Logical Foundations of Secure Resource Management in Protocol Implementations

被引:0
|
作者
Bugliesi, Michele [1 ]
Calzavara, Stefano [1 ]
Eigner, Fabienne [2 ]
Maffei, Matteo [2 ]
机构
[1] Univ Ca Foscari Venezia, Venice, Italy
[2] Saarland Univ, Saarbrucken, Germany
来源
PRINCIPLES OF SECURITY AND TRUST, POST 2013 | 2013年 / 7796卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent research has shown that it is possible to leverage general-purpose theorem proving techniques to develop powerful type systems for the verification of a wide range of security properties on application code. Although successful in many respects, these type systems fall short of capturing resource-conscious properties that are crucial in large classes of modern distributed applications. In this paper, we propose the first type system that statically enforces the safety of cryptographic protocol implementations with respect to authorization policies expressed in affine logic. Our type system draws on a novel notion of "exponential serialization" of affine formulas, a general technique to protect affine formulas from the effect of duplication. This technique allows to formulate an expressive logical encoding of the authentication mechanisms underpinning distributed resource-aware authorization policies. We further devise a sound and complete type checking algorithm. We discuss the effectiveness of our approach on a case study from the world of e-commerce protocols.
引用
收藏
页码:105 / 125
页数:21
相关论文
共 50 条
  • [21] Edge-assisted quantum protocol for secure multiparty logical AND its applications
    Shi, Run-hua
    Fang, Xia-qin
    ISCIENCE, 2023, 26 (07)
  • [22] Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations
    Backes, Michael
    Hritcu, Catalin
    Maffei, Matteo
    JOURNAL OF COMPUTER SECURITY, 2014, 22 (02) : 301 - 353
  • [23] Refinement Types for Secure Implementations
    Bengtson, Jesper
    Bhargavan, Karthikeyan
    Fournet, Cedric
    Gordon, Andrew D.
    Maffeis, Sergio
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2011, 33 (02):
  • [24] Collaborative and secure resource management with distributed agents
    Lee, Y
    Cho, Y
    Stach, J
    Park, EK
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, 2001, : 689 - 697
  • [25] ON THE LOGICAL-FOUNDATIONS OF DIALOG MANAGEMENT IN DATA-ENTRY OPERATIONS
    WEDEKIND, H
    ANGEWANDTE INFORMATIK, 1983, (02): : 68 - 77
  • [26] Secure Implementations for the Internet of Things
    Schmidt, Joern-Marc
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 2 - 2
  • [27] Refinement types for secure implementations
    Bengtson, Jesper
    Bhargavan, Karthikeyan
    Fournet, Cedric
    Gordon, Andrew D.
    Maffeis, Sergio
    CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS, 2008, : 17 - +
  • [29] Secure Streaming Media Data Management Protocol
    Do, Jeong-Min
    Song, You-Jin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 193 - 202
  • [30] Secure Protocol for Resource-Constrained IoT Device Authentication
    Nyangaresi, Vincent Omollo
    Rodrigues, Anthony Joachim
    Al Rababah, Ahmad A.
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2022, 14 (01)