POPL 2022 (series) / PriSC 2022 (series) / PriSC 2022 / Synthesizing Evidence of Emergent Computation
Synthesizing Evidence of Emergent ComputationRemote
Proving a compiler to be secure is costly, and even testing its security often requires domain knowledge about potential attacks. In this work, we present a tool to synthesize examples of compiler insecurity from just specifications of the languages and the compiler between them. The tool also provides evidence of how severe discovered vulnerabilities may be by synthesizing gadgets that represent composable exploitation APIs within implementations.
Synthesizing Evidence of Emergent Execution (Extended Abstract) (prisc22-SEEC.pdf) | 413KiB |
Sat 22 JanDisplayed time zone: Eastern Time (US & Canada) change
Sat 22 Jan
Displayed time zone: Eastern Time (US & Canada) change
10:20 - 11:35 | |||
10:20 25mTalk | Type-directed Program Transformation for Constant-Time EnforcementRemote PriSC File Attached | ||
10:45 25mTalk | Towards Understanding Spectre-PHT in Memory-Safe LanguagesRemote PriSC Zirui Neil Zhao University of Illinois at Urbana-Champaign, Fangfei Liu Intel Corporation, Scott Constable Intel Corporation, Carlos Rozas Intel Corporation | ||
11:10 25mTalk | Synthesizing Evidence of Emergent ComputationRemote PriSC Media Attached File Attached |