메뉴 건너뛰기




Volumn 20, Issue 3, 2008, Pages 259-275

Formalizing non-interference for a simple bytecode language in Coq

Author keywords

Formal methods for security; Interactive theorem proving; Modular specification; Programming language analysis

Indexed keywords

CODES (SYMBOLS); FORMAL METHODS; SECURITY OF DATA; THEOREM PROVING;

EID: 43449093752     PISSN: 09345043     EISSN: 1433299X     Source Type: Journal    
DOI: 10.1007/s00165-007-0055-2     Document Type: Article
Times cited : (4)

References (44)
  • 1
    • 35248858397 scopus 로고    scopus 로고
    • Using coq to verify java card applet isolation properties
    • Theorem proving in higher order logics Springer, Heidelberg
    • Andronick J, Chetali B, Ly O (2003) Using Coq to verify Java Card Applet Isolation Properties. Theorem proving in higher order logics, TPHOLs'03. LNCS, vol 2758. Springer, Heidelberg
    • (2003) TPHOLs'03. LNCS , vol.2758
    • Andronick, J.1    Chetali, B.2    Ly, O.3
  • 2
    • 43449083094 scopus 로고    scopus 로고
    • Bicolano and MOBIUS base logic
    • Bicolano and MOBIUS base logic. http://mobius.inria.fr/twiki/bin/view/ Bicolano, 2007
  • 3
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based access control for secure information flow
    • 2
    • Banerjee A, Naumann DA (2003) Stack-based access control for secure information flow. J Funct Program 15(2):131-177
    • (2003) J Funct Program , vol.15 , pp. 131-177
    • Banerjee, A.1    Naumann, D.A.2
  • 4
    • 43449107881 scopus 로고    scopus 로고
    • Security types preserving compilation. Verification, model checking, and abstract interpretation
    • Springer, Heidelberg
    • Barthe G, Basu A, Rezk T (2004) Security types preserving compilation. Verification, model checking, and abstract interpretation, VMCAI'04. LNCS, vol 2934. Springer, Heidelberg
    • (2004) VMCAI'04. LNCS , vol.2934
    • Barthe, G.1    Basu, A.2    Rezk, T.3
  • 5
    • 35048881016 scopus 로고    scopus 로고
    • A Tool-assisted framework for certified bytecode verification. Fundamental approaches to software engineering
    • Springer, Heidelberg
    • Barthe G, Dufay G (2004) A Tool-assisted framework for certified bytecode verification. Fundamental approaches to software engineering, FASE 2004. LNCS, vol 2984. Springer, Heidelberg
    • (2004) FASE 2004. LNCS , vol.2984
    • Barthe, G.1    Dufay, G.2
  • 7
    • 0003400251 scopus 로고    scopus 로고
    • Technical Report MTR-2547(2), MITRE Corp. Bedford, 1973. Reprinted in J Comput Secur 4(2-3):239-263. IOS Press
    • Bell DE, LaPadula LJ (1996) Secure Computer systems: a mathematical model. Technical Report MTR-2547(2), MITRE Corp. Bedford, 1973. Reprinted in J Comput Secur 4(2-3):239-263. IOS Press
    • (1996) Secure Computer Systems: A Mathematical Model
    • Bell, D.E.1    Lapadula, L.J.2
  • 10
    • 0003765587 scopus 로고    scopus 로고
    • National Institute of Standards and Technology US Department of Commerce, National Bureau of Standards and Technology
    • National Institute of Standards and Technology (2005) Common criteria for information technology security evaluation. US Department of Commerce, National Bureau of Standards and Technology. http://csrc.nist.gov/cc
    • (2005) Common Criteria for Information Technology Security Evaluation
  • 11
    • 35248831239 scopus 로고    scopus 로고
    • Implementing modules in the Coq system
    • Theorem proving in higher order logics Springer, Heidelberg
