12 results on '"Gilles Barthe"'
Search Results
2. Almost Sure Productivity
- Author
-
Alejandro Aguirre and Gilles Barthe and Justin Hsu and Alexandra Silva, Aguirre, Alejandro, Barthe, Gilles, Hsu, Justin, Silva, Alexandra, Alejandro Aguirre and Gilles Barthe and Justin Hsu and Alexandra Silva, Aguirre, Alejandro, Barthe, Gilles, Hsu, Justin, and Silva, Alexandra
- Abstract
We introduce Almost Sure Productivity (ASP), a probabilistic generalization of the productivity condition for coinductively defined structures. Intuitively, a probabilistic coinductive stream or tree is ASP if it produces infinitely many outputs with probability 1. Formally, we define ASP using a final coalgebra semantics of programs inspired by Kerstan and König. Then, we introduce a core language for probabilistic streams and trees, and provide two approaches to verify ASP: a syntactic sufficient criterion, and a decision procedure by reduction to model{-}checking LTL formulas on probabilistic pushdown automata.
- Published
- 2018
- Full Text
- View/download PDF
3. *-Liftings for Differential Privacy
- Author
-
Gilles Barthe and Thomas Espitau and Justin Hsu and Tetsuya Sato and Pierre-Yves Strub, Barthe, Gilles, Espitau, Thomas, Hsu, Justin, Sato, Tetsuya, Strub, Pierre-Yves, Gilles Barthe and Thomas Espitau and Justin Hsu and Tetsuya Sato and Pierre-Yves Strub, Barthe, Gilles, Espitau, Thomas, Hsu, Justin, Sato, Tetsuya, and Strub, Pierre-Yves
- Abstract
Recent developments in formal verification have identified approximate liftings (also known as approximate couplings) as a clean, compositional abstraction for proving differential privacy. There are two styles of definitions for this construction. Earlier definitions require the existence of one or more witness distributions, while a recent definition by Sato uses universal quantification over all sets of samples. These notions have different strengths and weaknesses: the universal version is more general than the existential ones, but the existential versions enjoy more precise composition principles. We propose a novel, existential version of approximate lifting, called *-lifting, and show that it is equivalent to Sato's construction for discrete probability measures. Our work unifies all known notions of approximate lifting, giving cleaner properties, more general constructions, and more precise composition theorems for both styles of lifting, enabling richer proofs of differential privacy. We also clarify the relation between existing definitions of approximate lifting, and generalize our constructions to approximate liftings based on f-divergences.
- Published
- 2017
- Full Text
- View/download PDF
4. A Program Logic for Union Bounds
- Author
-
Gilles Barthe and Marco Gaboardi and Benjamin Grégoire and Justin Hsu and Pierre-Yves Strub, Barthe, Gilles, Gaboardi, Marco, Grégoire, Benjamin, Hsu, Justin, Strub, Pierre-Yves, Gilles Barthe and Marco Gaboardi and Benjamin Grégoire and Justin Hsu and Pierre-Yves Strub, Barthe, Gilles, Gaboardi, Marco, Grégoire, Benjamin, Hsu, Justin, and Strub, Pierre-Yves
- Abstract
We propose a probabilistic Hoare logic aHL based on the union bound, a tool from basic probability theory. While the union bound is simple, it is an extremely common tool for analyzing randomized algorithms. In formal verification terms, the union bound allows flexible and compositional reasoning over possible ways an algorithm may go wrong. It also enables a clean separation between reasoning about probabilities and reasoning about events, which are expressed as standard first-order formulas in our logic. Notably, assertions in our logic are non-probabilistic, even though we can conclude probabilistic facts from the judgments. Our logic can also prove accuracy properties for interactive programs, where the program must produce intermediate outputs as soon as pieces of the input arrive, rather than accessing the entire input at once. This setting also enables adaptivity, where later inputs may depend on earlier intermediate outputs. We show how to prove accuracy for several examples from the differential privacy literature, both interactive and non-interactive.
