Automatic verification of confidentiality properties of cryptographic programs

被引:0
作者
El Kadhi, N [1 ]
机构
[1] LERIA Lab, F-94270 Le Kremlin Bicetre, France
来源
8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XIII, PROCEEDINGS: INDUSTRIAL SYSTEMS | 2004年
关键词
static analysis; abstract interpretation; cryptographic protocols; security; confidentiality; constraints;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
We propose a method to statically analyze cryptographic programs, based on the theory of abstract interpretation, and enabling us to verify a policy of preservation of confidentiality for sensitive data. This method rests on an intruder model notably used in cryptographic protocol analysis by D. Bolignano, but differs from cryptographic protocol analysis in two ways. First, the analyzer is automatic. Then, the analyzer has only one program available, that is, only one of the roles of a cryptographic protocol, itself left unspecified. Finally, the analyzer must work on a real program, not an abstraction of it, as is customary. All this makes verification more difficult than in the case of protocols. Nevertheless, the techniques that we propose, and which rest on a calculus on symbolic constraints, can also prove useful in the setting of cryptographic protocols. We argue that our method is practical by investigating experimental evidence.
引用
收藏
页码:248 / 256
页数:9
相关论文
共 21 条
  • [1] Secrecy by typing in security protocols
    Abadi, M
    [J]. JOURNAL OF THE ACM, 1999, 46 (05) : 749 - 786
  • [2] Abadi Martin, 1997, P 4 ACM C COMP COMM, P36, DOI [10.1145/266420.266432, DOI 10.1145/266420.266432]
  • [3] BOLLGNANO D, 1996, 3 ACM C COMPUTER COM, P105
  • [4] BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
  • [5] EFFICIENTLY COMPUTING STATIC SINGLE ASSIGNMENT FORM AND THE CONTROL DEPENDENCE GRAPH
    CYTRON, R
    FERRANTE, J
    ROSEN, BK
    WEGMAN, MN
    ZADECK, FK
    [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1991, 13 (04): : 451 - 490
  • [6] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [7] *FED INF PROC STAN, 1994, DIG SIGN STAND
  • [8] GURGENS S, 1997, 5 INT WORKSH SEC PRO
  • [9] KEMMERER RA, 1989, IEEE J SEL AREA COMM, V7, P488
  • [10] KURAHAN RP, 1997, P 54 ACM C DES AUT D, P258