var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fraghavendra80.github.io%2Ffiles%2Fconf.bib&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fraghavendra80.github.io%2Ffiles%2Fconf.bib&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fraghavendra80.github.io%2Ffiles%2Fconf.bib&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2024\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Moonshot: Optimizing Block Period and Commit Latency in Chain-Based Rotating Leader BFT.\n \n \n \n \n\n\n \n Doidge, I.; Ramesh, R.; Shrestha, N.; and Tobkin, J.\n\n\n \n\n\n\n In 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pages 470-482, Los Alamitos, CA, USA, jun 2024. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"Moonshot:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS {10646973,\nauthor = {I. Doidge and R. Ramesh and N. Shrestha and J. Tobkin},\nbooktitle = {2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)},\ntitle = {Moonshot: Optimizing Block Period and Commit Latency in Chain-Based Rotating Leader BFT},\nyear = {2024},\nvolume = {},\nissn = {},\npages = {470-482},\nabstract = {Existing chain-based rotating-leader BFT SMR protocols for the partially synchronous network model with constant commit latencies incur block periods of at least $2\\delta$ (where $\\delta$ is the message transmission latency). While a protocol with a block period of $\\delta$ exists under the synchronous model, its commit latency is linear in the size of the system. To close this gap, we present the first chain-based BFT SMR protocols with $\\delta$ delay between the proposals of consecutive honest leaders and commit latencies of $3\\delta$. We present three protocols for the partially synchronous model under different notions of optimistic responsiveness, two of which implement pipelining. All of our protocols achieve reorg resilience and two have short view lengths; properties that many existing chain-based BFT SMR protocols lack. We present an evaluation of our protocols in a wide-area network wherein they demonstrate significant increases in throughput and reductions in latency compared to the state-of-the-art, Jolteon. Our results also demonstrate that techniques commonly employed to reduce communication complexity—such as vote-pipelining and the use of designated vote-aggregators—actually reduce practical performance in many settings.},\nkeywords = {wide area networks;protocols;throughput;delays;blockchains;proposals;low latency communication},\ndoi = {10.1109/DSN58291.2024.00052},\nurl = {https://doi.ieeecomputersociety.org/10.1109/DSN58291.2024.00052},\npublisher = {IEEE Computer Society},\naddress = {Los Alamitos, CA, USA},\nmonth = {jun}\n}\n\n
\n
\n\n\n
\n Existing chain-based rotating-leader BFT SMR protocols for the partially synchronous network model with constant commit latencies incur block periods of at least $2δ$ (where $δ$ is the message transmission latency). While a protocol with a block period of $δ$ exists under the synchronous model, its commit latency is linear in the size of the system. To close this gap, we present the first chain-based BFT SMR protocols with $δ$ delay between the proposals of consecutive honest leaders and commit latencies of $3δ$. We present three protocols for the partially synchronous model under different notions of optimistic responsiveness, two of which implement pipelining. All of our protocols achieve reorg resilience and two have short view lengths; properties that many existing chain-based BFT SMR protocols lack. We present an evaluation of our protocols in a wide-area network wherein they demonstrate significant increases in throughput and reductions in latency compared to the state-of-the-art, Jolteon. Our results also demonstrate that techniques commonly employed to reduce communication complexity—such as vote-pipelining and the use of designated vote-aggregators—actually reduce practical performance in many settings.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Formally Verifying the Safety of Pipelined Moonshot Consensus Protocol.\n \n \n \n \n\n\n \n Praveen, M.; Ramesh, R.; and Doidge, I.\n\n\n \n\n\n\n In Bernardo, B.; and Marmsoler, D., editor(s), 5th International Workshop on Formal Methods for Blockchains (FMBC 2024), volume 118, of Open Access Series in Informatics (OASIcs), pages 3:1–3:16, Dagstuhl, Germany, 2024. Schloss Dagstuhl – Leibniz-Zentrum für Informatik\n \n\n\n\n
\n\n\n\n \n \n \"FormallyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{praveen_et_al:OASIcs.FMBC.2024.3,\n  author =\t{Praveen, M. and Ramesh, Raghavendra and Doidge, Isaac},\n  title =\t{{Formally Verifying the Safety of Pipelined Moonshot Consensus Protocol}},\n  booktitle =\t{5th International Workshop on Formal Methods for Blockchains (FMBC 2024)},\n  pages =\t{3:1--3:16},\n  series =\t{Open Access Series in Informatics (OASIcs)},\n  ISBN =\t{978-3-95977-317-1},\n  ISSN =\t{2190-6807},\n  year =\t{2024},\n  volume =\t{118},\n  editor =\t{Bernardo, Bruno and Marmsoler, Diego},\n  publisher =\t{Schloss Dagstuhl -- Leibniz-Zentrum f{\\"u}r Informatik},\n  address =\t{Dagstuhl, Germany},\n  URL =\t\t{https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.FMBC.2024.3},\n  URN =\t\t{urn:nbn:de:0030-drops-198688},\n  doi =\t\t{10.4230/OASIcs.FMBC.2024.3},\n  annote =\t{Keywords: Blockchain consensus, Safety, Formal verification}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Atomic Crosschain Transactions for Ethereum Private Sidechains.\n \n \n \n \n\n\n \n Robinson, P.; Ramesh, R.; and Johnson, S.\n\n\n \n\n\n\n Blockchain: Research and Applications, 3(1): 100030. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"AtomicPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{ROBINSON2022100030,\ntitle = {Atomic Crosschain Transactions for Ethereum Private Sidechains},\njournal = {Blockchain: Research and Applications},\nvolume = {3},\nnumber = {1},\npages = {100030},\nyear = {2022},\nissn = {2096-7209},\ndoi = {https://doi.org/10.1016/j.bcra.2021.100030},\nurl = {https://www.sciencedirect.com/science/article/pii/S2096720921000257},\nauthor = {Peter Robinson and Raghavendra Ramesh and Sandra Johnson},\nkeywords = {Crosschain, Blockchain, Transaction, Atomic, Ethereum},\nabstract = {The Atomic Crosschain Transaction for Ethereum Private Sidechains protocol allows composable programming across permissioned Ethereum blockchains. It allows for inter-contract and inter-blockchain function calls that are both synchronous and atomic: if one part fails, the whole call tree of function calls is discarded. The protocol is not based on existing techniques such as Hash Time Locked Contracts, relay chains, block header transfer, or trusted intermediaries. It uses (a) threshold signatures to prove values across blockchains, (b) coordination contracts to manage the state of crosschain transactions, and (c) a function call tree commitment scheme to allow users to commit to a call tree and then later check that the correct function calls have been executed. This paper analyses the processing overhead of using this technique compared to using multiple standard non-atomic single blockchain transactions. The additional processing is analysed for four scenarios involving multiple blockchains: a Trade–Finance system, the Hotel–Train problem, a Supply Chain with Provenance, and an Oracle. The protocol is shown to have both safety and liveness properties.}\n}\n\n
\n
\n\n\n
\n The Atomic Crosschain Transaction for Ethereum Private Sidechains protocol allows composable programming across permissioned Ethereum blockchains. It allows for inter-contract and inter-blockchain function calls that are both synchronous and atomic: if one part fails, the whole call tree of function calls is discarded. The protocol is not based on existing techniques such as Hash Time Locked Contracts, relay chains, block header transfer, or trusted intermediaries. It uses (a) threshold signatures to prove values across blockchains, (b) coordination contracts to manage the state of crosschain transactions, and (c) a function call tree commitment scheme to allow users to commit to a call tree and then later check that the correct function calls have been executed. This paper analyses the processing overhead of using this technique compared to using multiple standard non-atomic single blockchain transactions. The additional processing is analysed for four scenarios involving multiple blockchains: a Trade–Finance system, the Hotel–Train problem, a Supply Chain with Provenance, and an Oracle. The protocol is shown to have both safety and liveness properties.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n General Purpose Atomic Crosschain Transactions.\n \n \n \n \n\n\n \n Robinson, P.; and Ramesh, R.\n\n\n \n\n\n\n In 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pages 1-3, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"GeneralPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{9461132,\n  author={Robinson, Peter and Ramesh, Raghavendra},\n  booktitle={2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)}, \n  title={General Purpose Atomic Crosschain Transactions}, \n  year={2021},\n  volume={},\n  number={},\n  pages={1-3},\n  url={},\n  keywords={Protocols;Conferences;Blockchain;Writing;Programming;Cryptocurrency;blockchain;ethereum;cross;transaction;atomic},\n  doi={10.1109/ICBC51069.2021.9461132}}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n An efficient tunable selective points-to analysis for large codebases.