[talks] Weikun Yang will present his general exam on Wednesday, May 24, 2017 at 10am in CS 402.

Nicki Gotsis ngotsis at CS.Princeton.EDU
Wed May 17 09:06:00 EDT 2017

Weikun Yang will present his general exam on Wednesday, May 24, 2017 at 10am in CS 402. 

The members of his committee are: Aarti Gupta (adviser), Andrew Appel, and Zak Kincaid. 

Everyone is invited to attend his talk and those faculty wishing to remain for the oral exam following are welcome to do so. His abstract and reading list follow below. 

Lazy Self-Composition for Security Verification 

Verification of secure information flow plays an important role in protection of security and privacy in software applications. It can be reduced to safety verification, as shown by Barthe et al., where a “self-composition” of the program is created by duplicating the program on which a safety property is verified. Due to practical challenges of software verification on duplicated copies, Terauchi and Aiken proposed to use type-directed transformation during self-composition. However it relies on static type analysis which can be imprecise. To further reduce the cost of verification, we use an approach based on bounded model checking to encode symbolic and precise propagation of taint, enabling lazy self-composition that duplicates only the tainted parts of the program. Furthermore, we perform additional checks during bounded model checking to enable early termination of security verification, without needing to compute program invariants. We have implemented a prototype information flow checker in the SeaHorn verification platform, which uses Horn-clause based program representations and the Z3 SMT solver in the backend. We present experiments showing effectiveness of our approach on several examples. 

Research papers: 

    1. Gilles Barthe, Pedro R. D'Argenio, and Tamara Rezk. 2004. Secure Information Flow by Self-Composition . CSFW ’04. 
    2. Tachio Terauchi and Alex Aiken. 2005. Secure information flow as a safety problem. SAS’05. 
    3. Pramod Subramanyan, Sharad Malik, Hareesh Khattri, Abhranil Maiti, and Jason Fung. 2016. Verifying information flow properties of firmware using symbolic execution . DATE ’16. 
    4. Gilles Barthe, Juan Manuel Crespo, César Kunz. 2011. Relational Verification Using Product Programs. FM’11. 
    5. Marcelo Sousa and Isil Dillig. 2016. Cartesian hoare logic for verifying k-safety properties. PLDI ’16. 
    6. José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Michael Emmi. 2016. Verifying constant-time implementations . USENIX’16. 
    7. Nikolaj Bjørner, Arie Gurfinkel, Ken McMillan, and Andrey Rybalchenko. 2015. Horn Clause Solvers for Program Verification. In Fields of Logic and Computation II. Lecture Notes in Computer Science, vol 9300. 
    8. Edward J. Schwartz, Thanassis Avgerinos, and David Brumley. 2010. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) . SP ’10. 
    9. A. Sabelfeld and A. C. Myers. 2003. Language-based information-flow security. IEEE J.Sel. A. Commun. 21, 1. 

and books: 

    1. Benjamin C. Pierce. 2002. Types and Programming Languages. 
    2. Aaron R. Bradley and Zohar Manna. 2007. The Calculus of Computation: Decision Procedures with Applications to Verification. 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cs.princeton.edu/pipermail/talks/attachments/20170517/0daa8224/attachment.html>

More information about the talks mailing list