Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)
DOI: 10.1109/secpri.1999.766902
|View full text |Cite
|
Sign up to set email alerts
|

Verification of control flow based security properties

Abstract: A fundamental problem in software-based security is whether local security checks inserted into the code are sufficient to implement a global security property. We introduce a formalism based on a two-level lineartime temporal logic for specifying global security properties pertaining to the control-flow of the program, and illustrate its expressive power with a number of existing properties. We define a minimalistic, security-dedicated program model that only contains procedure call and run-time security chec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
142
0

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 94 publications
(143 citation statements)
references
References 28 publications
1
142
0
Order By: Relevance
“…modal µ-calculus specifications [4]. The development of our program model follows earlier work by Jensen et al [11] which addresses security properties expressible as stack invariants. These form a strict subset of the properties which can be expressed in our framework, but allow for more efficient model checking procedures.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…modal µ-calculus specifications [4]. The development of our program model follows earlier work by Jensen et al [11] which addresses security properties expressible as stack invariants. These form a strict subset of the properties which can be expressed in our framework, but allow for more efficient model checking procedures.…”
Section: Discussionmentioning
confidence: 99%
“…Standard models of this kind are provided by labeled transition systems (LTS), where the transition labels denote method invocations and returns. Interaction behavior can then be defined in an abstract and language independent fashion, following the approach by Jensen et al [11], as being induced by a transfer/call graph through a set of transition rules. Composition of behaviors is obtained in process algebraic style by using imperfect actions which handshake to produce perfect communications.…”
Section: Program Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Decision procedures for certain classes of non-regular properties already exist [JMT99, CW02, EKS03, CMM + 04]. The idea of making calls and returns in a recursive program visible to the specification language for writing properties appears implicitly in [JMT99] which proposes a logic over stack contents to specify security constraints, and in [EKS03] which augments linear temporal logic with regular valuations over stack contents, and in our recent work on the temporal logic Caret that allows modalities for matching calls and returns [AEM04]. Also, properties expressing boundedness of stack, and repeatedly boundedness, have received a lot of attention recently [CDT02,BSW03].…”
Section: Software Model Checkingmentioning
confidence: 99%
“…Besides dataflow analysis, model-checking of pushdown systems has also been used for verifying security properties in programs [6,9,5]. Like WPDSs, we can use EW-PDS for this purpose, but with added precision that comes due to the presence of merging functions.…”
Section: Related Workmentioning
confidence: 99%