2014
DOI: 10.3233/jcs-130493
|View full text |Cite
|
Sign up to set email alerts
|

Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations

Abstract: We present a new type system for verifying the security of reference implementations of cryptographic protocols written in a core functional programming language.The type system combines prior work on refinement types, with union, intersection, and polymorphic types, and with the novel ability to reason statically about the disjointness of types. The increased expressivity enables the analysis of important protocol classes that were previously out of scope for the type-based analyses of reference protocol impl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 18 publications
(22 citation statements)
references
References 122 publications
(198 reference statements)
0
22
0
Order By: Relevance
“…Thus, it prevents digital signatures on private data which is a limitation of our type system inherited from the kinding rules of [7]. This problem can be resolved by adding a number of subkinding and subtyping rules to the type system [18] or by using union and intersection types [6].…”
Section: Kinding and Subtypingmentioning
confidence: 97%
See 3 more Smart Citations
“…Thus, it prevents digital signatures on private data which is a limitation of our type system inherited from the kinding rules of [7]. This problem can be resolved by adding a number of subkinding and subtyping rules to the type system [18] or by using union and intersection types [6].…”
Section: Kinding and Subtypingmentioning
confidence: 97%
“…However, it has been shown that ProVerif is not scalable when the number of lines of the protocol specification increases [12]. In another line of research, the source code of a given protocol is annotated by security types and the annotated code is analyzed using a type checker [5,6,14,68,69]. Type-based analysis methods are inherently modular and, in turn, scalable.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In particular, mature push-button analysis tools have emerged and have been successfully applied to many protocols from the literature in the context of trace properties such as authentication or confidentiality. These tools employ a variety of analysis techniques, such as model checking (e.g., Avispa [6] and Scyther [31]), Horn clause resolution (e.g., ProVerif [13]), term rewriting (e.g., Scyther [31] and Tamarin [38]), and type systems [7,12,[16][17][18][19][20][21]34,36,37].…”
Section: Introductionmentioning
confidence: 99%