SNIP: Speculative Execution and Non-Interference Preservation for Compiler Transformations
ACM SIGPLAN via YouTube
Master Agentic AI, GANs, Fine-Tuning & LLM Apps
The Fastest Way to Become a Backend Developer Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This 22-minute conference talk from POPL 2025 presents research on preserving non-interference across compiler transformations under speculative execution semantics. Learn about a novel proof method developed by Sören van der Wall and Roland Meyer from TU Braunschweig that ensures security preservation uniformly across source programs. The researchers introduce a new simulation relation that handles attacker-controlled micro-architectural states and accounts for how compiler transformations affect execution. Discover how they proved the correctness of dead code elimination while uncovering a previously unknown security weakness in register allocation that affects real-world cryptographic code in the libsodium library. The presentation also covers their innovative static analysis solution that operates on product programs and provides an automated fix for existing register allocation implementations, with formal proof of correctness for the fixed approach.
Syllabus
[POPL'25] SNIP: Speculative Execution and Non-Interference Preservation for Compiler Transformations
Taught by
ACM SIGPLAN