April 1, 2023, 1:18 p.m. |

IACR News www.iacr.org

ePrint Report: Owl: Compositional Verification of Security Protocols via an Information-Flow Type System

Joshua Gancher, Sydney Gibson, Pratap Singh, Samvid Dharanikota, Bryan Parno


Computationally sound protocol verification tools promise
to deliver full-strength cryptographic proofs for
security protocols. Unfortunately,
current tools lack either modularity or automation.


We propose a new approach based on
a novel use of information flow and refinement types for
sound cryptographic proofs.
Our framework, Owl, allows
type-based modular descriptions of security protocols,
wherein disjoint subprotocols can be …

automation bryan current descriptions eprint report flow framework information modular novel protocol protocols report security sound strength sydney system tools types verification

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior - Penetration Tester

@ Deloitte | Madrid, España

Associate Cyber Incident Responder

@ Highmark Health | PA, Working at Home - Pennsylvania

Senior Insider Threat Analyst

@ IT Concepts Inc. | Woodlawn, Maryland, United States