Abstract—We consider the problem of establishing cryp-tographic guarantees—in particular, computational indis-tinguishability—for Java or Java-like programs that use cryp-tography. For this purpose, we propose a general framework that enables existing program analysis tools that can check (standard) non-interference properties of Java programs to establish cryptographic security guarantees, even if the tools a priori cannot deal with cryptography. The approach that we take is new and combines techniques from program analysis and simulation-based security. Our framework is stated and proved for a Java-like language that comprises a rich fragment of Java. The general idea of our approach should, however, be applicable also to other practical ...
While cryptography is now readily available to everyone and can, provably, protect private informati...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
In the past, formal verification of security properties of distributed applications has been mostly ...
We consider the problem of establishing cryptographic guarantees -- in particular, computational ind...
Abstract. In our previous work, we have proposed a framework which allows tools that can check stand...
In [3], a framework has been proposed which allows tools that can check standard noninterference pro...
Abstract—Several tools and approaches for proving nonin-terference properties for Java and other lan...
Programs contain bugs. Finding program bugs is important, especially in situations where safety and ...
Formal verification of security properties of both cryptographic operations, such as encryption, and...
Type systems and program logics are often thought to be at opposing ends of the spectrum of formal s...
Type systems and program logics are often thought to be at opposing ends of the spectrum of formal s...
AbstractType systems and program logics are often thought to be at opposing ends of the spectrum of ...
While cryptography is now readily available to everyone and can, provably, protect private informati...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
This thesis is focused on encryption with Java libraries. Goal si to compare the libraries in the al...
While cryptography is now readily available to everyone and can, provably, protect private informati...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
In the past, formal verification of security properties of distributed applications has been mostly ...
We consider the problem of establishing cryptographic guarantees -- in particular, computational ind...
Abstract. In our previous work, we have proposed a framework which allows tools that can check stand...
In [3], a framework has been proposed which allows tools that can check standard noninterference pro...
Abstract—Several tools and approaches for proving nonin-terference properties for Java and other lan...
Programs contain bugs. Finding program bugs is important, especially in situations where safety and ...
Formal verification of security properties of both cryptographic operations, such as encryption, and...
Type systems and program logics are often thought to be at opposing ends of the spectrum of formal s...
Type systems and program logics are often thought to be at opposing ends of the spectrum of formal s...
AbstractType systems and program logics are often thought to be at opposing ends of the spectrum of ...
While cryptography is now readily available to everyone and can, provably, protect private informati...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
This thesis is focused on encryption with Java libraries. Goal si to compare the libraries in the al...
While cryptography is now readily available to everyone and can, provably, protect private informati...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
In the past, formal verification of security properties of distributed applications has been mostly ...