2020
Autores
Fernandes, D; Silva, C; Dutra, I;
Publicação
ACM Crossroads
Abstract
2020
Autores
Mesquita, A; Oliveira, A; Sequeira, A; Oliveira, L; Silva, P;
Publicação
Advances in Tourism, Technology and Smart Systems - Smart Innovation, Systems and Technologies
Abstract
2020
Autores
Andrade, T; Cancela, B; Gama, J;
Publicação
MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2019, PT II
Abstract
2020
Autores
Roriz, P; Silva, S; Frazao, O; Novais, S;
Publicação
SENSORS
Abstract
2020
Autores
Mendonça, AM; Melo, T; Araújo, T; Campilho, A;
Publicação
Image Analysis and Recognition - 17th International Conference, ICIAR 2020, Póvoa de Varzim, Portugal, June 24-26, 2020, Proceedings, Part II
Abstract
2020
Autores
Almeida, JB; Barbosa, M; Barthe, G; Gregoire, B; Koutsos, A; Laporte, V; Oliveira, T; Strub, PY;
Publicação
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020)
Abstract
We develop a new approach for building cryptographic implementations. Our approach goes the last mile and delivers assembly code that is provably functionally correct, protected against side-channels, and as efficient as hand-written assembly. We illustrate our approach using ChaCha20-Poly1305, one of the two ciphersuites recommended in TLS 1.3, and deliver formally verified vectorized implementations which outperform the fastest non-verified code.We realize our approach by combining the Jasmin framework, which offers in a single language features of high-level and low-level programming, and the EasyCrypt proof assistant, which offers a versatile verification infrastructure that supports proofs of functional correctness and equivalence checking. Neither of these tools had been used for functional correctness before. Taken together, these infrastructures empower programmers to develop efficient and verified implementations by "game hopping", starting from reference implementations that are proved functionally correct against a specification, and gradually introducing program optimizations that are proved correct by equivalence checking.We also make several contributions of independent interest, including a new and extensible verified compiler for Jasmin, with a richer memory model and support for vectorized instructions, and a new embedding of Jasmin in EasyCrypt. © 2020 IEEE.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.