Dependent Type Theory for Verification of Information Flow and Access Control Policies

  • Authors:
  • Aleksandar Nanevski;Anindya Banerjee;Deepak Garg

  • Affiliations:
  • IMDEA Software Institute;IMDEA Software Institute;Max Planck Institute for Software Systems

  • Venue:
  • ACM Transactions on Programming Languages and Systems (TOPLAS)
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Dedicated to the memory of John C. Reynolds (1935--2013). We present Relational Hoare Type Theory (RHTT), a novel language and verification system capable of expressing and verifying rich information flow and access control policies via dependent types. We show that a number of security policies which have been formalized separately in the literature can all be expressed in RHTT using only standard type-theoretic constructions such as monads, higher-order functions, abstract types, abstract predicates, and modules. Example security policies include conditional declassification, information erasure, and state-dependent information flow and access control. RHTT can reason about such policies in the presence of dynamic memory allocation, deallocation, pointer aliasing and arithmetic.