    • Chrzaszcz J (2003) Implementing modules in the Coq system. In: Theorem proving in higher order logics, TPHOLs 2003. LNCS, vol 2758. Springer, Heidelberg, pp 270-286
    • (2003) TPHOLs 2003. LNCS , vol.2758 , pp. 270-286
    • Chrzaszcz, J.1
  • 12
    • 0003180840 scopus 로고
    • A formulation of the simple theory of types
    • 2
    • Church A (1940) A formulation of the simple theory of types. J Symb Logic 5(2):56-68
    • (1940) J Symb Logic , vol.5 , pp. 56-68
    • Church, A.1
  • 13
    • 84944233413 scopus 로고
    • Inductively defined types
    • Martin-Löf P, Mints G (eds) International conference in computer logic Springer, Heidelberg
    • Coquand T, Paulin-Mohring C (1990) Inductively defined types. In: Martin-Löf P, Mints G (eds) International conference in computer logic, Colog'88. LNCS, vol 417. Springer, Heidelberg
    • (1990) Colog'88. LNCS , vol.417
    • Coquand, T.1    Paulin-Mohring, C.2
  • 15
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • 7
    • Denning DE, Denning PJ (1977) Certification of programs for secure information flow. Commun ACM 20(7):504-513
    • (1977) Commun ACM , vol.20 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 19
    • 0000952504 scopus 로고    scopus 로고
    • Formalising the Safety of Java, the Java Virtual Machine and Java Card
    • 4
    • Härtel PH, Moreau L (2001) Formalising the Safety of Java, the Java Virtual Machine and Java Card. ACM Comput Surv (CSUR) 33(4):517-558
    • (2001) ACM Comput Surv (CSUR) , vol.33 , pp. 517-558
    • Härtel, P.H.1    Moreau, L.2
  • 21
    • 0033751850 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • Joshi R, Leino KRM (2000) A semantic approach to secure information flow. Sci Comput Programm 37:113-138
    • (2000) Sci Comput Programm , vol.37 , pp. 113-138
    • Joshi, R.1    Leino, K.R.M.2
  • 22
    • 33749545453 scopus 로고    scopus 로고
    • PhD thesis, Computer Laboratory, University of Cambridge, Technical Report 470
    • Kammüller F (1999) Modular reasoning in isabelle. PhD thesis, Computer Laboratory, University of Cambridge, Technical Report 470
    • (1999) Modular Reasoning in Isabelle
    • Kammüller, F.1
  • 23
    • 43449114692 scopus 로고    scopus 로고
    • Kammüller F. http://www.swt.cs.tu-berlin.de/~flokam/coq/index.html
    • Kammüller, F.1
  • 24
    • 0033341745 scopus 로고    scopus 로고
    • A formal proof of Sylow's first theorem-an experiment in abstract algebra with isabelle HOL
    • 3
    • Kammüller F, Paulson LC (1999) A formal proof of Sylow's first theorem-an experiment in abstract algebra with isabelle HOL. J Autom Reason 23(3):235-264
    • (1999) J Autom Reason , vol.23 , pp. 235-264
    • Kammüller, F.1    Paulson, L.C.2
  • 25
    • 0037432611 scopus 로고    scopus 로고
    • Verified bytecode verifiers
    • 3
    • Klein G, Nipkow T (2002) Verified bytecode verifiers. Theor Comput Sci 298(3):583-626
    • (2002) Theor Comput Sci , vol.298 , pp. 583-626
    • Klein, G.1    Nipkow, T.2
  • 26
    • 0042733585 scopus 로고    scopus 로고
    • Java bytecode verification: Algorithms and formalizations
    • 3-4
    • Leroy X (2003) Java bytecode verification: algorithms and formalizations. J Autom Reason Special Issue Bytecode Verif 30(3-4):235-269
    • (2003) J Autom Reason Special Issue Bytecode Verif , vol.30 , pp. 235-269
    • Leroy, X.1
  • 28
    • 43449097113 scopus 로고    scopus 로고
    • Mobius: Mobility, Ubiquity and Security
    • Mobius: Mobility, Ubiquity and Security (2007). http://mobius.inria.fr/ twiki/bin/view/Mobius