\n \n \n \n \n\n\n \n Hassanshahi, B.; Ramesh, R. K.; Krishnan, P.; Scholz, B.; and Lu, Y.\n\n\n \n\n\n\n In Proceedings of the 6th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, of SOAP 2017, pages 13–18, New York, NY, USA, 2017. Association for Computing Machinery\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{10.1145/3088515.3088519,\nauthor = {Hassanshahi, Behnaz and Ramesh, Raghavendra Kagalavadi and Krishnan, Padmanabhan and Scholz, Bernhard and Lu, Yi},\ntitle = {An efficient tunable selective points-to analysis for large codebases},\nyear = {2017},\nisbn = {9781450350723},\npublisher = {Association for Computing Machinery},\naddress = {New York, NY, USA},\nurl = {https://doi.org/10.1145/3088515.3088519},\ndoi = {10.1145/3088515.3088519},\nabstract = {Points-to analysis is a fundamental static program analysis technique for tools including compilers and bug-checkers. Although object-based context sensitivity is known to improve precision of points-to analysis, scaling it for large Java codebases remains a challenge.  In this work, we develop a tunable, client-independent, object-sensitive points-to analysis framework where heap cloning is applied selectively. This approach is aimed at large codebases where standard analysis is typically expensive. Our design includes a pre-analysis that determines program points that contribute to the cost of an object-sensitive points-to analysis. A subsequent analysis then determines the context depth for each allocation site. While our framework can run standalone, it is also possible to tune it – the user of the framework can use the knowledge of the codebase being analysed to influence the selection of expensive program points as well as the process to differentiate the required context-depth. Overall, the approach determines where the cloning is beneficial and where the cloning is unlikely to be beneficial.  We have implemented our approach using Souffl\\'{e} (a Datalog compiler) and an extension of the DOOP framework. Our experiments on large programs, including OpenJDK, show that our technique is efficient and precise. For the OpenJDK, our analysis reduces 27\\% of runtime and 18\\% of memory usage in comparison with 2O1H points-to analysis for a negligible loss of precision, while for Jython from the DaCapo benchmark suite, the same analysis reduces 91\\% of runtime for no loss of precision.},\nbooktitle = {Proceedings of the 6th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis},\npages = {13–18},\nnumpages = {6},\nkeywords = {points-to analysis, selective context-sensitivity},\nlocation = {Barcelona, Spain},\nseries = {SOAP 2017}\n}\n\n
\n
\n\n\n
\n Points-to analysis is a fundamental static program analysis technique for tools including compilers and bug-checkers. Although object-based context sensitivity is known to improve precision of points-to analysis, scaling it for large Java codebases remains a challenge. In this work, we develop a tunable, client-independent, object-sensitive points-to analysis framework where heap cloning is applied selectively. This approach is aimed at large codebases where standard analysis is typically expensive. Our design includes a pre-analysis that determines program points that contribute to the cost of an object-sensitive points-to analysis. A subsequent analysis then determines the context depth for each allocation site. While our framework can run standalone, it is also possible to tune it – the user of the framework can use the knowledge of the codebase being analysed to influence the selection of expensive program points as well as the process to differentiate the required context-depth. Overall, the approach determines where the cloning is beneficial and where the cloning is unlikely to be beneficial. We have implemented our approach using Soufflé (a Datalog compiler) and an extension of the DOOP framework. Our experiments on large programs, including OpenJDK, show that our technique is efficient and precise. For the OpenJDK, our analysis reduces 27% of runtime and 18% of memory usage in comparison with 2O1H points-to analysis for a negligible loss of precision, while for Jython from the DaCapo benchmark suite, the same analysis reduces 91% of runtime for no loss of precision.