2005
DOI: 10.1007/978-3-540-32004-3_20
|View full text |Cite
|
Sign up to set email alerts
|

A Theorem Proving Approach to Analysis of Secure Information Flow

Abstract: Abstract. Most attempts at analysing secure information flow in programs are based on domain-specific logics. Though computationally feasible, these approaches suffer from the need for abstraction and the high cost of building dedicated tools for real programming languages. We recast the information flow problem in a general program logic rather than a problem-specific one. We investigate the feasibility of this approach by showing how a general purpose tool for software verification can be used to perform inf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
183
0

Year Published

2005
2005
2011
2011

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 152 publications
(183 citation statements)
references
References 18 publications
0
183
0
Order By: Relevance
“…Therefore, such an encoding is impractical for our purposes, since we aim to capture information flow policies without changing the verification logic every time that the security property needs to be adapted. More recently, Darvas, Hähnle, and Sands (2005) have shown how dynamic logic may be used to verify non-interference and some declassification policies of (sequential) Java programs. As in Andrews and Reitman's encoding, non-interference of a program P is captured by a formula over P -in this case a formula in dynamic logic.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, such an encoding is impractical for our purposes, since we aim to capture information flow policies without changing the verification logic every time that the security property needs to be adapted. More recently, Darvas, Hähnle, and Sands (2005) have shown how dynamic logic may be used to verify non-interference and some declassification policies of (sequential) Java programs. As in Andrews and Reitman's encoding, non-interference of a program P is captured by a formula over P -in this case a formula in dynamic logic.…”
Section: Introductionmentioning
confidence: 99%
“…This thesis discusses a method to encode the information flow property as a temporal logic property. To do this, we implement the idea of self-composition -a construction where a program is composed with its copy and each program copy keeps an independent memory [34,15]. Basically, we construct a program model that executes the program to be verified twice, in parallel with itself.…”
Section: Logic-based Verificationmentioning
confidence: 99%
“…Therefore, recent work on adopting techniques from model checking [16,34,48] is emerging as an alternative approach to gain better precision. This thesis develops different methods to verify our information flow properties by combining newly developed and existing model-checking algorithms.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations