Completed
A mixed-sensitivity concurrent program CDDC'S HID switch as software components
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Proving Confidentiality and Its Preservation for Mixed-Sensitivity Concurrent Programs
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Confidentiality in the face of scale The desk islava
- 3 Motivating use case
- 4 3 key challenges
- 5 A mixed-sensitivity concurrent program CDDC'S HID switch as software components
- 6 Program verification: Prior work
- 7 Program verification: My work
- 8 Compiler verification: Prior work
- 9 Compiler verification: My work
- 10 Case study
- 11 Dangers of conditional branching on secrets Implicit flow 1:"storage" leak
- 12 Does your OS really enforce confidentiality?
- 13 How to verify an OS enforces time protection?
- 14 So far: Generic OS security model for time protection . Modelled new requirements on
- 15 Currently: Challenges for integration into seL4 proofs