JavaScript is disabled for your browser. Some features of this site may not work without it.
eCommons will become read-only at noon on May 26 for an infrastructure update. Submissions will not be accepted at this time. We anticipate that this update will be completed by June 2 at 5 p.m.
Please contact us at ecommons-admin@cornell.edu if you have questions or concerns.
Computer Science Technical Reports
Browse by
This is a collection of technical reports from the Cornell's Computer Science (CS) Department from the time period of 1968-2002. These reports are part of the NCSTRL collection of Computer Science Technical Reports.
For reports from 2003-present, see the Computing and Information Science Technical Reports Collection.
Recent Submissions
-
Tamperproof Provenance-Aware Storage for Mobile Ad Hoc Networks
Adams, Danny; Rubambiza, Gloire; Fiori, Pablo; Wang, Xinwen; Weatherspoon, Hakim; Van Renesse, Robbert (2020-12-08)This paper presents a middleware for providing a mobile ad hoc network with tamperproof provenance-aware storage, even when some fraction of devices can be Byzantine. Important considerations include fast propagation of ... -
One-way Functions Exist iff Kt-Complexity is Hard-on-Average
Unknown author (2020-03-27) -
RIF: Reactive Information Flow Labels
Kozyri, Elisavet; Schneider, Fred B. (2019-04-08)Restrictions that a reactive information flow (RIF) label imposes on a value are determined by the sequence of operations used to derive that value. This allows declassification, endorsement, and other forms of reclassification ... -
Using Information Flow to Design an ISA that Controls Timing Channels
Zagieboylo, Drew; Suh, Gookwon Edward; Myers, Andrew C. (2019)Information-flow control (IFC) enforcing languages can provide high assurance that software does not leak information or allow an attacker to influence critical systems. IFC hardware description languages have also been ... -
Beyond Labels: Permissiveness for Dynamic Information Flow Enforcement
Kozyri, Elisavet; Schneider, Fred B.; Bedford, Andrew; Desharnais, Josée; Tawbi, Nadia (2019-02-28)Flow-sensitive labels used by dynamic enforcement mechanisms might themselves encode sensitive information, which can leak. Metalabels, employed to represent the sensitivity of labels, exhibit the same problem. This paper ... -
X-Containers: Breaking Down Barriers to Improve Performance and Isolation of Cloud-Native Containers
Shen, Zhiming; Sun, Zhen; Sela, Gur-Eyal; Bagdasaryan, Eugene; Delimitrou, Christina; Van Renesse, Robbert; Weatherspoon, Hakim (2018-08-29)“Cloud-native” container platforms, such as Kubernetes, have become an integral part of production cloud environments. One of the principles in designing cloud-native applications is called “Single Concern Principle”, which ... -
Security Results for SIRRTL, A Hardware Description Language for Information Flow Security
Ferraiuolo, Andrew (2017-12)This document establishes security results for SIRRTL, a secure variant of the FIRRTL intermediate language. We developed ChiselFlow, a variant of the Chisel hardware design language [1] for information flow security. ... -
HyperFlow: A Processor Architecture for Timing-Safe Information-Flow Security
Ferraiuolo, Andrew; Zhao, Yuqi; Suh, G. Edward; Myers, Andrew C. (2018-05-01)This paper presents HyperFlow, a processor that enforces secure information flow, including control over timing channels. The design and implementation of HyperFlow offer security assurance because it is implemented ... -
Undecidable Problems for Probabilistic Network Programming
Kahn, David (2017-07-07)The software defined networking language NetKAT is able to verify many useful properties of networks automatically via a PSPACE decision procedure for program equality. However, for its probabilistic extension ProbNetKAT, ... -
Flow-Limited Authorization
Arden, Owen (2017-01)Enforcing the confidentiality and integrity of information is critical in distributed applications. Production systems typically use some form of authorization mechanism to protect information, but these mechanisms do ...