This work is licensed under a CC-BY Creative Commons Attribution 3.0 Unported license (http://creativecommons.org/licenses/by/3.0/)urn: urn:nbn:de:0030-drops-42770urn: urn:nbn:de:0030-drops-42770Self-composition is a logical formulation of non-interference, a high-level security property that guarantees the absence of illicit information leakages through executing programs. In order to capture program executions, self-composition has been expressed in Hoare or modal logic, and has been proved (or refuted) by using theorem provers. These approaches require considerable user interaction, and verification expertise. This paper presents an automated technique to prove self-composition. We reformulate the idea of self-composition into comparing ...
acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acm...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
To achieve end-to-end security in a system built from parts, it is important to ensure that the comp...
Self-composition is a logical formulation of non-interference, a high-level security property that g...
Information flow policies are confidentiality policies that control information leakage through prog...
Formal verification of cryptographic software implementations poses significant challenges for off-t...
When giving a program access to secret information, one must ensure that the program does not le...
This paper shows how secure information flow properties of multi-threaded programs can be verified b...
Symbolic execution is a powerful, systematic program analysis approach that has received much visibi...
Formal verification of cryptographic software implementations poses significant challenges for off-t...
Abstract. This paper shows how secure information flow properties of multi-threaded programs can be ...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
Noninterference is a high-level security property that guarantees the absence of illicit information...
Methods for proving that concurrent software does not leak its secrets has remained an active topic ...
Abstract. We discuss how to perform symbolic execution of large programs in a manner that is both co...
acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acm...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
To achieve end-to-end security in a system built from parts, it is important to ensure that the comp...
Self-composition is a logical formulation of non-interference, a high-level security property that g...
Information flow policies are confidentiality policies that control information leakage through prog...
Formal verification of cryptographic software implementations poses significant challenges for off-t...
When giving a program access to secret information, one must ensure that the program does not le...
This paper shows how secure information flow properties of multi-threaded programs can be verified b...
Symbolic execution is a powerful, systematic program analysis approach that has received much visibi...
Formal verification of cryptographic software implementations poses significant challenges for off-t...
Abstract. This paper shows how secure information flow properties of multi-threaded programs can be ...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
Noninterference is a high-level security property that guarantees the absence of illicit information...
Methods for proving that concurrent software does not leak its secrets has remained an active topic ...
Abstract. We discuss how to perform symbolic execution of large programs in a manner that is both co...
acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acm...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
To achieve end-to-end security in a system built from parts, it is important to ensure that the comp...