COVERN: A logic for compositional verification of information flow control

T Murray, R Sison, K Engelhardt - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Shared memory concurrency is pervasive in modern programming, including in systems that
must protect highly sensitive data. Recently, verification has finally emerged as a practical …

Verifying security policies in multi-agent workflows with loops

B Finkbeiner, C Müller, H Seidl… - Proceedings of the 2017 …, 2017 - dl.acm.org
We consider the automatic verification of information flow security policies of web-based
workflows, such as conference submission systems like EasyChair. Our workflow description …

Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications

T Murray, M Tiwari, G Ernst, DA Naumann - Proceedings of the 2023 …, 2023 - dl.acm.org
We consider the problem of specifying and proving the security of non-trivial, concurrent
programs that intentionally leak information. We present a method that decomposes the …

A monadic framework for relational verification: applied to information security, program equivalence, and optimizations

N Grimm, K Maillard, C Fournet, C Hriţcu… - Proceedings of the 7th …, 2018 - dl.acm.org
Relational properties describe multiple runs of one or more programs. They characterize
many useful notions of security, program refinement, and equivalence for programs with …

VERONICA: expressive and precise concurrent information flow security

D Schoepe, T Murray… - 2020 IEEE 33rd Computer …, 2020 - ieeexplore.ieee.org
Methods for proving that concurrent software does not leak its secrets has remained an
active topic of research for at least the past four decades. Despite an impressive array of …

BP: Formal proofs, the fine print and side effects

T Murray, P van Oorschot - 2018 IEEE Cybersecurity …, 2018 - ieeexplore.ieee.org
Given recent high-profile successes in formal verification of security-related properties (eg,
for seL4), and the rising popularity of applying formal methods to cryptographic libraries and …

De-centralized information flow control for cloud virtual machines with hybrid AES-ECC and improved meta-heuristic optimization based optimal key generation

YB Gurav, BM Patil - International journal of intelligent robotics and …, 2023 - Springer
Cloud computing is now used by many enterprises due to its increased computational
efficiency, economic effectiveness, as well as flexibility. However, security is currently the …

Certified password quality: a case study using Coq and Linux pluggable authentication modules

JF Ferreira, SA Johnson, A Mendes… - Integrated Formal Methods …, 2017 - Springer
We propose the use of modern proof assistants to specify, implement, and verify password
quality checkers. We use the proof assistant Coq, focusing on Linux PAM, a widely-used …

CoSMed: A confidentiality-verified social media platform

T Bauereiss, A Pesenti Gritti, A Popescu… - Journal of Automated …, 2018 - Springer
This paper describes progress with our agenda of formal verification of information flow
security for realistic systems. We present CoSMed, a social media platform with verified …

Inductive invariants for noninterference in multi-agent workflows

C Müller, H Seidl, E Zălinescu - 2018 IEEE 31st Computer …, 2018 - ieeexplore.ieee.org
Our goal is to certify absence of information leaks in multi-agent workflows, such as
conference management systems like EasyChair. These workflows can be executed by any …