메뉴 건너뛰기




Volumn 64, Issue 1 SPEC. ISS., 2007, Pages 3-28

A logic for information flow analysis with an application to forward slicing of simple imperative programs

Author keywords

Abstract interpretation; Denotational semantics; Frame rule; Hoare logic; Information flow analysis; Program slicing; Strongest postcondition

Indexed keywords

ABSTRACTING; COMPUTER PROGRAMMING LANGUAGES; SECURITY OF DATA; SEMANTICS; THEOREM PROVING;

EID: 33751073715     PISSN: 01676423     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.scico.2006.03.002     Document Type: Article
Times cited : (29)

References (34)
  • 1
    • 0032681509 scopus 로고    scopus 로고
    • M. Abadi, A. Banerjee, N. Heintze, J.G. Riecke, A core calculus of dependency, in: ACM Symposium on Principles of Programming Languages, POPL, 1999, pp. 147-160
  • 2
    • 33745806932 scopus 로고    scopus 로고
    • T. Amtoft, S. Bandhakavi, A. Banerjee, A logic for information flow in object-oriented programs, in: ACM Symposium on Principles of Programming Languages, POPL, 2006, pp. 91-102
  • 3
    • 33751112057 scopus 로고    scopus 로고
    • T. Amtoft, A. Banerjee, Information flow analysis in logical form, Tech. Rep. CIS TR 2004-3, Kansas State University, April 2004. URL: http://www.cis.ksu.edu/~ab/Publications/ifalftr.pdf
  • 4
    • 35048839749 scopus 로고    scopus 로고
    • Information flow analysis in logical form
    • Static Analysis Symposium. SAS, Springer-Verlag
    • Amtoft T., and Banerjee A. Information flow analysis in logical form. Static Analysis Symposium. SAS. Lecture Notes in Computer Science vol. 3148 (2004), Springer-Verlag 100-115
    • (2004) Lecture Notes in Computer Science , vol.3148 , pp. 100-115
    • Amtoft, T.1    Banerjee, A.2
  • 6
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based access control and secure information flow
    • Language-based Security (special issue)
    • Banerjee A., and Naumann D.A. Stack-based access control and secure information flow. Language-based Security. Journal of Functional Programming 15 2 (2005) 131-177 (special issue)
    • (2005) Journal of Functional Programming , vol.15 , Issue.2 , pp. 131-177
    • Banerjee, A.1    Naumann, D.A.2
  • 8
    • 33751082194 scopus 로고    scopus 로고
    • D. Bell, L. LaPadula, Secure computer systems: Mathematical foundations, Tech. Rep. MTR-2547, MITRE Corp., 1973
  • 9
    • 0036555709 scopus 로고    scopus 로고
    • Information flow for Algol-like languages
    • Clark D., Hankin C., and Hunt S. Information flow for Algol-like languages. Computer Languages 28 1 (2002) 3-28
    • (2002) Computer Languages , vol.28 , Issue.1 , pp. 3-28
    • Clark, D.1    Hankin, C.2    Hunt, S.3
  • 10
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • DeMillo R.A., Dobkin D.P., Jones A.K., and Lipton R.J. (Eds), Academic Press
    • Cohen E.S. Information transmission in sequential programs. In: DeMillo R.A., Dobkin D.P., Jones A.K., and Lipton R.J. (Eds). Foundations of Secure Computation (1978), Academic Press 297-335
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 11
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • POPL, ACM Press, New York, NY
    • Cousot P., and Cousot R. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. ACM Symposium on Principles of Programming Languages. POPL (1977), ACM Press, New York, NY 238-252
    • (1977) ACM Symposium on Principles of Programming Languages , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 12
    • 84878892024 scopus 로고
    • Automatic synthesis of optimal invariant assertions: mathematical foundations
    • Proceedings of the ACM Symposium on Artificial Intelligence and Programming Languages, ACM Press
    • Cousot P., and Cousot R. Automatic synthesis of optimal invariant assertions: mathematical foundations. Proceedings of the ACM Symposium on Artificial Intelligence and Programming Languages. SIGPLAN Notices vol. 12 (1977), ACM Press 1-12
    • (1977) SIGPLAN Notices , vol.12 , pp. 1-12
    • Cousot, P.1    Cousot, R.2
  • 13
    • 33751077617 scopus 로고    scopus 로고
    • Á. Darvas, R. Hähnle, D. Sands, A theorem proving approach to analysis of secure information flow, Tech. Rep. 2004-01, Department of Computing Science, Chalmers University of Technology and Göteborg University, 2004, a fuller version of a paper appearing in Workshop on Issues in the Theory of Security, 2003
