Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Verified Safety and Information Flow of a Block Device

Published: 01 July 2008 Publication History

Abstract

This work reports on the author's experience designing, implementing, and formally verifying a low-level piece of system software. The timing model and the adaptation of an existing information flow policy to a monadic framework are reasonably novel. Interactive compilation through equational rewriting worked well in practice. Finally, the project uncovered some potential areas for improving interactive theorem provers.

References

[1]
Chen, C.-P. and P. Hudak, Rolling your own MADT - a connection between linear types and monads, in: ACM Symposium on Principles of Programming Languages, 1997, pp. 54--66
[2]
Claessen, K. and J. Hughes, Quickcheck: a lightweight tool for random testing of Haskell programs, in: ACM SIGPLAN International Conference on Functional Programming, New York, NY, USA, 2000, pp. 268--279
[3]
Denning, D.E., A lattice model of secure information flow. Communications of the ACM. v19. 236-243.
[4]
Felleisen, M., “The Calculi of #v-CS Conversion: A Syntactic Theory of Control and State in Imperative HigherOrder Programming Languages,” Ph.D. thesis, Indiana University (1987)
[5]
Fox, A.C.J., Formal specification and verification of ARM6, in: International Conference on Theorem Proving in Higher Order Logics (2003), pp. 25--40
[6]
Goguen, J.A. and J. Meseguer, Security policies and security models, in: IEEE Symposium on Security and Privacy, 1982, pp. 11--20
[7]
Gordon, M.J.C., HOL: A machine oriented formulation of higher order logic, Technical Report 68, University of Cambridge Computer Laboratory (1985)
[8]
Greve, D., M. Wilding and W.M. Vanfleet, A separation kernel formal security policy, in: Fourth International Workshop on the ACL2 Theorem Prover and Its Applications, 2003
[9]
Haftmann, F. and T. Nipkow, A code generator framework for Isabelle/HOL, Technical Report 364/07, Department of Computer Science, University of Kaiserslautern (2007)
[10]
Principles of Program Design. 1975. Academic Press.
[11]
Paulson, L.C., Isabelle: The next 700 theorem provers, Logic and Computer Science (1990), pp. 361--386
[12]
Strachey, C. and C.P. Wadsworth, Continuations: A mathematical semantics for handling full jumps, technical monograph PRG-11, Technical report, Oxford University Computing Laboratory, Programming Research Group (1974)
[13]
von Oheimb, D., Information flow control revisited: Noninfluence = Noninterference + Nonleakage. In: Samarati, P., Ryan, P., Gollmann, D., Molva, R. (Eds.), LNCS, 3193. pp. 225-243.
[14]
Wadler, P., The essence of functional programming, in: ACM Symposium on Principles of Programming Languages, 1992, http://homepages.inf.ed.ac.uk/wadler/topics/monads.html

Cited By

View all
  • (2020)Noninterference specifications for secure systemsACM SIGOPS Operating Systems Review10.1145/3421473.342147854:1(31-39)Online publication date: 31-Aug-2020
  • (2013)Information flow in systems with schedulers, Part IITheoretical Computer Science10.1016/j.tcs.2013.01.002484(70-92)Online publication date: 1-May-2013

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Electronic Notes in Theoretical Computer Science (ENTCS)
Electronic Notes in Theoretical Computer Science (ENTCS)  Volume 217, Issue
July, 2008
228 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 01 July 2008

Author Tags

  1. domain-specific language
  2. higher-order logic
  3. monads
  4. multi-level security

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Noninterference specifications for secure systemsACM SIGOPS Operating Systems Review10.1145/3421473.342147854:1(31-39)Online publication date: 31-Aug-2020
  • (2013)Information flow in systems with schedulers, Part IITheoretical Computer Science10.1016/j.tcs.2013.01.002484(70-92)Online publication date: 1-May-2013

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media