메뉴 건너뛰기




Volumn 6, Issue 3, 2010, Pages 203-218

Deductive verification of cryptographic software

Author keywords

Cryptographic algorithms; Program equivalence; Program verification; Self composition

Indexed keywords

AUTOMATIC PROOFS; CRYPTOGRAPHIC ALGORITHMS; CRYPTOGRAPHIC SOFTWARE; DEDUCTIVE VERIFICATION; ERROR PROPAGATION; INTERACTIVE PROOF ASSISTANTS; LEVELS OF AUTOMATION; PROGRAM EQUIVALENCE; PROGRAM VERIFICATION; REFERENCE IMPLEMENTATION; SELF-COMPOSITION; STATE OF THE ART;

EID: 77956423308     PISSN: 16145046     EISSN: 16145054     Source Type: Journal    
DOI: 10.1007/s11334-010-0127-y     Document Type: Article
Times cited : (4)

References (37)
  • 2
    • 0036039066 scopus 로고    scopus 로고
    • Ball T, Rajamani SK (2002) The SLAM project: debugging system software via static analysis. In: POPL '02: Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on principles of programming languages. ACM, New York, pp 1-3.
  • 3
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based access control and secure information flow
    • Banerjee A, Naumann DA (2005) Stack-based access control and secure information flow. J Funct Program 15(2): 131-177.
    • (2005) J Funct Program , vol.15 , Issue.2 , pp. 131-177
    • Banerjee, A.1    Naumann, D.A.2
  • 4
    • 77956451621 scopus 로고    scopus 로고
    • Barnett M, Rustan K, Leino M, Schulte W (2004) The Spec# programming system: an overview. In: Construction and analysis of safe, secure, and interoperable smart devices. Springer, Berlin, pp 49-69.
  • 5
    • 4944265699 scopus 로고    scopus 로고
    • Barthe G, D'Argenio PR, Rezk T (2004) Secure information flow by self-composition. In: CSFW. IEEE Computer Society, USA, pp 100-114.
  • 6
    • 77956426727 scopus 로고    scopus 로고
    • Baudin P, Filliâtre J-C, Marché C, Monate B, Moy Y, Prevosto V (2008) ACSL: ANSI/ISO C Specfication Language. CEA LIST and INRIA, Preliminary design (version 1. 4, December 12, 2008).
  • 7
    • 1442263162 scopus 로고    scopus 로고
    • Simple relational correctness proofs for static analyses and program transformations
    • N. D. Jones and X. Leroy (Eds.), New York: ACM
    • Benton N (2004) Simple relational correctness proofs for static analyses and program transformations. In: Jones ND, Leroy X (eds) POPL. ACM, New York, pp 14-25.
    • (2004) Popl , pp. 14-25
    • Benton, N.1
  • 8
    • 77956433673 scopus 로고    scopus 로고
    • Computer Aided Cryptography Engineering. EU FP7
    • Computer Aided Cryptography Engineering. EU FP7. http://www. cace-project. eu/.
  • 9
    • 35248831239 scopus 로고    scopus 로고
    • Chrzaszcz J (2003) Implementation of modules in the Coq system. In: Basin D, Wolff B (eds) Proceedings of the theorem proving in higher order logics 16th international conference. LNCS, vol 2758. Rome, Italy, September 2003. Springer, Berlin, pp 270-286.
  • 10
    • 51749086409 scopus 로고    scopus 로고
    • Clarkson MR, Schneider FB (2008) Hyperproperties. In: CSF. IEEE Computer Society, USA, pp 51-65.
  • 12
    • 0002896911 scopus 로고
    • Soundness and completeness of an axiom system for program verification
    • Cook SA (1978) Soundness and completeness of an axiom system for program verification. SIAM J Comput 7(1): 70-90.
    • (1978) SIAM J Comput , vol.7 , Issue.1 , pp. 70-90
    • Cook, S.A.1
  • 13
    • 45749085681 scopus 로고    scopus 로고
    • de Moura L, Bjørner N (2008) Z3: an efficient SMT solver. Lecture Notes in Computer Science, vol 4963/2008. Springer, Berlin, pp 337-340.
  • 14
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning DE, Denning PJ (1977) Certification of programs for secure information flow. Commun ACM 20(7): 504-513.
    • (1977) Commun ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 15
    • 24944448541 scopus 로고    scopus 로고
    • Simplify: A theorem prover for program checking
    • Detlefs D, Nelson G, Saxe JB (2005) Simplify: a theorem prover for program checking. J ACM 52(3): 365-473.
    • (2005) J ACM , vol.52 , Issue.3 , pp. 365-473
    • Detlefs, D.1    Nelson, G.2    Saxe, J.B.3
  • 16
    • 26944484793 scopus 로고    scopus 로고
    • Dufay G, Felty A, Matwin S (2005) Privacy-sensitive information flow with JML. In: Automated deduction-CADE-20. Springer, Berlin, pp 116-130.
