; originally announced May 2015.

    Comments: 9 pages

  19. arXiv:1502.08046  [pdf, ps, other

    cs.CV hep-ex

    Image Segmentation in Liquid Argon Time Projection Chamber Detector

    Authors: Piotr Płoński, Dorota Stefan, Robert Sulej, Krzysztof Zaremba

    Abstract: The Liquid Argon Time Projection Chamber (LAr-TPC) detectors provide excellent imaging and particle identification ability for studying neutrinos. An efficient and automatic reconstruction procedures are required to exploit potential of this imaging technology. Herein, a novel method for segmentation of images from LAr-TPC detectors is presented. The proposed approach computes a feature descriptor… ▽ More

    Submitted 27 February, 2015; originally announced February 2015.

    Comments: 10 pages, 4 figures, 2 tables

  20. arXiv:1501.04132  [pdf, other

    cs.PL cs.CR

    IFC Inside: Retrofitting Languages with Dynamic Information Flow Control (Extended Version)

    Authors: Stefan Heule, Deian Stefan, Edward Z. Yang, John C. Mitchell, Alejandro Russo

    Abstract: Many important security problems in JavaScript, such as browser extension security, untrusted JavaScript libraries and safe integration of mutually distrustful websites (mash-ups), may be effectively addressed using an efficient implementation of information flow control (IFC). Unfortunately existing fine-grained approaches to JavaScript IFC require modifications to the language semantics and its… ▽ More

    Submitted 16 January, 2015; originally announced January 2015.

    Comments: Extended version of POST'15 paper; 31 pages

  21. arXiv:1207.1457  [pdf, ps, other

    cs.CR cs.PL

    Flexible Dynamic Information Flow Control in the Presence of Exceptions

    Authors: Deian Stefan, Alejandro Russo, John C. Mitchell, David Mazières

    Abstract: We describe a new, dynamic, floating-label approach to language-based information flow control. A labeled IO monad, LIO, keeps track of a current label and permits restricted access to IO functionality. The current label floats to exceed the labels of all data observed and restricts what can be modified. Unlike other language-based work, LIO also bounds the current label with a current clearance t… ▽ More

    Submitted 5 July, 2012; originally announced July 2012.

    ACM Class: D.4.6; D.1.1; D.3.3