Proceedings of the 2013 ACM SIGSAC Conference on Computer &Amp; Communications Security - CCS '13 2013
DOI: 10.1145/2508859.2516721
|View full text |Cite
|
Sign up to set email alerts
|

Relational abstract interpretation for the verification of 2-hypersafety properties

Abstract: Information flow properties of programs can be formalized as hyperproperties specifying the relation of multiple executions. In this paper, we therefore introduce a framework for proving 2-hypersafety properties by means of abstract interpretation. The main idea is to apply abstract interpretation on the self-compositions of the control flow graphs of programs. As a result, our method is inherently capable of analyzing relational properties of even dissimilar programs.Constructing self-compositions of control … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
35
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(36 citation statements)
references
References 38 publications
0
35
0
Order By: Relevance
“…As our case studies show, machine code verification requires flow and path sensitive techniques due to register reuse and complex data/control flow. Hence, compared to [30,38], our techniques is more precise. Third, our approach addresses additional complications due to the lack of support for data structures.…”
Section: Discussion and Related Workmentioning
confidence: 93%
See 2 more Smart Citations
“…As our case studies show, machine code verification requires flow and path sensitive techniques due to register reuse and complex data/control flow. Hence, compared to [30,38], our techniques is more precise. Third, our approach addresses additional complications due to the lack of support for data structures.…”
Section: Discussion and Related Workmentioning
confidence: 93%
“…Relational program verification has been used to prove non-functional properties such as compiler optimization correctness [10], program equivalence [39,38] and information flow security [11,8,30]. Neither addresses verification at the machine level.…”
Section: Discussion and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In a nutshell, the type-directed transformation of programs does not self-compose branching statements depending on public variables, but rather uses synchronous programs, and performs copy propagation on self-composed assignments with low expressions to variables. Kovacs, Seidl and Finkbeiner [28] further refine this approach, again by providing a product program that is easier to verify.…”
Section: Related Workmentioning
confidence: 99%
“…Several works have used abstract interpretation in some way. One approach to 2-safety is by forming a product program that encodes execution pairs (Barthe et al 2004;Terauchi and Aiken 2005;Darvas et al 2005), thereby reducing the problem to ordinary safety which can be checked by abstract interpretation (Kovács et al 2013) or other means. Alternatively, a 2-safety property can be checked by dedicated analyses which may rely in part on ordinary abstract interpretations for trace properties (Amtoft et al 2006).…”
mentioning
confidence: 99%