Back to Search Start Over

Compositional System Security with Interface-Confined Adversaries.

Authors :
Garg, Deepak
Franklin, Jason
Kaynar, Dilsun
Datta, Anupam
Source :
ENTCS: Electronic Notes in Theoretical Computer Science; Sep2010, Vol. 265, p49-71, 23p
Publication Year :
2010

Abstract

Abstract: This paper presents a formal framework for compositional reasoning about secure systems. A key insight is to view a trusted system in terms of the interfaces that the various components expose: larger trusted components are built by combining interface calls in known ways; the adversary is confined to the interfaces it has access to, but may combine interface calls without restriction. Compositional reasoning for such systems is based on an extension of rely-guarantee reasoning for system correctness [Misra, J. and K.M. Chandy, Proofs of networks of processes, IEEE Transactions on Software Engineering 7 (1981), pp. 417–426; Jones, C.B., Tentative steps toward a development method for interfering programs, ACM Transactions on Programming Languages and Systems (TOPLAS) 5 (1983), pp. 596–619] to a setting that involves an adversary whose exact program is not known. At a technical level, the paper presents an expressive concurrent programming language with recursive functions for modeling interfaces and a logic of programs in which compositional reasoning principles are formalized and proved sound with respect to trace semantics. The methods are illustrated through a small fragment of an idealized file system. [Copyright &y& Elsevier]

Details

Language :
English
ISSN :
15710661
Volume :
265
Database :
Supplemental Index
Journal :
ENTCS: Electronic Notes in Theoretical Computer Science
Publication Type :
Periodical
Accession number :
53430059
Full Text :
https://doi.org/10.1016/j.entcs.2010.08.005