Deductive verification of cryptographic software

被引:3
作者
Almeida, Jose Bacelar [1 ]
Barbosa, Manuel [1 ]
Pinto, Jorge Sousa [1 ]
Vieira, Barbara [1 ]
机构
[1] Univ Minho, CCTC, Dept Informat, Campus Gualtar, P-4710 Braga, Portugal
关键词
Cryptographic algorithms; Program verification; Program equivalence; Self-composition;
D O I
10.1007/s11334-010-0127-y
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We apply state-of-the art deductive verification tools to check security-relevant properties of cryptographic software, including safety, absence of error propagation, and correctness with respect to reference implementations. We also develop techniques to help us in our task, focusing on methods oriented towards increased levels of automation, in scenarios where there are clear obvious limits to such automation. These techniques allow us to integrate automatic proof toolswith an interactive proof assistant, where the latter is used off-line to prove once-and-for-all fundamental lemmas about properties of programs. The techniques developed have independent interest for practical deductive verification in general.
引用
收藏
页码:203 / 218
页数:16
相关论文
共 35 条
[1]  
Almeida JB, 2009, DICCTC0903 CCTC U MI
[2]   The SLAM project: Debugging system software via static analysis [J].
Ball, T ;
Rajamani, SK .
ACM SIGPLAN NOTICES, 2002, 37 (01) :1-3
[3]   Stack-based access control and secure information flow [J].
Banerjee, A ;
Naumann, DA .
JOURNAL OF FUNCTIONAL PROGRAMMING, 2005, 15 :131-177
[4]  
Barnett M, 2004, LNCS, P49, DOI DOI 10.1007/978-3-540-30569-9_3
[5]   Secure information flow by self-composition [J].
Barthe, G ;
D'Argenio, PR ;
Rezk, T .
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, :100-114
[6]  
Baudin P, 2008, ACSL ANSI ISO C SPEC
[7]   Simple relational correctness proofs for static analyses and program transformations [J].
Benton, N .
ACM SIGPLAN NOTICES, 2004, 39 (01) :14-25
[8]  
Chrzaszcz J, 2003, LECT NOTES COMPUT SC, V2758, P270
[9]   Hyperproperties [J].
Clarkson, Michael R. ;
Schneider, Fred B. .
CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS, 2008, :51-65
[10]  
Conchon S, 2006, ERGO THEOREM PROVER