Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

Refinement types for secure implementations

J Bengtson, K Bhargavan, C Fournet… - ACM Transactions on …, 2011 - dl.acm.org
We present the design and implementation of a typechecker for verifying security properties
of the source code of cryptographic protocols and access control mechanisms. The …

Towards a theory of accountability and audit

R Jagadeesan, A Jeffrey, C Pitcher, J Riely - … Security–ESORICS 2009 …, 2009 - Springer
Accountability mechanisms, which rely on after-the-fact verification, are an attractive means
to enforce authorization policies. In this paper, we describe an operational model of …

Aura: A programming language for authorization and audit

L Jia, JA Vaughan, K Mazurak, J Zhao, L Zarko… - ACM Sigplan …, 2008 - dl.acm.org
This paper presents AURA, a programming language for access control that treats ordinary
programming constructs (eg, integers and recursive functions) and authorization logic …

A type discipline for authorization in distributed systems

C Fournet, A Gordon, S Maffeis - 20th IEEE Computer Security …, 2007 - ieeexplore.ieee.org
We consider the problem of statically verifying the conformance of the code of a system to an
explicit authorization policy. In a distributed setting, some part of the system may be …

Evidence-based audit

JA Vaughan, L Jia, K Mazurak… - 2008 21st IEEE …, 2008 - ieeexplore.ieee.org
Authorization logics provide a principled and flexible approach to specifying access control
policies. One of their compelling benefits is that a proof in the logic is evidence that an …

A logic of reachable patterns in linked data-structures

G Yorsh, A Rabinovich, M Sagiv, A Meyer… - The Journal of Logic and …, 2007 - Elsevier
We define a new decidable logic for expressing and checking invariants of programs that
manipulate dynamically-allocated objects via pointers and destructive pointer updates. The …

Type-checking zero-knowledge

M Backes, C Hritcu, M Maffei - Proceedings of the 15th ACM conference …, 2008 - dl.acm.org
This paper presents the first type system for statically analyzing security protocols that are
based on zero-knowledge proofs. We show how certain properties offered by zero …

Robustly safe compilation

M Patrignani, D Garg - … and Systems: 28th European Symposium on …, 2019 - Springer
Secure compilers generate compiled code that withstands many target-level attacks such as
alteration of control flow, data leaks or memory corruption. Many existing secure compilers …

A type discipline for authorization policies

C Fournet, AD Gordon, S Maffeis - ACM Transactions on Programming …, 2007 - dl.acm.org
Distributed systems and applications are often expected to enforce high-level authorization
policies. To this end, the code for these systems relies on lower-level security mechanisms …