scispace - formally typeset
T

Trevor Jim

Researcher at AT&T

Publications -  10
Citations -  973

Trevor Jim is an academic researcher from AT&T. The author has contributed to research in topics: Code generation & Revocation list. The author has an hindex of 6, co-authored 10 publications receiving 941 citations. Previous affiliations of Trevor Jim include University of Pennsylvania.

Papers
More filters
Proceedings Article

Cyclone: A Safe Dialect of C

TL;DR: This paper examines safety violations enabled by C’s design, and shows how Cyclone avoids them, without giving up C”s hallmark control over low-level details such as data representation and memory management.
Journal ArticleDOI

Policy-directed certificate retrieval

TL;DR: QCM is built, a prototype policy language and verifier that can direct a retrieval mechanism to obtain certificates from the network and shows how the technique greatly simplifies certificate‐based secure applications ranging from key distribution to ratings systems, and that QCM policies are simple to write.
Proceedings ArticleDOI

Generalized certificate revocation

TL;DR: A language for creating and manipulating certificates, that is, digitally signed data based on public key cryptography, and a system for revoking certificates are introduced, with a technique for treating revocation data dually to other sorts of information using a polarity discipline in the intermediate language.
Journal ArticleDOI

Compiling for template-based run-time code generation

TL;DR: This paper generalizes standard flow-graph intermediate representations to support templates, defines a mapping from (a subset of) Cyclone to this representation, and describes a dataflow-analysis framework that supports standard optimizations across template boundaries.
Patent

System and method for enforcing application security policies using authenticated system calls

TL;DR: In this article, the authors present an approach to system call monitoring in which authenticated system calls from an application are easily verified by an operating system kernel with little processing overhead, where the authenticated system call may be a system call augmented with extra arguments.