Team for Research in
Ubiquitous Secure Technology

A Logic for Reasoning about Networked Secure Systems
Deepak Garg, Jason Franklin, Dilsun Kaynar, Anupam Datta

Citation
Deepak Garg, Jason Franklin, Dilsun Kaynar, Anupam Datta. "A Logic for Reasoning about Networked Secure Systems". Joint Workshop FCS-ARSPA-WITS, 2008.

Abstract
We initiate a program to model and analyze end-to-end security properties of contemporary secure systems that rely on network protocols and memory protection. Specifically, this paper introduces the Logic of Secure Systems (LS2). LS2 extends an existing logic for security protocols by incorporating shared memory, time and limited forms of access control. The proof system for LS2 supports highlevel reasoning about secure systems in the presence of adversaries on the network and the local machine. We prove a soundness theorem for the proof system and illustrate its use by proving a relevant security property of a protocol inspired by the Transport Layer Protocol of the Secure Shell (SSH).

Electronic downloads

Citation formats  
  • HTML
    Deepak Garg, Jason Franklin, Dilsun Kaynar, Anupam Datta.
    <a href="http://www.truststc.org/pubs/412.html"
    >A Logic for Reasoning about Networked Secure
    Systems</a>, Joint Workshop FCS-ARSPA-WITS, 2008.
  • Plain text
    Deepak Garg, Jason Franklin, Dilsun Kaynar, Anupam Datta.
    "A Logic for Reasoning about Networked Secure
    Systems". Joint Workshop FCS-ARSPA-WITS, 2008.
  • BibTeX
    @inproceedings{GargFranklinKaynarDatta08_LogicForReasoningAboutNetworkedSecureSystems,
        author = {Deepak Garg and Jason Franklin and Dilsun Kaynar
                  and Anupam Datta},
        title = {A Logic for Reasoning about Networked Secure
                  Systems},
        booktitle = {Joint Workshop FCS-ARSPA-WITS},
        year = {2008},
        abstract = {We initiate a program to model and analyze
                  end-to-end security properties of contemporary
                  secure systems that rely on network protocols and
                  memory protection. Specifically, this paper
                  introduces the Logic of Secure Systems (LS2). LS2
                  extends an existing logic for security protocols
                  by incorporating shared memory, time and limited
                  forms of access control. The proof system for LS2
                  supports highlevel reasoning about secure systems
                  in the presence of adversaries on the network and
                  the local machine. We prove a soundness theorem
                  for the proof system and illustrate its use by
                  proving a relevant security property of a protocol
                  inspired by the Transport Layer Protocol of the
                  Secure Shell (SSH).},
        URL = {http://www.truststc.org/pubs/412.html}
    }
    

Posted by Anupam Datta on 25 Jul 2008.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.