Secure information flow and program logics

被引:21
作者
Beringer, Lennart [1 ]
Hofmann, Martin [1 ]
机构
[1] Univ Munich, Inst Informat, Oettingenstr 67, D-80538 Munich, Germany
来源
20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS | 2007年
关键词
D O I
10.1109/CSF.2007.30
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present interpretations of type systems for secure information flow in Hoare logic, complementing previous encodings in binary (e.g. relational) program logics. Treating base-line non-inteiference, multi-level security and flow sensitivity for a while language, we show how typing derivations may be used to automatically generate proofs in the program logic that certify the absence of illicit flows. In addition, we present proof rules for baseline non-interference for object-nianipulating instructions, As a consequence, standard verification technology may be used for verifying that a concrete program satisfies the non-inteiference property. Our development is based on a formalisation of the encodings in Isabelle/HOL.
引用
收藏
页码:233 / +
页数:3
相关论文
共 38 条
[1]  
Amtoft T, 2004, LECT NOTES COMPUT SC, V3148, P100
[2]  
AMTOFT T, LOGIC INFORM FLOW OB, P91
[3]  
[Anonymous], POPL 05
[4]  
[Anonymous], P ACM S PRINC PROGR
[5]  
ASPINALL D, 2006, IN PRESS THEORETICAL
[6]  
ASPINALL D, 2006, IN PRESS ENTCS
[7]  
BANERJEE A, 2006, UNPUB LOGICAL ACCOUN
[8]   Secure information flow by self-composition [J].
Barthe, G ;
D'Argenio, PR ;
Rezk, T .
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, :100-114
[9]  
BARTHE G, 2005, P TLDI 05, P103
[10]  
BENTON N, SIMPLE RELATIONAL CO, P14