PROGRAMMING AGAINST CONTRACTS. Contracts are the basis for secure programming. Here, we consider two scenarios that are both instances of secure programming: In the first, which we call “constant-time pro- gramming”, the goal is to ensure that a benign program does not leak confidential data to an adversary while computing on this data. In the second, which we call “sandboxing”, the goal is to prevent a potentially malicious program from accessing confidential data. Proofs of this section’s results are in [19].
Appears in 1 contract
Sources: Hardware Software Contracts
PROGRAMMING AGAINST CONTRACTS. Contracts are the basis for secure programming. Here, we consider two scenarios that are both instances of secure programming: In the first, which we call “constant-time pro- gramming”, the goal is to ensure that a benign program does not leak confidential data to an adversary while computing on this data. In the second, which we call “sandboxing”, the goal is to prevent a potentially malicious program from accessing confidential data. Proofs of this section’s results are in [19].
Appears in 1 contract
Sources: Hardware Software Contracts