Secure composition of untrusted code: wrappers and causality types | IEEE Conference Publication | IEEE Xplore