19
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Monadic Framework for Relational Verification (Functional Pearl)

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Relational properties relate multiple runs of one or more programs. They characterize many useful notions of security, program refinement, and equivalence for programs with diverse computational effects, and have received much attention in the recent literature. Rather than designing and developing tools for special classes of relational properties, as typically proposed in the literature, we advocate the relational verification of effectful programs within general purpose proof assistants. The essence of our approach is to model effectful computations using monads and prove relational properties on their monadic representations, making the most of existing support for reasoning about pure programs. We apply our method in F* and evaluate it by encoding a variety of relational program analyses, including static information flow control, semantic declassification, provenance tracking, program equivalence at higher order, game-based cryptographic security, and various combinations thereof. By relying on SMT-based automation, unary weakest preconditions, user-defined effects, and monadic reification, we show that the task of verifying relational properties requires little additional effort from the F* programmer.

          Related collections

          Most cited references41

          • Record: found
          • Abstract: not found
          • Article: not found

          Language-based information-flow security

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Security Policies and Security Models

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A sound type system for secure flow analysis

                Bookmark

                Author and article information

                Journal
                2017-02-28
                Article
                1703.00055
                692cae11-2f63-4f5f-9dc6-1d5ce13e869c

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                ICFP submission
                cs.PL

                Programming languages
                Programming languages

                Comments

                Comment on this article