Security

Verification of Information Flow and Access Control Policies With Dependent Types

Free registration required

Executive Summary

The authors present Relational Hoare Type Theory (RHTT), a novel language and verification system capable of expressing and verifying rich information flow and access control policies via dependent types. They show that a number of security policies which have been formalized separately in the literature can all be expressed in RHTT using only standard type-theoretic constructions such as monads, higher-order functions, abstract types, abstract predicates, and modules. Example security policies include conditional declassification, information erasure, and state-dependent information flow and access control. RHTT can reason about such policies in the presence of dynamic memory allocation, de-allocation, pointer aliasing and arithmetic.

  • Format: PDF
  • Size: 347.6 KB