2020
DOI: 10.1007/978-3-030-63595-4_10
|View full text |Cite
|
Sign up to set email alerts
|

Verification of the IBOS Browser Security Properties in Reachability Logic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…The simplification rules are powerful enough to be used on their own as an automatic (partial) oracle to answer inductive validity questions. For example, as mentioned in the earlier paper [49], a prototype version of a subset of the simplification rules made it possible to discharge a huge number of inductive validity verification conditions (VCs) that were generated in the deductive verification proof in constructor-based reachability logic of the security properties of the IBOS Browser described in [69,68]. For a more recent example, the simplification rules implemented in the NuITP prover are invoked as an oracle to discharge VCs generated by the DM-Check tool when proving invariants of infinite-state systems [8].…”
Section: Introductionmentioning
confidence: 99%
“…The simplification rules are powerful enough to be used on their own as an automatic (partial) oracle to answer inductive validity questions. For example, as mentioned in the earlier paper [49], a prototype version of a subset of the simplification rules made it possible to discharge a huge number of inductive validity verification conditions (VCs) that were generated in the deductive verification proof in constructor-based reachability logic of the security properties of the IBOS Browser described in [69,68]. For a more recent example, the simplification rules implemented in the NuITP prover are invoked as an oracle to discharge VCs generated by the DM-Check tool when proving invariants of infinite-state systems [8].…”
Section: Introductionmentioning
confidence: 99%
“…To cite a few examples, Skeirik et al[71] formally model and analyze availability properties of a ZooKeeper-based group key management service; Eckhardt et al[31] propose and analyze DoS resilience mechanisms for Internet services; the constructor-based reachability logic theorem prover is used to verify the security properties of a browser system[72]. Other Formal Development Methods.…”
mentioning
confidence: 99%