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Detecting Unauthorized Information Flows using Points-to Analysis.\n \n \n \n \n\n\n \n Krishnan, P.; Lu, Y.; and Raghavendra, K. R.\n\n\n \n\n\n\n Engineering & Technology Reference. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"DetectingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{krishnan2016detecting,\n  title={Detecting Unauthorized Information Flows using Points-to Analysis},\n  author={Padmanabhan Krishnan and Yi Lu and Kagalavadi Ramesh Raghavendra},\n  journal={Engineering \\& Technology Reference},\n  year={2016},\n  publisher={IET Digital Library},\n  doi={10.1049/etr.2015.0141},\n  url={https://digital-library.theiet.org/content/reference/10.1049/etr.2015.0141}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Primal Infon Logic: Derivability in Polynomial Time.\n \n \n \n \n\n\n \n Baskar, A.; Naldurg, P.; Raghavendra, K. R.; and Suresh, S. P.\n\n\n \n\n\n\n In Seth, A.; and Vishnoi, N. K., editor(s), IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2013), volume 24, of Leibniz International Proceedings in Informatics (LIPIcs), pages 163–174, Dagstuhl, Germany, 2013. Schloss Dagstuhl – Leibniz-Zentrum für Informatik\n \n\n\n\n
\n\n\n\n \n \n \"PrimalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{baskar_et_al:LIPIcs.FSTTCS.2013.163,\n  author =\t{Baskar, Anguraj and Naldurg, Prasad and Raghavendra, K. R. and Suresh, S. P.},\n  title =\t{{Primal Infon Logic: Derivability in Polynomial Time}},\n  booktitle =\t{IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2013)},\n  pages =\t{163--174},\n  series =\t{Leibniz International Proceedings in Informatics (LIPIcs)},\n  ISBN =\t{978-3-939897-64-4},\n  ISSN =\t{1868-8969},\n  year =\t{2013},\n  volume =\t{24},\n  editor =\t{Seth, Anil and Vishnoi, Nisheeth K.},\n  publisher =\t{Schloss Dagstuhl -- Leibniz-Zentrum f{\\"u}r Informatik},\n  address =\t{Dagstuhl, Germany},\n  URL =\t\t{https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.FSTTCS.2013.163},\n  URN =\t\t{urn:nbn:de:0030-drops-43708},\n  doi =\t\t{10.4230/LIPIcs.FSTTCS.2013.163},\n  annote =\t{Keywords: Authorization logics, Intuitionistic modal logic, Proof theory, Cut elimination, Subformula property}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Model-Checking Bisimulation-Based Information Flow Properties for Infinite State Systems.\n \n \n \n\n\n \n D'Souza, D.; and Raghavendra, K. R.\n\n\n \n\n\n\n In Foresti, S.; Yung, M.; and Martinelli, F., editor(s), Computer Security – ESORICS 2012, pages 591–608, Berlin, Heidelberg, 2012. Springer Berlin Heidelberg\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{10.1007/978-3-642-33167-1_34,\nauthor="D'Souza, Deepak and Raghavendra, K. R.",\neditor="Foresti, Sara and Yung, Moti and Martinelli, Fabio",\ntitle="Model-Checking Bisimulation-Based Information Flow Properties for Infinite State Systems",\nbooktitle="Computer Security -- ESORICS 2012",\nyear="2012",\npublisher="Springer Berlin Heidelberg",\naddress="Berlin, Heidelberg",\npages="591--608",\nabstract="Bisimulation-based information flow properties were introduced by Focardi and Gorrieri [1] as a way of specifying security properties for transition system models. These properties were shown to be decidable for finite-state systems. In this paper, we study the problem of verifying these properties for some well-known classes of infinite state systems. We show that all the properties are undecidable for each of these classes of systems.",\nisbn="978-3-642-33167-1"\n}\n\n
\n
\n\n\n
\n Bisimulation-based information flow properties were introduced by Focardi and Gorrieri [1] as a way of specifying security properties for transition system models. These properties were shown to be decidable for finite-state systems. In this paper, we study the problem of verifying these properties for some well-known classes of infinite state systems. We show that all the properties are undecidable for each of these classes of systems.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Model-Checking Trace-Based Information Flow Properties for Infinite-State Systems.\n \n \n \n \n\n\n \n D'Souza, D.; and Raghavendra, K. R.\n\n\n \n\n\n\n Journal of Computer Security, 19(1): 101–138. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"Model-CheckingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{dsouza2011model,\n  title={Model-Checking Trace-Based Information Flow Properties for Infinite-State Systems},\n  author={Deepak D'Souza and Kagalavadi Ramesh Raghavendra},\n  journal={Journal of Computer Security},\n  volume={19},\n  number={1},\n  pages={101--138},\n  year={2011},\n  publisher={IOS Press},\n  doi={10.3233/JCS-2010-0549},\n  url={https://content.iospress.com/articles/journal-of-computer-security/jcs549}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SEAL: a logic programming framework for specifying and verifying access control models.\n \n \n \n \n\n\n \n Naldurg, P.; and K.R., R.\n\n\n \n\n\n\n In Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, of SACMAT '11, pages 83–92, New York, NY, USA, 2011. Association for Computing Machinery\n \n\n\n\n
