Skip to main content

Static Analysis for Secrecy and Non-interference in Networks of Processes

  • Conference paper
  • First Online:
Parallel Computing Technologies (PaCT 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2127))

Included in the following conference series:

Abstract

We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of the spi-calculus by taking time into account. This involves defining an operational semantics, defining a control flow analysis (CFA) in the form of a flow logic, and proving semantic correctness. Our first result is that secrecy in the sense of Dolev-Yao can be expressed in terms of the CFA. Our second result is that also non-interference in the sense of Abadi can be expressed in terms of the CFA; unlike Abadi we find the non-interference property to be an extension of the Dolev-Yao property.

The first two authors have been partially supported by the Progetti MURST TOSCA and AI, TS & CFA.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abadi. Secrecy by Typing In Security protocols. Journal of the ACM, 5(46):18–36, September 1999.

    Google Scholar 

  2. M. Abadi. Security protocols and specifications. In FoSSaCS’99, LNCS 1578, pages 1–13. Springer, 1999.

    Google Scholar 

  3. M. Abadi, C. Fournet. Mobile Values, New names, and Secure Communication. In POPL’01, ACM, 2001.

    Google Scholar 

  4. M. Abadi, B. Blanchet. Secrecy Types for Asymmetric Communication. In FoS-SaCS’01, LNCS 2030, pages 25–41. Springer, 2001.

    Google Scholar 

  5. M. Abadi and A. D. Gordon. A calculus for cryptographic protocols-The Spi calculus. Information and Computation 148,1:1–70, January 1999.

    Google Scholar 

  6. C. Bodei. Security Issues in Process Calculi. PhD thesis, Dipartimento di Infor-matica, Università di Pisa. TD-2/00, March, 2000.

    Google Scholar 

  7. C. Bodei, P. Degano, F. Nielson, and H. Riis Nielson. Static analysis for the π-calculus with their application to security. To appear in I&C Available at http://www.di.unipi.it/~chiara/publ-40/BDNNi00.ps.

  8. C. Bodei, P. Degano, F. Nielson, and H. Riis Nielson. Control flow analysis for the π-calculus. In CONCUR’98, LNCS 1466, pages 84–98. Springer, 1998.

    Google Scholar 

  9. D. Bolignano. An approach to the formal verification of cryptographic protocols. In 3rd ACM Conf. on Computer and Communications Security, pages 106–118. ACM Press, 1996.

    Google Scholar 

  10. M. Boreale and R. De Nicola. Testing equivalence for mobile processes. Information and Computation, 120(2):279–303, August 1995.

    Google Scholar 

  11. L. Cardelli and A.D. Gordon. Types for mobile ambients. In POPL’99, pages 79–92. ACM Press, 1999.

    Google Scholar 

  12. R. De Nicola, G. Ferrari, and R. Pugliese, B. Venneri. Types for access control. Theoretical Computer Science 240(1): 215–254, June 2000.

    Google Scholar 

  13. R. De Nicola and M.C.B. Hennessy. Testing equivalence for processes. Theoretical Computer Science, 34:83–133, 1984.

    Article  MATH  MathSciNet  Google Scholar 

  14. D. E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, pages 236–243, May 1976.

    Google Scholar 

  15. D. E. Denning and P. J. Denning. Certification of Programs for Secure Information Flow. Communications of the ACM, pages 504–513, July 1977.

    Google Scholar 

  16. D. Dolev and A.C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(12):198–208, March 1983.

    Google Scholar 

  17. J.A. Goguen and J. Meseguer. Security policy and security models. In 1982 IEEE Symposium on Research on Security and Privacy, pages 11–20. IEEE Press, 1982.

    Google Scholar 

  18. R. R. Hansen, J. G. Jensen, F. Nielson, and H. R. Nielson. Abstract interpretation of mobile ambients. In SAS’99, LNCS 1694, pages 135–148, 1999.

    Google Scholar 

  19. N. Heintze and J.G Riecke. The SLam calculus: Programming with secrecy and integrity. In POPL’98, pages 365–377. ACM Press, 1998.

    Google Scholar 

  20. J. Jürjens. Bridging the Gap: Formal vs. Complexity-theoretical Reasoning about Cryptography. Security through Analysis and Verification, Dagstuhl Dec. 2000.

    Google Scholar 

  21. F. Nielson and H. R. Nielson. Flow logics and operational semantics. Electronic Notes of Theoretical Computer Science, 10, 1998.

    Google Scholar 

  22. F. Nielson, H. R. Nielson, R. R. Hansen, and J. G. Jensen. Validating firewalls in mobile ambients. In CONCUR’99, LNCS 1664, pages 463–477, 1999.

    Google Scholar 

  23. F. Nielson, H. Seidl. Control-Flow Analysis in Cubic Time. In ESOP’01, LNCS 2028, pages 252–268, 2001.

    Google Scholar 

  24. H. Riis Nielson and F. Nielson. Semantics with Applications: A Formal Introduction. Wiley Professional Computing. Wiley, 1992.

    Google Scholar 

  25. H. Riis Nielson, F. Nielson, H. Seidl. Cryptographic Analysis in Cubic Time. Manuscript, 2001.

    Google Scholar 

  26. L.C. Paulson. Proving properties of security protocols by induction. In CSFW’97, pages 70–83. IEEE, 1997.

    Google Scholar 

  27. J. Riely and M. Hennessy. A typed language for distributed mobile processes. In POPL’98, pages 378–390. ACM Press, 1998.

    Google Scholar 

  28. J. Riely and M. Hennessy. Trust and partial typing in open systems of mobile agents. In POPL’99, pages 93–104. ACM Press, 1999.

    Google Scholar 

  29. D. Volpano and G. Smith. Language Issues in Mobile Program Security. In Mobile Agent Security, LNCS 1419, pages 25–43. Springer, 1998.

    Chapter  Google Scholar 

  30. D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. In CSFW’98, pages 34–43. IEEE, 1998.

    Google Scholar 

  31. D. Volpano and G. Smith. Secure information flow in a multi-threaded imperative language. In POPL’98, pages 355–364. ACM Press, 1998.

    Google Scholar 

  32. D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4:4–21, 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bodei, C., Degano, P., Nielson, F., Nielson, H.R. (2001). Static Analysis for Secrecy and Non-interference in Networks of Processes. In: Malyshkin, V. (eds) Parallel Computing Technologies. PaCT 2001. Lecture Notes in Computer Science, vol 2127. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44743-1_3

Download citation

  • DOI: https://doi.org/10.1007/3-540-44743-1_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42522-9

  • Online ISBN: 978-3-540-44743-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics