T
Trevor Jim
Researcher at AT&T
Publications - 10
Citations - 973
Trevor Jim is an academic researcher from AT&T. The author has contributed to research in topics: Code generation & Revocation list. The author has an hindex of 6, co-authored 10 publications receiving 941 citations. Previous affiliations of Trevor Jim include University of Pennsylvania.
Papers
More filters
Proceedings Article
Cyclone: A Safe Dialect of C
TL;DR: This paper examines safety violations enabled by C’s design, and shows how Cyclone avoids them, without giving up C”s hallmark control over low-level details such as data representation and memory management.
Journal ArticleDOI
Policy-directed certificate retrieval
TL;DR: QCM is built, a prototype policy language and verifier that can direct a retrieval mechanism to obtain certificates from the network and shows how the technique greatly simplifies certificate‐based secure applications ranging from key distribution to ratings systems, and that QCM policies are simple to write.
Proceedings ArticleDOI
Generalized certificate revocation
Carl A. Gunter,Trevor Jim +1 more
TL;DR: A language for creating and manipulating certificates, that is, digitally signed data based on public key cryptography, and a system for revoking certificates are introduced, with a technique for treating revocation data dually to other sorts of information using a polarity discipline in the intermediate language.
Journal ArticleDOI
Compiling for template-based run-time code generation
TL;DR: This paper generalizes standard flow-graph intermediate representations to support templates, defines a mapping from (a subset of) Cyclone to this representation, and describes a dataflow-analysis framework that supports standard optimizations across template boundaries.
Patent
System and method for enforcing application security policies using authenticated system calls
TL;DR: In this article, the authors present an approach to system call monitoring in which authenticated system calls from an application are easily verified by an operating system kernel with little processing overhead, where the authenticated system call may be a system call augmented with extra arguments.