Now showing items 1-5 of 5

    • Cryptographic Enforcement of Language-Based Information Erasure 

      Askarov, Aslan; Moore, Scott; Dimoulas, Christos; Chong, Stephen N (2015)
      Information erasure is a formal security requirement that stipulates when sensitive data must be removed from computer systems. In a system that correctly enforces erasure requirements, an attacker who observes the system ...
    • Declarative Policies for Capability Control 

      Dimoulas, Christos; Moore, Scott David; Askarov, Aslan; Chong, Stephen N (Institute of Electrical and Electronics Engineers, 2014)
      In capability-safe languages, components can access a resource only if they possess a capability for that resource. As a result, a programmer can prevent an untrusted component from accessing a sensitive resource by ensuring ...
    • Extensible Access Control with Authorization Contracts 

      Scott Moore, Christos; Chong, Stephen N; Moore, Scott David; Dimoulas, Christos; Findler, Robert Bruce; Flatt, Matthew; Chong, Stephen N (2016-09-27)
      Existing programming language access control frameworks do not meet the needs of all software components.We propose an expressive framework for implementing access control monitors for components. The basis of the framework ...
    • Higher-order Behavioral Contracts for Distributed Components 

      Waye, Lucas Reed; Dimoulas, Christos; Chong, Stephen N (2015)
      Inspired by the Design by Contract paradigm, we introduce CONSUL, a contract system for distributed components. CONSUL monitors distributed components at run time with higher-order behavioral contracts. Contract monitoring ...
    • SHILL: A Secure Shell Scripting Language 

      Moore, Scott David; Dimoulas, Christos; King, Daniel; Chong, Stephen N (USENIX Association, 2014)
      The Principle of Least Privilege suggests that software should be executed with no more authority than it requires to accomplish its task. Current security tools make it difficult to apply this principle: they either require ...