Concurrent Self-Explaining Computation

نویسندگان

  • Roly Perera
  • Deepak Garg
  • Umut Acar
چکیده

Self-explaining computation is an approach to program execution in which every value comes with an explanation of how it was computed. The explanation can be used to reverse the computation and to slice the original program relative to any part of the output of interest. As a result, self-explaining computation is a suitable foundation for o ine dynamic program analyses such as taint analysis and algorithmic debugging. Building on prior work in the functional setting, we develop the foundations of concurrent self-explanation for a higher-order process calculus. We represent explanations as traces, which record inter-process synchronisation as well as intra-process functional evaluation. We show that any part of the state of a concurrent computation can be accounted for by a unique minimal slice of the initial con guration. This result is established using a Galois connection describing forward and backward executions of a concurrent program that share a synchronisation structure. As our main practical result, we provide a reverse operational semantics for processes which computes the lower adjoint of the Galois connection.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protocols for Bounded-Concurrent Secure Two-Party Computation Without Setup Assumptions

Until recently, most research on the topic of secure computation focused on the stand-alonemodel, where a single protocol execution takes place. In this paper, we construct protocolsfor the setting of bounded-concurrent self composition, where a (single) secure protocol is runmany times concurrently, and there is a predetermined bound on the number of concurrentexecutions. In sh...

متن کامل

Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model

Until recently, most research on the topic of secure computation focused on the stand-alone model, where a single protocol execution takes place. In this paper, we construct protocols for the setting of bounded-concurrent self-composition, where a (single) secure protocol is run many times concurrently, and there is a predetermined bound on the number of concurrent executions. In short, we show...

متن کامل

Toward a Theory of Self-explaining Computation

Provenance techniques aim to increase the reliability of human judgments about data by making its origin and derivation process explicit. Originally motivated by the needs of scientific databases and scientific computation, provenance has also become a major issue for business and government data on the Web. However, so far provenance has been studied only in relatively restrictive settings: ty...

متن کامل

Logic Programming in

This short tutorial explains how to do Prolog-style logic programming in Oz. We give programming examples that can be run interactively on the Mozart system, which implements Oz. The Oz language is the result of a decade of research into programming based on logic. The Oz computation model subsumes both search-based logic programming and committed-choice (concurrent) logic programming with deep...

متن کامل

On the Necessity of Rewinding in Secure Multiparty Computation

We investigate whether security of multiparty computation in the informationtheoretic setting implies their security under concurrent composition. We show that security in the stand-alone model proven using black-box simulators in the information-theoretic setting does not imply security under concurrent composition, not even security under 2-bounded concurrent self-composition with an ineffici...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014