Programming Languages for Cybersecurity at RIO 2025

The course is taught by Gilles Barthe and Santiago Arranz Olmos.

In this course we will show how to approach some security problems in a rigorous and principled way, using programming language theory. Some of the problems we will tackle are: reasoning about interaction with polynomial adversaries, relating highly optimized implementations with their corresponding specifications, and analyzing secret and public data flow of a program.

Our case study will be Jasmin, a language designed to implement high assurance high speed cryptography. Jasmin provides a detailed control of the assembly generated by the compiler, allowing for maximal optimization of cryptographic routines. The compiler is verified in Coq, guaranteeing that a Jasmin program and its compilation have equivalent behaviors.

From a Jasmin program, one may extract a model for the EasyCrypt proof assistant, which may be used to prove program properties such as cryptographic security. Additionally, Jasmin provides a safety checker to detect common mistakes such as out-of-bounds accesses and arithmetic errors.

Finally, we will show a type system that allows to compute the public and private information flow of a program, and how such information can be used to guarantee that a program does not reveal secret information, even in the presence of side channels and speculative execution.

Group picture

Jasmin tutorial

The tutorial is available here. Please follow the README.md to install everything and have it ready for the course. Contact me at santiago [dot] arranz-olmos [at] mpi-sp [dot] org if you are having trouble with it.

UPDATE 2025-03-15: I added many comments and small fixes in the tutorial.

Classes

Monday 10th: Introduction to Formosa, Hoare Logic, Jasmin

Formosa, EasyCrypt, and Jasmin; review of Hoare logic

Referenced material:


Tuesday 11th: Relational Hoare Logic, EasyCrypt, Jasmin tutorial

Relational Hoare Logic; relational properties; example HL proof in EC; Jasmin tutorial

Referenced material:


Wednesday 12th: Operational Semantics, Constant-Time

Operational semantics; semantics with observations; constant-time

Referenced material:


Thursday 13th: Compiler preservation of semantics

Safety properties; functional correctness; forward and backward simulations; CT simulations; simulations with transformers

Referenced material:

You should have finished the reference implementation of Gimli during the course. Should you need help, or want the solutions, contact me for hints (or search more thoroughly).


Extra resources

Side-channel attacks:


Exam

You can submit your exam here: nce.mpi-sp.org/index.php/apps/forms/s/AEJFP3bHAs83wsxnLD39DjCn.

‎;)