Skip to main content

Showing 1–6 of 6 results for author: Headley, K

  1. arXiv:2407.01688  [pdf, other

    cs.SE

    How We Built Cedar: A Verification-Guided Approach

    Authors: Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael Hicks, Kesha Hietala, John Kastner, Anwar Mamat, Matt McCutchen, Neha Rungta, Bhakti Shah, Emina Torlak, Andrew Wells

    Abstract: This paper presents verification-guided development (VGD), a software engineering process we used to build Cedar, a new policy language for expressive, fast, safe, and analyzable authorization. Developing a system with VGD involves writing an executable model of the system and mechanically proving properties about the model; writing production code for the system and using differential random test… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  2. arXiv:2403.04651  [pdf, other

    cs.PL

    Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization (Extended Version)

    Authors: Joseph W. Cutler, Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael Hicks, Kesha Hietala, Eleftherios Ioannidis, John Kastner, Anwar Mamat, Darin McAdams, Matt McCutchen, Neha Rungta, Emina Torlak, Andrew Wells

    Abstract: Cedar is a new authorization policy language designed to be ergonomic, fast, safe, and analyzable. Rather than embed authorization logic in an application's code, developers can write that logic as Cedar policies and delegate access decisions to Cedar's evaluation engine. Cedar's simple and intuitive syntax supports common authorization use-cases with readable policies, naturally leveraging concep… ▽ More

    Submitted 8 March, 2024; v1 submitted 7 March, 2024; originally announced March 2024.

  3. arXiv:2203.13445  [pdf

    cs.PL cs.CR cs.SE

    C to Checked C by 3C

    Authors: Aravind Machiry, John Kastner, Matt McCutchen, Aaron Eline, Kyle Headley, Michael Hicks

    Abstract: Owing to the continued use of C (and C++), spatial safety violations (e.g., buffer overflows) still constitute one of today's most dangerous and prevalent security vulnerabilities. To combat these violations, Checked C extends C with bounds-enforced checked pointer types. Checked C is essentially a gradually typed spatially safe C - checked pointers are backwards-binary compatible with legacy poin… ▽ More

    Submitted 25 March, 2022; originally announced March 2022.

  4. arXiv:1808.07826  [pdf, other

    cs.PL cs.FL cs.LO

    Fungi: Typed incremental computation with names

    Authors: Matthew A. Hammer, Jana Dunfield, Kyle Headley, Monal Narasimhamurthy, Dimitrios J. Economou

    Abstract: Incremental computations attempt to exploit input similarities over time, reusing work that is unaffected by input changes. To maximize this reuse in a general-purpose programming setting, programmers need a mechanism to identify dynamic allocations (of data and subcomputations) that correspond over time. We present Fungi, a typed functional language for incremental computation with names. Unlike… ▽ More

    Submitted 20 August, 2018; originally announced August 2018.

  5. arXiv:1608.06009  [pdf, other

    cs.DS cs.PL

    The Random Access Zipper: Simple, Purely-Functional Sequences

    Authors: Kyle Headley, Matthew A. Hammer

    Abstract: We introduce the Random Access Zipper (RAZ), a simple, purely-functional data structure for editable sequences. A RAZ combines the structure of a zipper with that of a tree: like a zipper, edits at the cursor require constant time; by leveraging tree structure, relocating the edit cursor in the sequence requires logarithmic time. While existing data structures provide these time bounds, none do so… ▽ More

    Submitted 21 August, 2016; originally announced August 2016.

  6. Incremental Computation with Names

    Authors: Matthew A. Hammer, Jana Dunfield, Kyle Headley, Nicholas Labich, Jeffrey S. Foster, Michael Hicks, David Van Horn

    Abstract: Over the past thirty years, there has been significant progress in developing general-purpose, language-based approaches to incremental computation, which aims to efficiently update the result of a computation when an input is changed. A key design challenge in such approaches is how to provide efficient incremental support for a broad range of programs. In this paper, we argue that first-class na… ▽ More

    Submitted 23 March, 2021; v1 submitted 26 March, 2015; originally announced March 2015.

    Comments: OOPSLA '15, October 25-30, 2015, Pittsburgh, PA, USA

    ACM Class: D.3.1; D.3.3; F.3.2