    • (2007)
  • 29
    • 84949231907 scopus 로고    scopus 로고
    • Foundations of modular SOS
    • Mathematical Foundations of Computer Science Springer, Heidelberg
    • Mosses PD (1999) Foundations of modular SOS. In: Mathematical Foundations of Computer Science, MFCS'99. LNCS, vol 1672. Springer, Heidelberg
    • (1999) MFCS'99. LNCS , vol.1672
    • Mosses, P.D.1
  • 30
    • 26844529721 scopus 로고    scopus 로고
    • Verifying a secure information flow analyzer. Theorem proving in higher order logics
    • TPHOLs'05, Oxford 2005 Springer, Heidelberg
    • Naumann DA (2005) Verifying a secure information flow analyzer. Theorem proving in higher order logics, TPHOLs'05, Oxford 2005. LNCS, vol 3603. Springer, Heidelberg
    • (2005) LNCS , vol.3603
    • Naumann, D.A.1
  • 31
    • 85084097858 scopus 로고    scopus 로고
    • Safe Kernel extensions without run-time checking
    • October 1996. Operating systems review, Special Issue, ACM, 1996 and USENIX Association, New York
    • Necula GC, Lee P (1996) Safe Kernel extensions without run-time checking. In: Proceedings of 2nd USENIX symposium on operating systems design and implementation (OSDI). October 1996. Operating systems review, Special Issue, ACM, 1996 and USENIX Association, New York, pp 229-243
    • (1996) Proceedings of 2nd USENIX Symposium on Operating Systems Design and Implementation (OSDI) , pp. 229-243
    • Necula, G.C.1    Lee, P.2
  • 32
    • 84976711217 scopus 로고
    • A Comparison of Pascal intermediate languages
    • 8
    • Nelson PA (1979) A Comparison of Pascal intermediate languages. ACM SIGPLAN Notices 14(8):208-213
    • (1979) ACM SIGPLAN Notices , vol.14 , pp. 208-213
    • Nelson, P.A.1
  • 34
    • 35048854255 scopus 로고    scopus 로고
    • Information flow control revisited: Noninfluence = Noninterference + Nonleakage
    • 9th European symposium on research in computer security, ESORICS'04 Springer, Heidelberg
    • Oheimb Dv (2004) Information flow control revisited: Noninfluence = Noninterference + Nonleakage. In: 9th European symposium on research in computer security, ESORICS'04. LNCS, vol 3193. Springer, Heidelberg
    • (2004) LNCS , vol.3193
    • Dv, O.1
  • 35
    • 0005042682 scopus 로고    scopus 로고
    • Machine-checking the Java language specification: Proving type-safety
    • Alves-Foss J (ed) Formal syntax and semantics of Java Springer, Heidelberg
    • Oheimb Dv, Nipkow T (1999) Machine-checking the Java language specification: proving type-safety. In: Alves-Foss J (ed) Formal syntax and semantics of Java. LNCS, vol 1523. Springer, Heidelberg, pp 119-156
    • (1999) LNCS , vol.1523 , pp. 119-156
    • Dv, O.1    Nipkow, T.2
  • 38
    • 0037251378 scopus 로고    scopus 로고
    • Language-based information-flow security
    • Sabelfeld A, Myers A (2003) Language-based information-flow security. Selected Areas Commun 21:5-19
    • (2003) Selected Areas Commun , vol.21 , pp. 5-19
    • Sabelfeld, A.1    Myers, A.2
  • 43
    • 33846519994 scopus 로고    scopus 로고
    • Types, bytes, and separation logic
    • Principles of programming languages, POPL'07 Association for Computing Machinery
    • Tuch H, Klein G, Norrish M (2007) Types, bytes, and separation logic. In: Principles of programming languages, POPL'07. ACM SIGPLAN 42(1), Association for Computing Machinery
    • (2007) ACM SIGPLAN , vol.42 , Issue.1
    • Tuch, H.1    Klein, G.2    Norrish, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.