Sudeep Kanav’s research while affiliated with Technical University of Munich and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


Fig. 1: Confidentiality bug in HotCRP 
A Conference Management System with Verified Document Confidentiality
  • Conference Paper
  • Full-text available

July 2014

·

1,231 Reads

·

45 Citations

Lecture Notes in Computer Science

Sudeep Kanav

·

·

We present a case study in verified security for realistic systems: the implementation of a conference management system, whose functional kernel is faithfully represented in the Isabelle theorem prover, where we specify and verify confidentiality properties. The various theoretical and practical challenges posed by this development led to a novel security model and verification method generally applicable to systems describable as input–output automata.

Download

Citations (1)


... Then one devises more optimised versions of the algorithm, and only proves the optimizations correct in this latter step, thus separating mathematical reasoning from implementation specific reasoning. This approach was used in most successful algorithm verification efforts (Klein et al. 2009;Esparza et al. 2013;Kanav, Lammich, and Popescu 2014). In this work, the three most important stages are the initial abstract algorithm, an implementation with abstract data structures, and finally an implementation with concretized data structures. ...

Reference:

Formally Verified Approximate Policy Iteration
A Conference Management System with Verified Document Confidentiality

Lecture Notes in Computer Science