\n\n\n\n \n \n \"SEAL:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{10.1145/1998441.1998454,\nauthor = {Naldurg, Prasad and K.R., Raghavendra},\ntitle = {SEAL: a logic programming framework for specifying and verifying access control models},\nyear = {2011},\nisbn = {9781450306881},\npublisher = {Association for Computing Machinery},\naddress = {New York, NY, USA},\nurl = {https://doi.org/10.1145/1998441.1998454},\ndoi = {10.1145/1998441.1998454},\nabstract = {We present SEAL, a language for specification and analysis of safety properties for label-based access control systems. A SEAL program represents a possibly infinite-state non-deterministic transition system describing the dynamic behavior of entities and their relevant access control operations. The features of our language are derived directly from the need to model new access control features arising from state-of-the art models in Windows 7, Asbestos, HiStar and others. We show that the reachability problem for this class of models is undecidable even for simple SEAL programs, but a bounded model-checking algorithm is able to validate interesting properties and discover relevant attacks.},\nbooktitle = {Proceedings of the 16th ACM Symposium on Access Control Models and Technologies},\npages = {83–92},\nnumpages = {10},\nkeywords = {logic programs, label-based access, bounded model checking, attacks, access control, Windows 7},\nlocation = {Innsbruck, Austria},\nseries = {SACMAT '11}\n}\n\n
\n
\n\n\n
\n We present SEAL, a language for specification and analysis of safety properties for label-based access control systems. A SEAL program represents a possibly infinite-state non-deterministic transition system describing the dynamic behavior of entities and their relevant access control operations. The features of our language are derived directly from the need to model new access control features arising from state-of-the art models in Windows 7, Asbestos, HiStar and others. We show that the reachability problem for this class of models is undecidable even for simple SEAL programs, but a bounded model-checking algorithm is able to validate interesting properties and discover relevant attacks.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Model-Checking Trace-Based Information Flow Properties.\n \n \n \n \n\n\n \n D'Souza, D.; Holla, R.; Raghavendra, K. R.; and Sprick, B.\n\n\n \n\n\n\n Journal of Computer Security, 19(1): 101–138. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"Model-CheckingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{dsouza2011model,\n  title={Model-Checking Trace-Based Information Flow Properties},\n  author={Deepak D'Souza and Raveendra Holla and Kagalavadi Ramesh Raghavendra and Barbara Sprick},\n  journal={Journal of Computer Security},\n  volume={19},\n  number={1},\n  pages={101--138},\n  year={2011},\n  publisher={IOS Press},\n  doi={10.3233/JCS-2010-0400},\n  url={https://content.iospress.com/articles/journal-of-computer-security/jcs400}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2008\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n On the Decidability of Model-Checking Information Flow Properties.\n \n \n \n\n\n \n D'Souza, D.; Holla, R.; Kulkarni, J.; Ramesh, R. K.; and Sprick, B.\n\n\n \n\n\n\n In Sekar, R.; and Pujari, A. K., editor(s), Information Systems Security, pages 26–40, Berlin, Heidelberg, 2008. Springer Berlin Heidelberg\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{10.1007/978-3-540-89862-7_2,\nauthor="D'Souza, Deepak\nand Holla, Raveendra\nand Kulkarni, Janardhan\nand Ramesh, Raghavendra K.\nand Sprick, Barbara",\neditor="Sekar, R.