Computationally Sound Verification of Source Code

被引:23
作者
Backes, Michael [1 ]
Maffei, Matteo [2 ]
Unruh, Dominique [2 ]
机构
[1] Univ Saarland, MPI SWS, D-66123 Saarbrucken, Germany
[2] Univ Saarland, D-66123 Saarbrucken, Germany
来源
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10) | 2010年
关键词
Computational soundness; verification; source code; SYMMETRIC-ENCRYPTION; SECURITY;
D O I
10.1145/1866307.1866351
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Increasing attention has recently been given to the formal verification of the source code of cryptographic protocols. The standard approach is to use symbolic abstractions of cryptography that make the analysis amenable to automation. This leaves the possibility of attacks that exploit the mathematical properties of the cryptographic algorithms themselves. In this paper, we show how to conduct the protocol analysis on the source code level (F# in our case) in a computationally sound way, i.e., taking into account cryptographic security definitions. We build upon the prominent F7 verification framework (Bengtson et al., CSF 2008) which comprises a security type-checker for F# protocol implementations using symbolic idealizations and the concurrent lambda calculus RCF to model a core fragment of F#. To leverage this prior work, we give conditions under which symbolic security of RCF programs using cryptographic idealizations implies computational security of the same programs using cryptographic algorithms. Combined with F7, this yields a computationally sound, automated verification of F# code containing public-key encryptions and signatures. For the actual computational soundness proof, we use the CoSP framework (Backes, Hofheinz, and Unruh, CCS 2009). We thus inherit the modularity of CoSP, which allows for easily extending our proof to other cryptographic primitives.
引用
收藏
页码:387 / 398
页数:12
相关论文
共 40 条
  • [1] Reconciling two views of cryptography (The computational soundness of formal encryption)
    Abadi, M
    Rogaway, P
    [J]. JOURNAL OF CRYPTOLOGY, 2002, 15 (02) : 103 - 127
  • [2] Mobile values, new names, and secure communication
    Abadi, M
    Fournet, C
    [J]. ACM SIGPLAN NOTICES, 2001, 36 (03) : 104 - 115
  • [3] Abadi M., 1997, P 4 ACM C COMP COMM, P36, DOI DOI 10.1145/266420.266432
  • [4] ABADI M, 2001, LNCS, V2215, P82
  • [5] Abadi M, 2006, LECT NOTES COMPUT SC, V3921, P398
  • [6] Adao P, 2006, LECT NOTES COMPUT SC, V4052, P83
  • [7] [Anonymous], IACR CRYPTOLOGY EPRI
  • [8] Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
    Backes, M
    Pfitzmann, B
    [J]. 17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 204 - 218
  • [9] Backes M, 2003, LECT NOTES COMPUT SC, V2808, P271
  • [10] The reactive simulatability (RSIM) framework for asynchronous systems
    Backes, Michael
    Pfitzmann, Birgit
    Waidner, Michael
    [J]. INFORMATION AND COMPUTATION, 2007, 205 (12) : 1685 - 1720