scholarly journals Robustly Safe Compilation, an Efficient Form of Secure Compilation

2021 ◽  
Vol 43 (1) ◽  
pp. 1-41
Author(s):  
Marco Patrignani ◽  
Deepak Garg

Security-preserving compilers generate compiled code that withstands target-level attacks such as alteration of control flow, data leaks, or memory corruption. Many existing security-preserving compilers are proven to be fully abstract, meaning that they reflect and preserve observational equivalence. Fully abstract compilation is strong and useful but, in certain cases, comes at the cost of requiring expensive runtime constructs in compiled code. These constructs may have no relevance for security, but are needed to accommodate differences between the source and target languages that fully abstract compilation necessarily needs. As an alternative to fully abstract compilation, this article explores a different criterion for secure compilation called robustly safe compilation or RSC . Briefly, this criterion means that the compiled code preserves relevant safety properties of the source program against all adversarial contexts interacting with the compiled program. We show that RSC can be proved more easily than fully abstract compilation and also often results in more efficient code. We also present two different proof techniques for establishing that a compiler attains RSC and, to illustrate them, develop three illustrative robustly safe compilers that rely on different target-level protection mechanisms. We then proceed to turn one of our compilers into a fully abstract one and through this example argue that proving RSC can be simpler than proving full abstraction. To better explain and clarify notions, this article uses syntax highlighting in a way that colourblind and black-8-white readers can benefit from Reference [58]. For a better experience, please print or view this article in colour . 1

1981 ◽  
Vol 10 (137) ◽  
Author(s):  
Neil D. Jones ◽  
Henning Christiansen

<p>A simple algebra-based algorithm for compiler generation is described. Its input is a semantic definition of a programming language, and its output is a ''compiling semantics'' which maps each source program into a sequence of compile-time actions whose net effect on execution is the production of a semantically equivalent target program. The method does not require individual compiler correctness proofs or the construction of specialized target algebras.</p><p>Source program execution is assumed to proceed by performing a series of elementary actions on a runtime state. A semantic algebra is introduced to represent and manipulate possible execution sequences. A source semantic definition has two parts: A set of semantic equations mapping source programs into terms of the algebra, and an interpretation which gives concrete definitions of the state and the elementary actions on it.</p>


2020 ◽  
Vol 16 (5) ◽  
pp. 693-698
Author(s):  
S. Yu. Martsevich ◽  
Yu. V. Lukina ◽  
N. P. Kutishenko

Aim. To perform a pharmacoeconomical assessment of the use of generic statin drugs in patients with high and very high cardiovascular risk (CVR) in real clinical practice based on the data of the study PRIORITY.Material and methods. The PRIORITY study included 298 patients with high (29; 9.7%) and very high (269, 90.3%) CVR. All patients were recommended to take the reproduced drugs of atorvastatin and rosuvastatin in an individually prescribed dose. After 1 month (B1), if the target level of lowdensity lipoprotein cholesterol (LDL-C) was not reached, the statin dose was titrated. After 3 months of follow-up (B3), the hypolipidemic effect of statin therapy was evaluated. 295 people completed the study, 285 patients had the results of the lipid profile. To perform a pharmacoeconomic analysis and evaluate the “cost/effectiveness” ratio, we used the prices of generic statins in one of the online pharmacies. The effectiveness of statins was determined by the LDL-C reduction, as well as by the percentage of achieving the target LDL-C level.Results. At the first stage of the pharmacoeconomic analysis, the criterion for the effectiveness of 3-month lipid-lowering therapy was a decrease in LDL-C level by 1 mmol/l. The median and interquartile range of the ratio “cost/effectiveness” indicator for atorvastatin was 658.2 (431.5; 1257.1) RUB/mmol/l, and for rosuvastatin – 621.0 (390.7; 940.6) RUB/mmol/l (p=0.45). The results of a comparative assessment of the “cost/effectiveness” ratio (with the abovementioned effectiveness indicator) in subgroups of patients with high and very high CVR, with the achievement and nonachievement of the target level of LDL-C, adherent and non-adherent to statins, revealed the economic advantage of statins in groups of adherent patients (p=0.35), high-risk patients (p<0.0001) and individuals who reached the target level of LDL-C (p=0.002) when compared with the corresponding comparison groups. Despite the revealed high effectiveness of rosuvastatin at doses of 20-40 mg/day (assessed by the cost/effectiveness of achieving the target values of LDL-C for specific doses of statins), calculation of the “cost/effectiveness” ratio for each reproduced statin, in general, showed a higher economic effectiveness of atorvastatin.Conclusion. Pharmacoeconomic analysis of therapy with generic statin drugs, performed according to the data of the non-randomized uncontrolled study, allows to justify the economic efficiency and advantages of these drugs in various subgroups of patients who need statin therapy.


Author(s):  
Carmine Abate ◽  
Roberto Blanco ◽  
Ștefan Ciobâcă ◽  
Adrien Durier ◽  
Deepak Garg ◽  
...  

