Unwinding relations have been widely used to prove that finite systems are secure with respect to a variety of noninterference policies. The latter are prominent instances of security-relevant hyperproperties. As hyperproperties are defined on potentially infinite systems, a new mathematical development is needed in order to (re)use unwinding relations for generic verification of security-relevant hyperproperties. In this paper we propose a framework for coinductive unwinding of security relevant hyperproperties. To illustrate the usefulness of the framework, we show that Mantel’s Basic Security Predicates (BSPs), the noninterference policies they compose, as well as their respective unwinding relations, have a meaningful coinductive rein...
Abstract. Current standard security practices do not provide substan-tial assurance about informatio...
Current standard security practices do not provide substantial assurance about information flow secu...
Current standard security practices do not provide substantial assurance about information flow secu...
Unwinding relations have been widely used to prove that finite systems are secure with respect to a ...
The importance of security and reliability of software systems makes formal methods of paramount sig...
We study bisimulation-based information ow security properties which are persistent, in the sense t...
Properties, which have long been used for reasoning about systems, are sets of traces. Hyperproperti...
The paper considers several definitions of information flow security for intransitive policies from ...
Trace properties, which have long been used for reasoning about systems, are sets of execution trace...
Temporal hyperproperties are system properties that relate multiple execution traces. For (finite-st...
A hyperproperty is a set of sets of finite or infinite traces over some fixed alphabet and can be se...
A hyperproperty is a set of sets of finite or infinite traces over some fixed alphabet and can be se...
Hyperproperties were proposed as an abstract formalization of security policies, but unfortunately t...
We study bisimulation-based information flow security properties which are persistent, in the sense ...
We study bisimulation-based information flow security properties which are persistent, in the sense ...
Abstract. Current standard security practices do not provide substan-tial assurance about informatio...
Current standard security practices do not provide substantial assurance about information flow secu...
Current standard security practices do not provide substantial assurance about information flow secu...
Unwinding relations have been widely used to prove that finite systems are secure with respect to a ...
The importance of security and reliability of software systems makes formal methods of paramount sig...
We study bisimulation-based information ow security properties which are persistent, in the sense t...
Properties, which have long been used for reasoning about systems, are sets of traces. Hyperproperti...
The paper considers several definitions of information flow security for intransitive policies from ...
Trace properties, which have long been used for reasoning about systems, are sets of execution trace...
Temporal hyperproperties are system properties that relate multiple execution traces. For (finite-st...
A hyperproperty is a set of sets of finite or infinite traces over some fixed alphabet and can be se...
A hyperproperty is a set of sets of finite or infinite traces over some fixed alphabet and can be se...
Hyperproperties were proposed as an abstract formalization of security policies, but unfortunately t...
We study bisimulation-based information flow security properties which are persistent, in the sense ...
We study bisimulation-based information flow security properties which are persistent, in the sense ...
Abstract. Current standard security practices do not provide substan-tial assurance about informatio...
Current standard security practices do not provide substantial assurance about information flow secu...
Current standard security practices do not provide substantial assurance about information flow secu...