- Published
- 2016
- Full Text
- View/download PDF
5. Challenges and Trends in Probabilistic Programming (Dagstuhl Seminar 15181)
- Author
-
Gilles Barthe and Andrew D. Gordon and Joost-Pieter Katoen and Annabelle McIver, Barthe, Gilles, Gordon, Andrew D., Katoen, Joost-Pieter, McIver, Annabelle, Gilles Barthe and Andrew D. Gordon and Joost-Pieter Katoen and Annabelle McIver, Barthe, Gilles, Gordon, Andrew D., Katoen, Joost-Pieter, and McIver, Annabelle
- Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 15181 "Challenges and Trends in Probabilistic Programming". Probabilistic programming is at the heart of machine learning for describing distribution functions; Bayesian inference is pivotal in their analysis. Probabilistic programs are used in security for describing both cryptographic constructions (such as randomised encryption) and security experiments. In addition, probabilistic models are an active research topic in quantitative information now. Quantum programs are inherently probabilistic due to the random outcomes of quantum measurements. Finally, there is a rapidly growing interest in program analysis of probabilistic programs, whether it be using model checking, theorem proving, static analysis, or similar. Dagstuhl Seminar 15181 brought researchers from these various research communities together so as to exploit synergies and realize cross-fertilisation.
- Published
- 2015
- Full Text
- View/download PDF
6. The Synergy Between Programming Languages and Cryptography (Dagstuhl Seminar 14492)
- Author
-
Gilles Barthe and Michael Hicks and Florian Kerschbaum and Dominique Unruh, Barthe, Gilles, Hicks, Michael, Kerschbaum, Florian, Unruh, Dominique, Gilles Barthe and Michael Hicks and Florian Kerschbaum and Dominique Unruh, Barthe, Gilles, Hicks, Michael, Kerschbaum, Florian, and Unruh, Dominique
- Abstract
Increasingly, modern cryptography (crypto) has moved beyond the problem of secure communication to a broader consideration of securing computation. The past thirty years have seen a steady progression of both theoretical and practical advances in designing cryptographic protocols for problems such as secure multiparty computation, searching and computing on encrypted data, verifiable storage and computation, statistical data privacy, and more. More recently, the programming-languages (PL) community has begun to tackle the same set of problems, but from a different perspective, focusing on issues such as language design (e.g., new features or type systems), formal methods (e.g., model checking, deductive verification, static and dynamic analysis), compiler optimizations, and analyses of side-channel attacks and information leakage. This seminar helped to cross-fertilize ideas between the PL and crypto communities, exploiting the synergies for advancing the development of secure computing, broadly speaking, and fostering new research directions in and across both communities.
- Published
- 2015
- Full Text
- View/download PDF
7. Challenges and Trends in Probabilistic Programming (Dagstuhl Seminar 15181)
- Author
-
Gilles Barthe and Andrew D. Gordon and Joost-Pieter Katoen and Annabelle McIver, Barthe, Gilles, Gordon, Andrew D., Katoen, Joost-Pieter, McIver, Annabelle, Gilles Barthe and Andrew D. Gordon and Joost-Pieter Katoen and Annabelle McIver, Barthe, Gilles, Gordon, Andrew D., Katoen, Joost-Pieter, and McIver, Annabelle
- Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 15181 "Challenges and Trends in Probabilistic Programming". Probabilistic programming is at the heart of machine learning for describing distribution functions; Bayesian inference is pivotal in their analysis. Probabilistic programs are used in security for describing both cryptographic constructions (such as randomised encryption) and security experiments. In addition, probabilistic models are an active research topic in quantitative information now. Quantum programs are inherently probabilistic due to the random outcomes of quantum measurements. Finally, there is a rapidly growing interest in program analysis of probabilistic programs, whether it be using model checking, theorem proving, static analysis, or similar. Dagstuhl Seminar 15181 brought researchers from these various research communities together so as to exploit synergies and realize cross-fertilisation.
- Published
- 2015
- Full Text
- View/download PDF
8. The Synergy Between Programming Languages and Cryptography (Dagstuhl Seminar 14492)
- Author
-
Gilles Barthe and Michael Hicks and Florian Kerschbaum and Dominique Unruh, Barthe, Gilles, Hicks, Michael, Kerschbaum, Florian, Unruh, Dominique, Gilles Barthe and Michael Hicks and Florian Kerschbaum and Dominique Unruh, Barthe, Gilles, Hicks, Michael, Kerschbaum, Florian, and Unruh, Dominique
- Abstract
Increasingly, modern cryptography (crypto) has moved beyond the problem of secure communication to a broader consideration of securing computation. The past thirty years have seen a steady progression of both theoretical and practical advances in designing cryptographic protocols for problems such as secure multiparty computation, searching and computing on encrypted data, verifiable storage and computation, statistical data privacy, and more. More recently, the programming-languages (PL) community has begun to tackle the same set of problems, but from a different perspective, focusing on issues such as language design (e.g., new features or type systems), formal methods (e.g., model checking, deductive verification, static and dynamic analysis), compiler optimizations, and analyses of side-channel attacks and information leakage. This seminar helped to cross-fertilize ideas between the PL and crypto communities, exploiting the synergies for advancing the development of secure computing, broadly speaking, and fostering new research directions in and across both communities.
