Abstract interpretation-based approaches to Security - A Survey on Abstract Non-Interference and its Challenging Applications

نویسنده

  • Isabella Mastroeni
چکیده

interpretation: Domains and surroundings. Abstract interpretation is a general theory for specifying and designing approximate semantics of program languages [10]. Approximation can be equivalently formulated either in terms of Galois connections or closure operators [11]. An upper closure operator ρ : C → C on a poset C (uco(C ) for short), representing concrete objects, is monotone, idempotent, and extensive: ∀x ∈C . x ≤C ρ(x ). The upper closure operator is the function that maps the concrete values to their abstract properties, namely with the best possible approximation of the concrete value in the abstract domain. For example, Sign :℘(Z)→℘(Z), on the powerset of integers, associates each set of integers with its sign: Sign(∅) =∅ def = “none”, Sign(S ) = {n | n > 0} def =+ if ∀n ∈ S .n > 0, Sign(0) = {0} def = 0, Sign(S ) = {n | n < 0} def =− if ∀n ∈ S . n < 0, Sign(S ) = {n | n ≥ 0} def = 0+ if ∀n ∈ S . x ≥ 0, Sign(S ) = {n | n ≤ 0} def = 0− if ∀n ∈ S . n ≤ 0 and Sign(S ) = Z def = “I don’t know” otherwise. Analogously, the operator Par : ℘(Z)→℘(Z) associates each set of integers with its par-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Language-based Security Abstract Non-interference

Interpretation Consider C = ℘(Z): [Cousot & Cousot’77] C A {0} {0,!1,!2,!3,...} 0! {!2,!3} Abstract domain 0+ ? {0,1,2,3,...} Language-based Security: Abstract Non-Interferece – p.3/32 Abstract Interpretation Consider C = ℘(Z): [Cousot & Cousot’77]Interpretation Consider C = ℘(Z): [Cousot & Cousot’77] Abstract domain C A {0} {0,1,2,3,...} {0,!1,!2,!3,...} 0! {!2,!3} 0+ ?domain C A {0} {0,1,2,3,...

متن کامل

Adjoining classified and unclassified information by abstract interpretation

In this paper we prove that attack models and information released in languagebased security can be viewed as adjoint transformations in the abstract interpretation framework. This is achieved by interpreting the well known Joshi and Leino’s semantic approach to non-interference as a problem of making an abstraction complete relatively to a program’s semantics. This observation allows us to pro...

متن کامل

Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata

Secure Information-flow Analysis for Automata Roberto Giacobazzi and Isabella Mastroeni Dipartimento di Informatica Università di Verona, Italy (roberto.giacobazzi@ | mastroeni@sci.)univr.it Abstract. Abstract non-interference has been introduced as a weakening non-interference which models attackers as abstract interpretations (i.e., static analyzers) of programming language semantics. In this...

متن کامل

Deriving Bisimulations by Simplifying Partitions

In this paper we analyze the problem of transforming partitions in order to satisfy completeness in the standard abstract interpretation framework. In order to obtain this, we exploit the relation existing between completeness and the Paige-Tarjan notion of stability, already detected in the particular context of refining partitions for completeness. Here we extend this relation in order to cop...

متن کامل

A Proof System for Abstract Non-interference

In this paper we provide a inductive proof system for abstract non-interference which fits in every field of computer science where we are interested in observing how different program’s data interfere with each other. The idea is to abstract from language-based security and consider generically data as distinguished between internal (that has to be protected by the program) and observable. In ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013