Logical Foundations of Secure Resource Management in Protocol Implementations

被引:0
|
作者
Bugliesi, Michele [1 ]
Calzavara, Stefano [1 ]
Eigner, Fabienne [2 ]
Maffei, Matteo [2 ]
机构
[1] Univ Ca Foscari Venezia, Venice, Italy
[2] Saarland Univ, Saarbrucken, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent research has shown that it is possible to leverage general-purpose theorem proving techniques to develop powerful type systems for the verification of a wide range of security properties on application code. Although successful in many respects, these type systems fall short of capturing resource-conscious properties that are crucial in large classes of modern distributed applications. In this paper, we propose the first type system that statically enforces the safety of cryptographic protocol implementations with respect to authorization policies expressed in affine logic. Our type system draws on a novel notion of "exponential serialization" of affine formulas, a general technique to protect affine formulas from the effect of duplication. This technique allows to formulate an expressive logical encoding of the authentication mechanisms underpinning distributed resource-aware authorization policies. We further devise a sound and complete type checking algorithm. We discuss the effectiveness of our approach on a case study from the world of e-commerce protocols.
引用
收藏
页码:105 / 125
页数:21
相关论文
共 50 条
  • [1] On Logical Foundations of Multilevel Secure Databases
    Hasan M. Jamil
    Gillian Dobbie
    Journal of Intelligent Information Systems, 2004, 23 : 271 - 294
  • [2] On logical foundations of multilevel secure databases
    Jamil, HM
    Dobbie, G
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2004, 23 (03) : 271 - 294
  • [3] ProInspector: Uncovering Logical Bugs in Protocol Implementations
    Zhang, Zichao
    Jia, Limin
    Pasareanu, Corina
    9TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P 2024, 2024, : 617 - 632
  • [4] Union and Intersection Types for Secure Protocol Implementations
    Backes, Michael
    Hritcu, Catalin
    Maffei, Matteo
    THEORY OF SECURITY AND APPLICATIONS, 2012, 6993 : 1 - 28
  • [5] Logical verification of secure electronic transactions protocol
    Chen, Qingfeng
    Wang, Ju
    Bai, Shuo
    Zhang, Shichao
    Sui, Liying
    Ruan Jian Xue Bao/Journal of Software, 2000, 11 (03): : 346 - 362
  • [6] Proved generation of implementations from computationally secure protocol specifications
    Cade, David
    Blanchet, Bruno
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (03) : 331 - 402
  • [7] Proved Generation of Implementations from Computationally Secure Protocol Specifications
    Cade, David
    Blanchet, Bruno
    PRINCIPLES OF SECURITY AND TRUST, POST 2013, 2013, 7796 : 63 - 82
  • [8] The foundations of natural resource policy and management
    Wallace, RL
    POLICY SCIENCES, 2002, 35 (03) : 325 - 330
  • [9] Logical key tree based secure multicast protocol with copyright protection
    Chen, WT
    Hsu, HL
    Chiang, JL
    19th International Conference on Advanced Information Networking and Applications, Vol 1, Proceedings: AINA 2005, 2005, : 279 - 284
  • [10] Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations
    Ho, Son
    Protzenko, Jonathan
    Bichhawat, Abhishek
    Bhargavan, Karthikeyan
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 107 - 124