2012 IEEE 25th Computer Security Foundations Symposium 2012
DOI: 10.1109/csf.2012.9
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for the Cryptographic Verification of Java-Like Programs

Abstract: We consider the problem of establishing cryptographic guarantees-in particular, computational indistinguishability-for Java or Java-like programs that use cryptography. For this purpose, we propose a general framework that enables existing program analysis tools that can check (standard) non-interference properties of Java programs to establish cryptographic security guarantees, even if the tools a priori cannot deal with cryptography. The approach that we take is new and combines techniques from program analy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
65
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 34 publications
(65 citation statements)
references
References 37 publications
0
65
0
Order By: Relevance
“…The F* programming language [78] has been used to verify small protocols and cryptographic libraries [82]. Similar techniques have been applied to the cryptographic verification of Java programs [59].…”
Section: Inriamentioning
confidence: 99%
“…The F* programming language [78] has been used to verify small protocols and cryptographic libraries [82]. Similar techniques have been applied to the cryptographic verification of Java programs [59].…”
Section: Inriamentioning
confidence: 99%
“…We refer the reader to [19] for a full description of the framework. The CVJ framework is formulated for the language Jinja+ which comprises a rich fragment of Java.…”
Section: The Cvj Frameworkmentioning
confidence: 99%
“…To achieve this, we add oblivious transfer as a cryptographic building block to the framework for Cryptographic Verification of Javalike programs by Küsters et al [19,21]. That is, we provide an ideal interface in Java for oblivious transfer following the ideal OT functionality of [7] for Canetti's UC-framework [5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…While this solution is far from proving correctness of the actual implementation, as it assumes correctness of big parts of code, it is very manageable and amenable for implementation onto the firmware of real hardware tokens. Some recent work has focused on strong information flow guarantees for generalpurpose programs with cryptographic primitives [15,20]. These techniques have been applied to a different setting, an interesting future work would be to study whether they could be applied to the problem of type-based analysis of key management APIs.…”
Section: Introductionmentioning
confidence: 99%