\nand Pujari, Arun K.",\ntitle="On the Decidability of Model-Checking Information Flow Properties",\nbooktitle="Information Systems Security",\nyear="2008",\npublisher="Springer Berlin Heidelberg",\naddress="Berlin, Heidelberg",\npages="26--40",\nabstract="Current standard security practices do not provide substantial assurance about information flow security: the end-to-end behavior of a computing system. Noninterference is the basic semantical condition used to account for information flow security. In the literature, there are many definitions of noninterference: Non-inference, Separability and so on. Mantel presented a framework of Basic Security Predicates (BSPs) for characterizing the definitions of noninterference in the literature. Model-checking these BSPs for finite state systems was shown to be decidable in [8]. In this paper, we show that verifying these BSPs for the more expressive system model of pushdown systems is undecidable. We also give an example of a simple security property which is undecidable even for finite-state systems: the property is a weak form of non-inference called WNI, which is not expressible in Mantel's BSP framework.",\nisbn="978-3-540-89862-7"\n}\n\n
\n
\n\n\n
\n Current standard security practices do not provide substantial assurance about information flow security: the end-to-end behavior of a computing system. Noninterference is the basic semantical condition used to account for information flow security. In the literature, there are many definitions of noninterference: Non-inference, Separability and so on. Mantel presented a framework of Basic Security Predicates (BSPs) for characterizing the definitions of noninterference in the literature. Model-checking these BSPs for finite state systems was shown to be decidable in [8]. In this paper, we show that verifying these BSPs for the more expressive system model of pushdown systems is undecidable. We also give an example of a simple security property which is undecidable even for finite-state systems: the property is a weak form of non-inference called WNI, which is not expressible in Mantel's BSP framework.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2005\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n An Automata Based Approach for Verifying Information Flow Properties.\n \n \n \n \n\n\n \n D'Souza, D.; Raghavendra, K.; and Sprick, B.\n\n\n \n\n\n\n Electronic Notes in Theoretical Computer Science, 135(1): 39-58. 2005.\n Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA 2005)\n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{DSOUZA200539,\ntitle = {An Automata Based Approach for Verifying Information Flow Properties},\njournal = {Electronic Notes in Theoretical Computer Science},\nvolume = {135},\nnumber = {1},\npages = {39-58},\nyear = {2005},\nnote = {Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA 2005)},\nissn = {1571-0661},\ndoi = {https://doi.org/10.1016/j.entcs.2005.06.005},\nurl = {https://www.sciencedirect.com/science/article/pii/S1571066105050516},\nauthor = {Deepak D'Souza and K.R. Raghavendra and Barbara Sprick},\nkeywords = {information flow control, verification, finite state systems},\nabstract = {We present an automated verification technique to verify trace based information flow properties for finite state systems. We show that the Basic Security Predicates (BSPs) defined by Mantel in [Mantel, H., Possibilistic Definitions of Security – An Assembly Kit, in: Proceedings of the 13th IEEE Computer Security Foundations Workshop (2000), pp. 185–199], which are shown to be the building blocks of known trace based information flow properties, can be characterised in terms of regularity preserving language theoretic operations. This leads to a decision procedure for checking whether a finite state system satisfies a given BSP. Verification techniques in the literature (e.g. unwinding) are based on the structure of the transition system and are incomplete in some cases. In contrast, our technique is language based and complete for all information flow properties that can be expressed in terms of BSPs.}\n}\n\n\n\n
\n
\n\n\n
\n We present an automated verification technique to verify trace based information flow properties for finite state systems. We show that the Basic Security Predicates (BSPs) defined by Mantel in [Mantel, H., Possibilistic Definitions of Security – An Assembly Kit, in: Proceedings of the 13th IEEE Computer Security Foundations Workshop (2000), pp. 185–199], which are shown to be the building blocks of known trace based information flow properties, can be characterised in terms of regularity preserving language theoretic operations. This leads to a decision procedure for checking whether a finite state system satisfies a given BSP. Verification techniques in the literature (e.g. unwinding) are based on the structure of the transition system and are incomplete in some cases. In contrast, our technique is language based and complete for all information flow properties that can be expressed in terms of BSPs.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);