Skip to main content

Showing 1–5 of 5 results for author: Clarkson, M R

Searching in archive cs. Search in all archives.
.
  1. arXiv:1504.03711  [pdf, other

    cs.CR

    Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution

    Authors: Kristopher Micinski, Jonathan Fetter-Degges, **seong Jeon, Jeffrey S. Foster, Michael R. Clarkson

    Abstract: Mobile apps can access a wide variety of secure information, such as contacts and location. However, current mobile platforms include only coarse access control mechanisms to protect such data. In this paper, we introduce interaction-based declassification policies, in which the user's interactions with the app constrain the release of sensitive information. Our policies are defined extensionally,… ▽ More

    Submitted 29 July, 2015; v1 submitted 14 April, 2015; originally announced April 2015.

    Comments: This research was supported in part by NSF grants CNS-1064997 and 1421373, AFOSR grants FA9550-12-1-0334 and FA9550-14-1-0334, a partnership between UMIACS and the Laboratory for Telecommunication Sciences, and the National Security Agency

  2. arXiv:1401.4492  [pdf, ps, other

    cs.LO

    Temporal Logics for Hyperproperties

    Authors: Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe, César Sánchez

    Abstract: Two new logics for verification of hyperproperties are proposed. Hyperproperties characterize security policies, such as noninterference, as a property of sets of computation paths. Standard temporal logics such as LTL, CTL, and CTL* can refer only to a single path at a time, hence cannot express many hyperproperties of interest. The logics proposed here, HyperLTL and HyperCTL*, add explicit and s… ▽ More

    Submitted 20 January, 2014; v1 submitted 17 January, 2014; originally announced January 2014.

  3. arXiv:1306.5678  [pdf, ps, other

    cs.LO cs.CR

    A Temporal Logic of Security

    Authors: Masoud Koleini, Michael R. Clarkson, Kristopher K. Micinski

    Abstract: A new logic for verification of security policies is proposed. The logic, HyperLTL, extends linear-time temporal logic (LTL) with connectives for explicit and simultaneous quantification over multiple execution paths, thereby enabling HyperLTL to express information-flow security policies that LTL cannot. A model-checking algorithm for a fragment of HyperLTL is given, and the algorithm is implemen… ▽ More

    Submitted 9 July, 2013; v1 submitted 24 June, 2013; originally announced June 2013.

  4. arXiv:1302.2123  [pdf, ps, other

    cs.LO cs.CR

    Belief Semantics of Authorization Logic

    Authors: Andrew K. Hirsch, Michael R. Clarkson

    Abstract: Authorization logics have been used in the theory of computer security to reason about access control decisions. In this work, a formal belief semantics for authorization logics is given. The belief semantics is proved to subsume a standard Kripke semantics. The belief semantics yields a direct representation of principals' beliefs, without resorting to the technical machinery used in Kripke seman… ▽ More

    Submitted 3 August, 2013; v1 submitted 8 February, 2013; originally announced February 2013.

  5. arXiv:1211.3700  [pdf, ps, other

    cs.CR cs.LO

    Nexus Authorization Logic (NAL): Logical Results

    Authors: Andrew K. Hirsch, Michael R. Clarkson

    Abstract: Nexus Authorization Logic (NAL) [Schneider et al. 2011] is a logic for reasoning about authorization in distributed systems. A revised version of NAL is given here, including revised syntax, a revised proof theory using localized hypotheses, and a new Kripke semantics. The proof theory is proved sound with respect to the semantics, and that proof is formalized in Coq.

    Submitted 15 November, 2012; v1 submitted 15 November, 2012; originally announced November 2012.