- Published
- 2015
- Full Text
- View/download PDF
9. Formally Verified Implementation of an Idealized Model of Virtualization
- Author
-
Gilles Barthe and Gustavo Betarte and Juan Diego Campo and Jesús Mauricio Chimento and Carlos Luna, Barthe, Gilles, Betarte, Gustavo, Campo, Juan Diego, Chimento, Jesús Mauricio, Luna, Carlos, Gilles Barthe and Gustavo Betarte and Juan Diego Campo and Jesús Mauricio Chimento and Carlos Luna, Barthe, Gilles, Betarte, Gustavo, Campo, Juan Diego, Chimento, Jesús Mauricio, and Luna, Carlos
- Abstract
VirtualCert is a machine-checked model of virtualization that can be used to reason about isolation between operating systems in presence of cache-based side-channels. In contrast to most prominent projects on operating systems verification, where such guarantees are proved directly on concrete implementations of hypervisors, VirtualCert abstracts away most implementations issues and specifies the effects of hypervisor actions axiomatically, in terms of preconditions and postconditions. Unfortunately, seemingly innocuous implementation issues are often relevant for security. Incorporating the treatment of errors into VirtualCert is therefore an important step towards strengthening the isolation theorems proved in earlier work. In this paper, we extend our earlier model with errors, and prove that isolation theorems still apply. In addition, we provide an executable specification of the hypervisor, and prove that it correctly implements the axiomatic model. The executable specification constitutes a first step towards a more realistic implementation of a hypervisor, and provides a useful tool for validating the axiomatic semantics developed in previous work.
- Published
- 2014
- Full Text
- View/download PDF
10. 07091 Abstracts Collection – Mobility, Ubiquity and Security
- Author
-
Gilles Barthe and Heiko Mantel and Peter Müller and Andrew C. Myers and Andrei Sabelfeld, Barthe, Gilles, Mantel, Heiko, Müller, Peter, Myers, Andrew C., Sabelfeld, Andrei, Gilles Barthe and Heiko Mantel and Peter Müller and Andrew C. Myers and Andrei Sabelfeld, Barthe, Gilles, Mantel, Heiko, Müller, Peter, Myers, Andrew C., and Sabelfeld, Andrei
- Abstract
From 25.02.2007 to 02.03.2007, the Dagstuhl Seminar 07091 ``Mobility, Ubiquity and Security'' was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available.
- Published
- 2007
- Full Text
- View/download PDF
11. 07091 Executive Summary – Mobility, Ubiquity and Security
- Author
-
Gilles Barthe and Heiko Mantel and Peter Müller and Andrew C. Myers and Andrei Sabelfeld, Barthe, Gilles, Mantel, Heiko, Müller, Peter, Myers, Andrew C., Sabelfeld, Andrei, Gilles Barthe and Heiko Mantel and Peter Müller and Andrew C. Myers and Andrei Sabelfeld, Barthe, Gilles, Mantel, Heiko, Müller, Peter, Myers, Andrew C., and Sabelfeld, Andrei
- Abstract
Increasing code mobility and ubiquity raises serious concerns about the security of modern computing infrastructures. The focus of this seminar was on securing computing systems by design and by construction.
- Published
- 2007
- Full Text
- View/download PDF
12. Dependent Type Theory meets Practical Programming (Dagstuhl Seminar 01341)
- Author
-
Gilles Barthe and Peter Dybjer and Peter Thiemann, Barthe, Gilles, Dybjer, Peter, Thiemann, Peter, Gilles Barthe and Peter Dybjer and Peter Thiemann, Barthe, Gilles, Dybjer, Peter, and Thiemann, Peter
- Published
- 2002
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.