Carnegie Mellon University
Browse
file.pdf (421.93 kB)

Compositional System Security in the Presence of Interface-Confined Adversaries (CMU-CyLab-10-004)

Download (421.93 kB)
journal contribution
posted on 2010-02-19, 00:00 authored by Deepak Garg, Jason Franklin, Dilsun Kaynar, Anupam DattaAnupam Datta
This paper presents a formal framework for compositional reasoning about secure systems. A key insight is to view a trusted system in terms of the interfaces that the various components expose: larger trusted components are built by combining interface calls in known ways; the adversary is confined to the interfaces it has access to, but may combine interface calls without restriction. Compositional reasoning for such systems is based on an extension of rely-guarantee reasoning for system correctness [1, 2] to a setting that involves an adversary whose exact program is not known. At a technical level, the paper presents an expressive concurrent programming language with recursive functions for modeling interfaces and a logic of programs in which compositional reasoning principles are formalized and proved sound with respect to trace semantics. The methods are applied to representative examples of web-based systems and network protocols.

History

Date

2010-02-19

Usage metrics

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC