2008
DOI: 10.1016/j.tcs.2008.04.033
|View full text |Cite
|
Sign up to set email alerts
|

Integration of a security type system into a program logic

Abstract: Language-based securityInformation-flow analysis Dynamic logic Security type system Formal verification a b s t r a c t Type systems and program logics are often thought to be at opposing ends of the spectrum of formal software analyses. In this paper we show that a flow-sensitive type system ensuring non-interference in a simple while-language can be expressed through specialised rules of a program logic. In our framework, the structure of non-interference proofs resembles the corresponding derivations in a s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 13 publications
(15 citation statements)
references
References 29 publications
0
15
0
Order By: Relevance
“…Indeed, Hähnle et al [18] recently presented an encoding of Hunt and Sands' type system in a formalism called dynamic logic with updates. The authors demonstrate how the expressiveness of logic complements the efficiency of type systems, and outline how the approach may be used to analyse exceptional behaviour.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, Hähnle et al [18] recently presented an encoding of Hunt and Sands' type system in a formalism called dynamic logic with updates. The authors demonstrate how the expressiveness of logic complements the efficiency of type systems, and outline how the approach may be used to analyse exceptional behaviour.…”
Section: Discussionmentioning
confidence: 99%
“…Several approaches have been developed for verifying adherence to non-interference policies, including (conservative) static analyses phrased as type systems [37,32,29] or abstract interpretations [15,20], flow logics [13], specialpurpose program logics [3,2,6], and encodings in relational or dynamic program logics [9,18]. Self-composition [23,1,7,36] is a recent approach that avoids the consideration of two executions of C for ∼-related initial states.…”
Section: Introductionmentioning
confidence: 99%
“…McDermid and Shi [47] and Shaffer et al [61] focussed on identifying system vulnerabilities at the implementation level through static analysis techniques. A variety of other approaches captured information flow security requirements using various formalisms including state machines (e.g., [62]), Petri nets (e.g., [67]), process algebras (e.g., [15]), typing systems (e.g., [23], [30], [39], [69]), and axiom systems (e.g., [4], [59]). …”
Section: Information Flow Analysismentioning
confidence: 99%
“…In particular, Beringer and Hofmann have explored a semantical notion of self-composition, that dispenses from reasoning on a self-composed program, and showed how to generate automatically formal proofs of non-interference from valid typing derivations in several information flow type systems, including flowsensitive type systems and type systems for fragments of Java. In a similar spirit, Hähnle et al (2007) encode the flow sensitive type system of Hunt and Sands (2006) into an extension of dynamic logic with updates.…”
Section: Related Workmentioning
confidence: 99%