Verification Across Intellectual Property Boundaries

  • Sagar Chaki
  • Christian Schallhart
  • Helmut Veith
Conference paper

DOI: 10.1007/978-3-540-73368-3_11

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4590)
Cite this paper as:
Chaki S., Schallhart C., Veith H. (2007) Verification Across Intellectual Property Boundaries. In: Damm W., Hermanns H. (eds) Computer Aided Verification. CAV 2007. Lecture Notes in Computer Science, vol 4590. Springer, Berlin, Heidelberg

Abstract

In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) rights, the customer usually has no direct access to the suppliers’ source code, and is able to enforce the use of verification tools only by legal requirements. In turn, the supplier has no means to convince the customer about successful verification without revealing the source code. This paper presents a new approach to resolve the conflict between the IP interests of the supplier and the quality interests of the customer. We introduce a protocol in which a dedicated server (called the “amanat”) is controlled by both parties: the customer controls the verification task performed by the amanat, while the supplier controls the communication channels of the amanat to ensure that the amanat does not leak information about the source code. We argue that the protocol is both practically useful and mathematically sound. As the protocol is based on well-known (and relatively lightweight) cryptographic primitives, it allows a straightforward implementation on top of existing verification tool chains. To substantiate our security claims, we establish the correctness of the protocol by cryptographic reduction proofs.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Sagar Chaki
    • 1
  • Christian Schallhart
    • 2
  • Helmut Veith
    • 2
  1. 1.Software Engineering Institute, Carnegie Mellon UniversityUSA
  2. 2.Institut für Informatik, Technische Universität MünchenGermany

Personalised recommendations