| dc.contributor.advisor | Chlipala, Adam | |
| dc.contributor.author | Zanders, Julian | |
| dc.date.accessioned | 2025-10-06T17:40:12Z | |
| dc.date.available | 2025-10-06T17:40:12Z | |
| dc.date.issued | 2025-05 | |
| dc.date.submitted | 2025-06-23T14:04:42.410Z | |
| dc.identifier.uri | https://hdl.handle.net/1721.1/163024 | |
| dc.description.abstract | The rise of speculative-execution attacks, such as Spectre, has presented a security challenge to developers. Speculation on secret data can expose it, but running without speculation is suboptimal for runtime. To fix this, researchers have been evaluating “smart” speculation schemes, which determine when to speculate and when not to in order to balance runtime with security. Our lab proposes Octal, a solution that utilizes software and hardware in tandem. Data values are marked as secret or public using type inference, and the veracity of inference is checked using a type checker. Then, hardware can separate the secret and public values. My contributions were to the type checker, as well as some scripting to evaluate results. | |
| dc.publisher | Massachusetts Institute of Technology | |
| dc.rights | In Copyright - Educational Use Permitted | |
| dc.rights | Copyright retained by author(s) | |
| dc.rights.uri | https://rightsstatements.org/page/InC-EDU/1.0/ | |
| dc.title | Type Checker for Annotated Assembly Programs | |
| dc.type | Thesis | |
| dc.description.degree | M.Eng. | |
| dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | |
| mit.thesis.degree | Master | |
| thesis.degree.name | Master of Engineering in Electrical Engineering and Computer Science | |