Combining different proof techniques for verifying information flow security

9Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

When giving a program access to secret information, one must ensure that the program does not leak the secrets to untrusted sinks. For reducing the complexity of such an information flow analysis, one can employ compositional proof techniques. In this article, we present a new approach to analyzing information flow security in a compositional manner. Instead of committing to a proof technique at the beginning of a verification, this choice is made during verification with the option of flexibly migrating to another proof technique. Our approach also increases the precision of compositional reasoning in comparison to the traditional approach. We illustrate the advantages in two exemplary security analyses, on the semantic level and on the syntactic level. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Mantel, H., Sudbrock, H., & Kraußer, T. (2007). Combining different proof techniques for verifying information flow security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4407 LNCS, pp. 94–110). Springer Verlag. https://doi.org/10.1007/978-3-540-71410-1_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free