  • 17
    • 36049022245 scopus 로고    scopus 로고
    • Filliâtre J-C, Marché C (2007) The Why/Krakatoa/Caduceus platform for deductive program verification. In: Damm W, Hermanns H (eds) CAV. Lecture notes in computer science, vol 4590. Springer, Berlin, pp 173-177.
  • 18
    • 0036041563 scopus 로고    scopus 로고
    • Henzinger TA, Jhala R, Majumdar R, Sutre G (2002) Lazy abstraction. In: POPL '02: Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on principles of programming languages. ACM, New York, pp 58-70.
  • 19
    • 84945708698 scopus 로고
    • An axiomatic basis for computer programming
    • Hoare CAR (1969) An axiomatic basis for computer programming. Commun ACM 12: 576-580.
    • (1969) Commun ACM , vol.12 , pp. 576-580
    • Hoare, C.A.R.1
  • 20
    • 0142245539 scopus 로고    scopus 로고
    • Jacobs BPF, Kiniry JR, Warnier ME, Jacobs B, Kiniry J, Warnier M (2003) Java program verification challenges. In: Proceedings of the formal methods for component objects, FMCO 2002. Lecture notes in computer science, vol 2852. Springer, Berlin, pp 202-219.
  • 21
    • 70350238531 scopus 로고    scopus 로고
    • Software model checking
    • Jhala R, Majumdar R (2009) Software model checking. ACM Comput Surv 41(4): 1-54.
    • (2009) ACM Comput Surv , vol.41 , Issue.4 , pp. 1-54
    • Jhala, R.1    Majumdar, R.2
  • 22
    • 84885236249 scopus 로고    scopus 로고
    • Leavens GT, Ruby C, Leino KRM, Poll E, Jacobs B (2000) JML (poster session): notations and tools supporting detailed design in Java. In OOPSLA '00: Addendum to the 2000 proceedings of the conference on Object-oriented programming, systems, languages, and applications (Addendum). ACM, New York, pp 105-106.
  • 23
    • 84957588448 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • Leino KRM, Joshi R (1998) A semantic approach to secure information flow. Lect Notes Comput Sci 1422: 254-271.
    • (1998) Lect Notes Comput Sci , vol.1422 , pp. 254-271
    • Leino, K.R.M.1    Joshi, R.2
  • 24
    • 0022184087 scopus 로고    scopus 로고
    • Leivant D (1985) Logical and mathematical reasoning about imperative programs. In: POPL, pp 132-140.
  • 25
    • 0032646625 scopus 로고    scopus 로고
    • Myers AC (1999) Jflow: Practical mostly-static information flow control. In: POPL, pp 228-241.
  • 26
    • 33646177208 scopus 로고    scopus 로고
    • Enforcing robust declassification and qualified robustness
    • Myers AC, Sabelfeld A, Zdancewic S (2006) Enforcing robust declassification and qualified robustness. J Comput Secur 14(2): 157-196.
    • (2006) J Comput Secur , vol.14 , Issue.2 , pp. 157-196
    • Myers, A.C.1    Sabelfeld, A.2    Zdancewic, S.3
  • 27
    • 33750232981 scopus 로고    scopus 로고
    • Naumann DA (2006) From coupling relations to mated invariants for checking information flow. In: Computer Security-ESORICS 2006. LNCS, vol 4189, pp 279-296.
  • 29
  • 31
    • 33646037706 scopus 로고    scopus 로고
    • Terauchi T, Aiken A (2005) Secure information flow as a safety problem. In: Hankin C, Siveroni I (eds) SAS. Lecture notes in computer science, vol 3672. Springer, Berlin, pp 352-367.
  • 33
    • 77956450130 scopus 로고    scopus 로고
    • The OpenSSL Project
    • The OpenSSL Project. http://www. openssl. org.
  • 34
    • 24644494868 scopus 로고    scopus 로고
    • Tse S, Zdancewic S (2005) A design for a security-typed language with certificate-based declassification. In: Sagiv S (ed) ESOP. Lecture notes in computer science, vol 3444. Springer, Berlin, pp 279-294.
  • 35
    • 34548790762 scopus 로고    scopus 로고
    • Vaughan JA, Zdancewic S (2007) A cryptographic decentralized label model. In: IEEE symposium on security and privacy. IEEE Computer Society, USA, pp 192-206.
  • 36
    • 84956989228 scopus 로고    scopus 로고
    • Volpano DM, Smith G (1997) A type-based approach to program security. In: Bidoit M, Dauchet M (eds) TAPSOFT. Lecture notes in computer science, vol 1214. Springer, Berlin, pp 607-621.
  • 37
    • 77956425925 scopus 로고    scopus 로고
    • Warnier M, Oostdijk M (2005) Non-interference in JML. Technical Report ICIS-R05034, Nijmegen Institute for Computing and Information Sciences.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.