Verifying Relational Properties using Trace Logic

被引:0
作者
Barthe, Gilles [1 ,2 ]
Eilers, Renate [3 ]
Georgiou, Pamina [3 ]
Gleiss, Bernhard [3 ]
Kovacs, Laura [3 ,4 ]
Maffei, Matteo [3 ]
机构
[1] Max Planck Inst Secur & Privacy, Bochum, Germany
[2] IMDEA Software Inst, Madrid, Spain
[3] TU Wien, Vienna, Austria
[4] Chalmers Univ Technol, Gothenburg, Sweden
来源
2019 FORMAL METHODS IN COMPUTER AIDED DESIGN (FMCAD) | 2019年
关键词
INFORMATION-FLOW; VERIFICATION; EQUIVALENCE;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a logical framework for the verification of relational properties in imperative programs. Our framework reduces verification of relational properties of imperative programs to a validity problem in trace logic, an expressive instance of first-order predicate logic. Trace logic draws its expressiveness from its syntax, which allows expressing properties over computation traces. Its axiomatization supports fine-grained reasoning about intermediate steps in program execution, notably loop iterations. We present an algorithm to encode the semantics of programs as well as their relational properties in trace logic, and then show how first-order theorem proving can be used to reason about the resulting trace logic formulas. Our work is implemented in the tool RAPID and evaluated with examples coming from the security field.
引用
收藏
页码:170 / 178
页数:9
相关论文
共 49 条
[1]   A logic for information flow in object-oriented programs [J].
Amtoft, T ;
Bandhakavi, S ;
Banerjee, A .
ACM SIGPLAN NOTICES, 2006, 41 (01) :91-102
[2]   Automating Information Flow Analysis of Low Level Code [J].
Balliu, Musard ;
Dam, Mads ;
Guanciale, Roberto .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :1080-1091
[3]  
Barrett Clark, 2011, Computer Aided Verification. Proceedings 23rd International Conference, CAV 2011, P171, DOI 10.1007/978-3-642-22110-1_14
[4]  
Barrett C., 2017, TECH REP
[5]   Secure information flow by self-composition [J].
Barthe, G ;
D'Argenio, PR ;
Rezk, T .
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, :100-114
[6]  
Barthe G., 2019, ABS190609899 CORR
[7]   Probabilistic Relational Verification for Cryptographic Implementations [J].
Barthe, Gilles ;
Fournet, Cedric ;
Gregoire, Benjamin ;
Strub, Pierre-Yves ;
Swamy, Nikhil ;
Zanella-Beguelin, Santiago .
ACM SIGPLAN NOTICES, 2014, 49 (01) :193-205
[8]  
Barthe Gilles, 2013, LNCS, V7734, P29, DOI [10.1007/978--3-642--35722--0_3, DOI 10.1007/978-3-642-35722-03]
[9]  
Beckert B., 2001, Automated Reasoning. First International Joint Conference, IJCAR 2001. Proceedings (Lecture Notes in Artificial Intelligence Vol.2083), P626
[10]  
Beckert Bernhard., 2018, Principled Software Development - Essays Dedicated to Arnd Poetzsch-Heffter on the Occasion of his 60th Birthday, P41, DOI DOI 10.1007/978-3-319-98047-83