CBMC-GC is a compiler for C programs in the context of secure two-party computation (STC). It compiles a C program that specifies a secure computation into a circuit which can be read in by an STC platform, which then performs the secure computation between two parties A and B:
At the beginning of the compilation CBMC-GC translates the given C program into an intermediate representation featuring a simplified set of control statements. This program in intermediate representation is then translated into a circuit by symbolically executing the program. In order to perform the symbolic execution CBMC-GC unrolls loops and recursive function calls up to a predetermined bound. This bound is either determined automatically via an internal static analysis of the program or is given by the user in case CBMC-GC is not able to discover the bound. During the symbolic execution each statement gets translated into a subcircuit which represents the semantics of the respective statement, the input wires to these subcircuits thereby represent the current program state and the output wires represent the next program state after the effect of the statement was applied to the current program state. Find more details in “Secure Two-party Computations in ANSI C”.
|CC’14 Presentation||(07. April 2014)|
|cbmc-gc-v0.9.3.tar.gz||(28. March 2014)|
|cbmc-gc-v0.9.3_upd1.pdf (Updated documentation, includes description of CBMC-GC’s circuit format)||(30. November 2014)|
|cbmc-gc-v0.8.tar.gz||(14. May 2013)|
|cbmc-gc-v0.8.pdf (Documentation)||(14. May 2013)|
|CCS’12 Presentation||(18. October 2012)|
We co-organized the PETShop’13 workshop at CCS in Berlin: http://forsyte.at/petshop-2013/!
||| CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations|
Compiler Construction - 23rd International Conference, CC 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014. Proceedings (Albert Cohen, ed.), volume 8409 of Lecture Notes in Computer Science, pages 244-249, 2014, Springer.
||| Challenges in Compiler Construction for Secure Two-Party Computation|
(Martin Franz, Andreas Holzer, Rupak Majumdar, Bryan Parno, Helmut Veith, eds.), pages 3-6, 2013, ACM.
||| The first workshop on language support for privacy-enhancing technologies (PETShop'13)|
ACM Conference on Computer and Communications Security (Ahmad-Reza Sadeghi, Virgil D. Gligor, Moti Yung, eds.), pages 1485-1486, 2013, ACM.
||| Secure Two-party Computations in ANSI C|
ACM Conference on Computer and Communications Security, pages 772-783, 2012, ACM Press.
Technische Universität Wien
Institut für Informationssysteme 184/4
|Room:||HD 03 13 (how to get there)|
|Phone:||+43 (1) 58801 – 184 67|