AbstractCompiler correctness is, in its simplest form, defined as the inclusion of the set of traces of the compiled program into the set of traces of the original program, which is equivalent to the preservation of all trace properties. Here traces collect, for instance, the externally observable events of each execution. This definition requires, however, the set of traces of the source and target languages to be exactly the same, which is not the case when the languages are far apart or when observations are fine-grained. To overcome this issue, we study a generalized compiler correctness definition, which uses source and target traces drawn from potentially different sets and connected by an arbitrary relation. We set out to understand what guarantees this generalized compiler correctness definition gives us when instantiated with a non-trivial relation on traces. When this trace relation is not equality, it is no longer possible to preserve the trace properties of the source program unchanged. Instead, we provide a generic characterization of the target trace property ensured by correctly compiling a program that satisfies a given source property, and dually, of the source trace property one is required to show in order to obtain a certain target property for the compiled code. We show that this view on compiler correctness can naturally account for undefined behavior, resource exhaustion, different source and target values, side-channels, and various abstraction mismatches. Finally, we show that the same generalization also applies to many secure compilation definitions, which characterize the protection of a compiled program against linked adversarial code.


Author(s):  
Tianlin Huo ◽  
Xiaoni Meng ◽  
Wenhao Wang ◽  
Chunliang Hao ◽  
Pei Zhao ◽  
...  

Software Guard Extension (SGX) is a hardware-based trusted execution environment (TEE) implemented in recent Intel commodity processors. By isolating the memory of security-critical applications from untrusted software, this mechanism provides users with a strongly shielded environment called enclave for executing programs safely. However, recent studies have demonstrated that SGX enclaves are vulnerable to side-channel attacks. In order to deal with these attacks, several protection techniques have been studied and utilized.In this paper, we explore a new pattern history table (PHT) based side-channel attack against SGX named Bluethunder, which can bypass existing protection techniques and reveal the secret information inside an enclave. Comparing to existing PHT-based attacks (such as Branchscope [ERAG+18]), Bluethunder abuses the 2-level directional predictor in the branch prediction unit, on top of which we develop an exploitation methodology to disclose the input-dependent control flow in an enclave. Since the cost of training the 2-level predictor is pretty low, Bluethunder can achieve a high bandwidth during the attack. We evaluate our attacks on two case studies: extracting the format string information in the vfprintf function in the Intel SGX SDK and attacking the implementation of RSA decryption algorithm in mbed TLS. Both attacks show that Bluethunder can recover fine-grained information inside an enclave with low training overhead, which outperforms the latest PHT-based side channel attack (Branchscope) by 52×. Specifically, in the second attack, Bluethunder can recover the RSA private key with 96.76% accuracy in a single run.


2020 ◽  
Vol 152 (6) ◽  
pp. 772-782
Author(s):  
Miriam H. Richards ◽  
Andrea Cardama Garate ◽  
Mary Shehata ◽  
Derrick Groom ◽  
Glenn J. Tattersall ◽  
...  

AbstractSmall carpenter bees (Ceratina calcarata Robertson) (Hymenoptera: Apidae) build their nests in both sunny and shady sites, so maternal decisions about nest sites influence the thermal environment experienced by juveniles throughout development. A previous study demonstrated that when larvae and pupae were raised in the laboratory at room temperature, those from sunny nests developed more slowly than those from shady nests. This suggested that bees developing in sunny nests slowed their metabolism or that bees developing in shady nests increased their metabolism. To test this hypothesis, we performed a field experiment in which bees nested in full sun, full shade, or semi-shade. We brought larvae and pupae into the laboratory to be raised to adulthood at room temperature and measured their metabolic rates (VCO2) at 10 °C, 25 °C, and 40 °C. As expected, bees had higher VCO2 at higher test temperatures, but significant interaction also occurred between test temperature and field treatment, such that bees from sunny nests exhibited higher metabolic rates at 40 °C. Because small carpenter bees frequently nest in full sun, adaptation to high nest temperatures may involve activation of thermal protection mechanisms at the cost of slower development.


2021 ◽  
Author(s):  
Anatoliy Andreevich Isaev ◽  
Rustem Shafagatovich Takhautdinov ◽  
Vladimir Ivanovich Malykhin ◽  
Almaz Amirzyanovich Sharifullin

Abstract This paper presents a set of activities to reduce water cut and develop a technical solution to measure water cut: measurement of watercut, flow rates and gas-oil ratio of a well output using a mobile unit. tracer tests and conformance control operations - watercut of reacting wells within Bashkirian stage decreased by 16,6% after those operations were performed. water flow control, flow deviation and remedying production casing damages made it possible to reduce extraction of produced water and, accordingly, the cost of oil production. development of Liquid Phase Separation Device enabled alternate delivery of oil and water to the intake of downhole pump.


2018 ◽  
Vol 239 ◽  
pp. 04023
Author(s):  
Viktor Terskikh ◽  
Vladimir Katargin ◽  
Natalia Morozova

The paper considers a new approach to planning and forming a stock of spare parts necessary for the smooth functioning of transport enterprises. The basis of the author's approach is the developed simulation model of the warehouse adapted for any type of enterprise that serves and (or) operates road transport. The need for spare parts in this model is defined as a mixture of probability distributions of demand of various kinds, which makes it universal. The model was based on the new patterns of influence of following factors on the size of the stock revealed by the authors: the statistical indicators of the need for spare parts, the type and location of the enterprise, the target level of reliability of the supply system, etc. The proposed approach allows connecting the main indicators of the resource management effectiveness: the shortage rate, the cost of stock, the level of system reliability. It allows planning and forming a stock of spare parts reasonably. It is expected that the proposed approach will increase the efficiency of transport enterprises and the degree of satisfaction of consumers of their services.


Sign in / Sign up

Export Citation Format

Share Document