Checking and Automating Confidentiality Theory in Isabelle/UTP
L Bailey, J Woodcock, S Foster, R Metere - arXiv preprint arXiv …, 2023 - arxiv.org
L Bailey, J Woodcock, S Foster, R Metere
arXiv preprint arXiv:2310.10658, 2023•arxiv.orgThe severity of recent vulnerabilities discovered on modern CPUs, eg, Spectre [1], highlights
how information leakage can have devas-tating effects to the security of computer systems.
At the same time, it suggests that confidentiality should be promoted as a normal part of
program verification, to discover and mitigate such vulnerabili-ties early in development. The
theory we propose is primarily based on Bank's theory [2], a framework for reasoning about
confidentiali-ty properties formalised in the Unifying Theories of Programming (UTP)[3]. We …
how information leakage can have devas-tating effects to the security of computer systems.
At the same time, it suggests that confidentiality should be promoted as a normal part of
program verification, to discover and mitigate such vulnerabili-ties early in development. The
theory we propose is primarily based on Bank's theory [2], a framework for reasoning about
confidentiali-ty properties formalised in the Unifying Theories of Programming (UTP)[3]. We …
The severity of recent vulnerabilities discovered on modern CPUs, e.g., Spectre [1], highlights how information leakage can have devas-tating effects to the security of computer systems. At the same time, it suggests that confidentiality should be promoted as a normal part of program verification, to discover and mitigate such vulnerabili-ties early in development. The theory we propose is primarily based on Bank's theory [2], a framework for reasoning about confidentiali-ty properties formalised in the Unifying Theories of Programming (UTP) [3]. We mechanised our encoding in the current implementa-tion of UTP in the Isabelle theorem prover, Isabelle/UTP [4]. We have identified some theoretical issues in Bank's original framework. Finally, we demonstrate how our mechanisation can be used to for-mally verify of some of the examples from Bank's work.
arxiv.org
Showing the best result for this search. See all results