2012
DOI: 10.1007/978-3-642-27375-9_1
|View full text |Cite
|
Sign up to set email alerts
|

Union and Intersection Types for Secure Protocol Implementations

Abstract: Abstract.We present a new type system for verifying the security of cryptographic protocol implementations. The type system combines prior work on refinement types, with union, intersection, and polymorphic types, and with the novel ability to reason statically about the disjointness of types. The increased expressivity enables the analysis of important protocol classes that were previously out of scope for the type-based analyses of protocol implementations. In particular, our types can statically characteriz… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
3
2
1

Relationship

4
2

Authors

Journals

citations
Cited by 13 publications
(22 citation statements)
references
References 43 publications
0
22
0
Order By: Relevance
“…Among various static analysis approaches, security type systems have played a major role, since they are able to statically provide security proofs for an unbounded number of concurrent executions, even in presence of an active attacker; they are modular, and scale remarkably well in practice. Recent research has shown that it is possible to leverage generalpurpose theorem proving techniques to develop powerful type systems for the verification of a wide range of security properties on application code, thus narrowing the gap between the formal model designed for the analysis and the actual implementation of the protocols [4,2,26]. The integration between type systems and theorem proving is achieved by resorting to a form of dependent types, known as refinement types.…”
Section: Introductionmentioning
confidence: 99%
“…Among various static analysis approaches, security type systems have played a major role, since they are able to statically provide security proofs for an unbounded number of concurrent executions, even in presence of an active attacker; they are modular, and scale remarkably well in practice. Recent research has shown that it is possible to leverage generalpurpose theorem proving techniques to develop powerful type systems for the verification of a wide range of security properties on application code, thus narrowing the gap between the formal model designed for the analysis and the actual implementation of the protocols [4,2,26]. The integration between type systems and theorem proving is achieved by resorting to a form of dependent types, known as refinement types.…”
Section: Introductionmentioning
confidence: 99%
“…This extends the scope of the existing type-based analyses of protocol implementations to important classes of cryptographic protocols that were not covered so far, including protocols based on zeroknowledge proofs. Our type system comes with a mechanized proof of correctness and an efficient implementation [21].…”
Section: Discussionmentioning
confidence: 99%
“…The type-checker consists of around 2.5kLOC, while the whole tool-chain has over 5kLOC. All the tools are available online [21].…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations