Page 137 - My FlipBook
P. 137
Brochure 2020

III. Formal Verification on Group and Field Operations in personal data, but represents a set of principles and rules
Cryptographic Programs that govern the use of information and its disclosure.
How to appropriately manage information flows and
Modern cryptography relies on computation over to encourage data sharing yet keep shared information
large finite fields. However, commodity computing private remains a challenge. A typical approach is for
devices do not natively support long integer (such as a centralized data controller to de-identify a dataset
255 bits) computation. Therefore, computation over collected from individuals before it is released for
large finite fields must be implemented on 32- or 64- reuse. That the interests of the three actors involved,
bit architectures. Such implementations necessarily i.e., individuals, data controllers, and third-party data
vary depending on the architecture. In OpenSSL, users, are not properly aligned is a central dilemma in
multiplication over large finite fields has been sharing and reusing personal data. Together with legal
implemented for x86, ARM and SPARC. Whether all scholars, we are working toward a communal approach
assembly programs implement multiplication correctly to personal data management whereby, without an
is of utmost importance in applications of cryptography. external authority, members of a community can pool
We are focusing on developing practical and formal sensitive information about themselves for mutual
techniques for verifying algebraic properties on group benefits. Principles from programming languages and
and field operations in cryptographic programs. formal methods will guide us in the development of
In collaboration with practical cryptographers, our good data-sharing schemes with verifiable properties.
technique has been applied to verify group and field We will develop methods, tools, and systems to facilitate
operations in various elliptic curve cryptosystems in communal management of sensitive data and put them
OpenSSL, Bitcoin and wolfSSL. into use.

IV. String Constraint Solving VI. Education

Web program security is a crucial building block of In addition to our research activities, we also dedicate
our digital infrastructure. Among other means of signi cant resources to education. In order to introduce
ensuring cybersecurity, there is an apparent demand our research to students, we have organized the
for automatic web program analysis. String constraint yearly Formosan Summer School on Logic, Language,
solvers are the engine of modern web program analysis and Computation (FLOLAC), in operation since 2007.
techniques. Due to high demand, there has been a Through FLOLAC, more and more students in Taiwan
considerable increase in the number of publications on have been encouraged to study and conduct research
this subject over the past six years. Together with our on programming languages and formal methods.
close collaborators in Europe, we have achieved a series
of successes in this research direction. For example, we
proposed the first string constraint solving procedure
that is able to generate Craig interpolant, which is
essential in the invariant generation for software
model checking. Our string constraint solver, named
Trau, is among the most efficient implementations in
the world. Nevertheless, current state-of-the-art for
the development of string constraint solvers lags way
behind the levels required for web program analysis and,
together with our colleagues globally, we are working
toward bridging that gap.

V. Communal Sharing of Sensitive Data

Privacy refers not merely to restrictions on acquiring

135
   132   133   134   135   136   137   138   139   140   141   142