Abstract interpretation-based approaches to Security - A Survey on Abstract Non-Interference and its Challenging Applications
نویسنده
چکیده
interpretation: Domains and surroundings. Abstract interpretation is a general theory for specifying and designing approximate semantics of program languages [10]. Approximation can be equivalently formulated either in terms of Galois connections or closure operators [11]. An upper closure operator ρ : C → C on a poset C (uco(C ) for short), representing concrete objects, is monotone, idempotent, and extensive: ∀x ∈C . x ≤C ρ(x ). The upper closure operator is the function that maps the concrete values to their abstract properties, namely with the best possible approximation of the concrete value in the abstract domain. For example, Sign :℘(Z)→℘(Z), on the powerset of integers, associates each set of integers with its sign: Sign(∅) =∅ def = “none”, Sign(S ) = {n | n > 0} def =+ if ∀n ∈ S .n > 0, Sign(0) = {0} def = 0, Sign(S ) = {n | n < 0} def =− if ∀n ∈ S . n < 0, Sign(S ) = {n | n ≥ 0} def = 0+ if ∀n ∈ S . x ≥ 0, Sign(S ) = {n | n ≤ 0} def = 0− if ∀n ∈ S . n ≤ 0 and Sign(S ) = Z def = “I don’t know” otherwise. Analogously, the operator Par : ℘(Z)→℘(Z) associates each set of integers with its par-
منابع مشابه
Language-based Security Abstract Non-interference
Interpretation Consider C = ℘(Z): [Cousot & Cousot’77] C A {0} {0,!1,!2,!3,...} 0! {!2,!3} Abstract domain 0+ ? {0,1,2,3,...} Language-based Security: Abstract Non-Interferece – p.3/32 Abstract Interpretation Consider C = ℘(Z): [Cousot & Cousot’77]Interpretation Consider C = ℘(Z): [Cousot & Cousot’77] Abstract domain C A {0} {0,1,2,3,...} {0,!1,!2,!3,...} 0! {!2,!3} 0+ ?domain C A {0} {0,1,2,3,...
متن کاملAdjoining classified and unclassified information by abstract interpretation
In this paper we prove that attack models and information released in languagebased security can be viewed as adjoint transformations in the abstract interpretation framework. This is achieved by interpreting the well known Joshi and Leino’s semantic approach to non-interference as a problem of making an abstraction complete relatively to a program’s semantics. This observation allows us to pro...
متن کاملGeneralized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata
Secure Information-flow Analysis for Automata Roberto Giacobazzi and Isabella Mastroeni Dipartimento di Informatica Università di Verona, Italy (roberto.giacobazzi@ | mastroeni@sci.)univr.it Abstract. Abstract non-interference has been introduced as a weakening non-interference which models attackers as abstract interpretations (i.e., static analyzers) of programming language semantics. In this...
متن کاملDeriving Bisimulations by Simplifying Partitions
In this paper we analyze the problem of transforming partitions in order to satisfy completeness in the standard abstract interpretation framework. In order to obtain this, we exploit the relation existing between completeness and the Paige-Tarjan notion of stability, already detected in the particular context of refining partitions for completeness. Here we extend this relation in order to cop...
متن کاملA Proof System for Abstract Non-interference
In this paper we provide a inductive proof system for abstract non-interference which fits in every field of computer science where we are interested in observing how different program’s data interfere with each other. The idea is to abstract from language-based security and consider generically data as distinguished between internal (that has to be protected by the program) and observable. In ...
متن کامل