2013
DOI: 10.1145/2491522.2491523
|View full text |Cite
|
Sign up to set email alerts
|

Dependent Type Theory for Verification of Information Flow and Access Control Policies

Abstract: We present Relational Hoare Type Theory (RHTT), a novel language and verification system capable of expressing and verifying rich information flow and access control policies via dependent types. We show that a number of security policies which have been formalized separately in the literature can all be expressed in RHTT using only standard type-theoretic constructions such as monads, higher-order functions, abstract types, abstract predicates, and modules. Example security policies include conditional declas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
44
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 43 publications
(45 citation statements)
references
References 86 publications
1
44
0
Order By: Relevance
“…in this paper. Following Nanevski et al [24], we assume heaps are indistinguishable iff they are exactly equal, i.e., they contain equal addresses, storing equal values. Thus we also guard against attackers that can distinguish concrete representations of pointers as integer addresses, and perform pointer arithmetic.…”
Section: Attack Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…in this paper. Following Nanevski et al [24], we assume heaps are indistinguishable iff they are exactly equal, i.e., they contain equal addresses, storing equal values. Thus we also guard against attackers that can distinguish concrete representations of pointers as integer addresses, and perform pointer arithmetic.…”
Section: Attack Modelmentioning
confidence: 99%
“…We briefly recapitulate the main components of the RHTT framework introduced by Nanevski et al [24]. Fundamentally, RHTT is based on the following aspects of dependent type theory: dependent function types, inductive types and module systems.…”
Section: Background: Rhttmentioning
confidence: 99%
See 2 more Smart Citations
“…In ongoing work, we have extended RL to a relational version, akin to [3,22,14] but featuring a proof rule for representation independence. We plan to use this as basis for a proof system that allows use of observationally pure methods in specifications, which relies on relational consequences of encapsulation [9,15].…”
Section: Introductionmentioning
confidence: 99%