2018 IEEE European Symposium on Security and Privacy (EuroS&P) 2018
DOI: 10.1109/eurosp.2018.00010
|View full text |Cite
|
Sign up to set email alerts
|

COVERN: A Logic for Compositional Verification of Information Flow Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 31 publications
(44 citation statements)
references
References 31 publications
0
43
0
Order By: Relevance
“…This construction applies to a broad range of security properties, including those specifiable in the HyperLTL logic [5]. When applied to automaton-based formulations of the non-interference and constant-time properties, the resulting proof rules are essentially identical to those developed in the literature in [7,8,17] for non-interference and in [3] for constant-time. Manna and Pnueli show in a beautiful paper [15] how to derive custom proof rules for deductive verification of a LTL property from an equivalent Büchi automaton; our constructions are inspired by this work.…”
Section: Discussion and Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…This construction applies to a broad range of security properties, including those specifiable in the HyperLTL logic [5]. When applied to automaton-based formulations of the non-interference and constant-time properties, the resulting proof rules are essentially identical to those developed in the literature in [7,8,17] for non-interference and in [3] for constant-time. Manna and Pnueli show in a beautiful paper [15] how to derive custom proof rules for deductive verification of a LTL property from an equivalent Büchi automaton; our constructions are inspired by this work.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…We establish connections to known proof rules for preservation of the noninterference [7,8,17] and constant-time [3] properties. We show that under the assumptions of those rules, there is a simple and direct definition of a relation that meets the automaton-based refinement conditions for automata representing these properties.…”
Section: Connections To Existing Proof Rulesmentioning
confidence: 99%
See 2 more Smart Citations
“…At the same time, recent work has heralded major advancements in program logics for reasoning about secure information flow [23,33,34]-i.e. whether programs properly protect their secrets-yielding the first general program logics and proofs of information flow security for non-trivial concurrent programs [34]. Yet so far, such logics have remained confined to interactive proof assistants, making them practically inaccessible to industrial developers.…”
Section: Introductionmentioning
confidence: 99%