cmu-15-316.github.io
Readings
Optional supplementary readings for personal enrichment.
Safety and Reference Monitors
Enforceable Security Policies
, Fred Schneider.
Recognizing safety and liveness
, Bowen Alpern and Fred B. Schneider.
Safe to the Last Instruction: Automated Verification of a Type-Safe Operating System
, Jean Yang and Chris Hawblitzel.
From System F to Typed Assembly Language
, Greg Morrisett, David Walker, Karl Crary, and Neal Glew.
Proof-Carrying Code
, George Necula.
Authentication, Identity, and Trust
This World of Ours
, James Mickens.
Reflections on Trusting Trust
, Ken Thompson.
Information Flow
Information Flow Control for Standard OS Abstractions
, Maxwell Krohn, Alexander Yip, Micah Brodsky, Natan Cliffer, M. Frans Kaashoek, Eddie Kohler, Robert Morris.
A Decentralized Model for Information Flow Control
, Andrew C. Myers and Barbara Liskov.
Practical Information Flow for Web Security
, Jean Yang.
Statistical Privacy
The Algorithmic Foundations of Differential Privacy
, Cynthia Dwork and Aaron Roth.
Distance Makes the Types Grow Stronger
, Jason Reed and Benjamin C. Pierce.
Differential Privacy Under Fire
, Andreas Haeberlen, Benjamin C. Pierce, and Arjun Narayan.