Compositional verification and refinement of concurrent value-dependent noninterference

T Murray, R Sison, E Pierzchalski… - 2016 IEEE 29th …, 2016 - ieeexplore.ieee.org
Value-dependent noninterference allows the classification of program variables to depend
on the contents of other variables, and therefore is able to express a range of data …

Expressing information flow properties

E Kozyri, S Chong, AC Myers - Foundations and Trends® in …, 2022 - nowpublishers.com
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …

COVERN: A logic for compositional verification of information flow control

T Murray, R Sison, K Engelhardt - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Shared memory concurrency is pervasive in modern programming, including in systems that
must protect highly sensitive data. Recently, verification has finally emerged as a practical …

Compositional non-interference for fine-grained concurrent programs

D Frumin, R Krebbers, L Birkedal - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Non-interference is a program property that ensures the absence of information leaks. In the
context of programming languages, there exist two common approaches for establishing …

SecCSL: Security Concurrent Separation Logic

G Ernst, T Murray - … Aided Verification: 31st International Conference, CAV …, 2019 - Springer
We present SecCSL, a concurrent separation logic for proving expressive, data-dependent
information flow security properties of low-level programs. SecCSL is considerably more …

Types for information flow control: Labeling granularity and semantic models

V Rajani, D Garg - 2018 IEEE 31st Computer Security …, 2018 - ieeexplore.ieee.org
Language-based information flow control (IFC) tracks dependencies within a program using
sensitivity labels and prohibits public outputs from depending on secret inputs. In particular …

Hybrid monitors for concurrent noninterference

A Askarov, S Chong, H Mantel - 2015 IEEE 28th Computer …, 2015 - ieeexplore.ieee.org
Controlling confidential information in concurrent systems is difficult, due to covert channels
resulting from interaction between threads. This problem is exacerbated if threads share …

Verifying that a compiler preserves concurrent value-dependent information-flow security

R Sison, T Murray - arXiv preprint arXiv:1907.00713, 2019 - arxiv.org
It is common to prove by reasoning over source code that programs do not leak sensitive
data. But doing so leaves a gap between reasoning and reality that can only be filled by …

A new algorithm for low-deterministic security

D Giffhorn, G Snelting - International Journal of Information Security, 2015 - Springer
We present a new algorithm for checking probabilistic noninterference in concurrent
programs. The algorithm, named RLSOD, is based on the Low-Security Observational …

Alpha-beta privacy

S Mödersheim, L Viganò - ACM Transactions on Privacy and Security …, 2019 - dl.acm.org
The formal specification of privacy goals in symbolic protocol models has proved to be not
quite trivial so far. The most widely used approach in formal methods is based on the static …