2015
DOI: 10.1007/978-3-319-18467-8_6
|View full text |Cite
|
Sign up to set email alerts
|

Verifying Observational Determinism

Abstract: Part 1: PrivacyInternational audienceThis paper proposes an approach to verify information flow security of concurrent programs. It discusses a hyperproperty called observational determinism which aims to ensure secure information flow in concurrent programs, and proves how this hyperproperty can be verified by stutter equivalence checking. More precisely, it defines observational determinism in terms of stutter equivalence of all traces having the same low initial value and shows how stutter trace equivalence… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 24 publications
(37 reference statements)
0
4
0
Order By: Relevance
“…We believe the applicability of the algorithm can be extended and it can be used to verify many security properties, such as strong security [6] and probabilistic noninterference [6]. In an earlier paper [31], we used a similar algorithm to verify observational determinism.…”
Section: Discussionmentioning
confidence: 99%
“…We believe the applicability of the algorithm can be extended and it can be used to verify many security properties, such as strong security [6] and probabilistic noninterference [6]. In an earlier paper [31], we used a similar algorithm to verify observational determinism.…”
Section: Discussionmentioning
confidence: 99%
“…The paper works out the theoretical foundations of hyperproperties and contrasts them to classical trace properties. Traditionally, hyperproperties were formulated and used in a case by case fashion, see for example [41,45,53].…”
Section: Hyperpropertiesmentioning
confidence: 99%
“…Probabilistic noninterference [ 28 , 29 , 30 ] and observational determinism [ 10 , 31 , 32 , 33 , 34 , 35 ] have been used as information flow properties to characterize the security of concurrent programs. For verifying these security properties, type systems [ 28 , 29 , 31 , 32 ], algorithmic verification [ 10 , 30 , 33 , 34 ], program analysis [ 35 ], and logics [ 36 , 37 , 38 ] have been utilized. In qualitative information flow, the security property gets rejected when there is a leakage, even a minor one.…”
Section: Related Workmentioning
confidence: 99%