Software Model Checking for Confidentiality

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=NGyQzOIadRg



Duration: 1:15:08
54 views
2


Protecting confidentiality of data manipulated by programs is a growing concern in various application domains. In particular, for extensible software platforms that allow users to install third party plugins, there is a need for an automated method that can verify that programs do not leak confidential information. Software model checking has emerged as an effective technique for checking programs with respect to correctness requirements. However, existing methods and tools are not applicable for specifying and verifying confidentiality properties. In this talk, I will describe a specification framework for confidentiality, decision procedures for finite state systems, an abstraction-based program analysis technique, and a prototype tool for analyzing bytecode of a set of methods of J2ME midlets for mobile devices. Joint work with Pavol Cerny




Other Videos By Microsoft Research


2016-09-06Transforming Software Powerhouse to Knowledge Systems Powerhouse
2016-09-06Your Money or Your Life: Nine Steps to Transforming Your Relationship with Money
2016-09-06Scheduling and Synchronization for Multicores
2016-09-06Developing Game-Themed Applications With XNA Game Studio: Session 2
2016-09-06Making Large Legacy Software Run Twice as Fast on a Quad-Core with Just 1 Month of Programmer Effort
2016-09-06(4,4)-split Jacobians of curves of genus 2
2016-09-06Advances in the CM method for elliptic curves
2016-09-06Normalisation by Evaluation
2016-09-06Utilising the Ubiquity of the Cell Phone to Record Physiological Activities
2016-09-06Distributed Storage Systems Made Easy
2016-09-06Software Model Checking for Confidentiality
2016-09-06Out of Our Heads: Why You Are Not Your Brain and Other Lessons from the Biology of Consciousness
2016-09-06Bill Gates, Warren Buffett and Other Great Minds Show how Creative Capitalism Can Save the World
2016-09-06Bayesian infinite matrix factorization
2016-09-06Securing the Web Platform
2016-09-06Volumetric Light Transport for Vision and Graphics
2016-09-06Automatic Workload Evaluation (AWE): Predicting Web 2.0 Workload Behavior
2016-09-06Using Wireless Sensor Data to Enable Intelligent Cooling Control in Data Centers - Case Studies
2016-09-06Play: How it Shapes the Brain, Opens the Imagination, and Invigorates the Soul
2016-09-06Modular verification of concurrent programs with heap
2016-09-06Designing Robust Enterprise Wireless Networks



Tags:
microsoft research