  • 14
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning D., and Denning P. Certification of programs for secure information flow. Communications of the ACM 20 7 (1977) 504-513
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.1    Denning, P.2
  • 15
    • 2442507870 scopus 로고    scopus 로고
    • R. Giacobazzi, I. Mastroeni, Abstract non-interference: Parameterizing non-interference by abstract interpretation, in: ACM Symposium on Principles of Programming Languages, POPL, 2004, pp. 186-197
  • 16
    • 0020299523 scopus 로고    scopus 로고
    • J. Goguen, J. Meseguer, Security policies and security models, in: Proc. IEEE Symp. on Security and Privacy, 1982, pp. 11-20
  • 17
    • 0031701347 scopus 로고    scopus 로고
    • N. Heintze, J.G. Riecke, The SLam calculus: Programming with secrecy and integrity, in: ACM Symposium on Principles of Programming Languages, POPL, 1998, pp. 365-377
  • 18
    • 84976858409 scopus 로고
    • Binding time analysis: A new PERspective
    • Partial Evaluation and Semantics-Based Program Manipulation. PEPM
    • Hunt S., and Sands D. Binding time analysis: A new PERspective. Partial Evaluation and Semantics-Based Program Manipulation. PEPM. SIGPLAN Notices 26 9 (1991) 154-165
    • (1991) SIGPLAN Notices , vol.26 , Issue.9 , pp. 154-165
    • Hunt, S.1    Sands, D.2
  • 20
    • 0035035498 scopus 로고    scopus 로고
    • S. Ishtiaq, P.W. O'Hearn, BI as an assertion language for mutable data structures, in: ACM Symposium on Principles of Programming Languages, POPL, 2001, pp. 14-26
  • 21
  • 22
    • 0023231848 scopus 로고    scopus 로고
    • D. McCullough, Specifications for multi-level security and a hook-up, in: IEEE Symposium on Security and Privacy, 1987, pp. 161-166
  • 24
    • 84944269268 scopus 로고    scopus 로고
    • Local reasoning about programs that alter data structures
    • Computer Science Logic, Springer-Verlag
    • O'Hearn P., Reynolds J., and Yang H. Local reasoning about programs that alter data structures. Computer Science Logic. Lecture Notes in Computer Science vol. 2142 (2001), Springer-Verlag 1-19
    • (2001) Lecture Notes in Computer Science , vol.2142 , pp. 1-19
    • O'Hearn, P.1    Reynolds, J.2    Yang, H.3
  • 25
    • 2442441012 scopus 로고    scopus 로고
    • P. O'Hearn, H. Yang, J. Reynolds, Separation and information hiding, in: ACM Symposium on Principles of Programming Languages, POPL, 2004, pp. 268-280
  • 28
    • 0036051192 scopus 로고    scopus 로고
    • Separation logic: A logic for shared mutable data structures
    • LICS, IEEE Computer Society Press
    • Reynolds J.C. Separation logic: A logic for shared mutable data structures. IEEE Symposium on Logic in Computer Science. LICS (2002), IEEE Computer Society Press 55-74
    • (2002) IEEE Symposium on Logic in Computer Science , pp. 55-74
    • Reynolds, J.C.1
  • 29
    • 35048828759 scopus 로고    scopus 로고
    • A model for delimited information release
    • Proceedings of the International Symposium on Software Security. ISSS, Springer-Verlag
    • Sabelfeld A., and Myers A. A model for delimited information release. Proceedings of the International Symposium on Software Security. ISSS. Lecture Notes in Computer Science vol. 3233 (2004), Springer-Verlag 174-191
    • (2004) Lecture Notes in Computer Science , vol.3233 , pp. 174-191
    • Sabelfeld, A.1    Myers, A.2
  • 31
    • 0035276729 scopus 로고    scopus 로고
    • A Per model of secure information flow in sequential programs
    • Sabelfeld A., and Sands D. A Per model of secure information flow in sequential programs. Higher-order and Symbolic Computation 14 1 (2001) 59-91
    • (2001) Higher-order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 32
    • 84887886825 scopus 로고    scopus 로고
    • Structure-preserving binary relations for program abstraction
    • The Essence of Computation: Complexity, Analysis, Transformation - Essays dedicated to Neil D. Jones, Springer-Verlag
    • Schmidt D.A. Structure-preserving binary relations for program abstraction. The Essence of Computation: Complexity, Analysis, Transformation - Essays dedicated to Neil D. Jones. Lecture Notes in Computer Science no. 2566 (2002), Springer-Verlag 245-265
    • (2002) Lecture Notes in Computer Science , vol.2566 , pp. 245-265
    • Schmidt, D.A.1
  • 34
    • 84956989228 scopus 로고    scopus 로고
    • A type-based approach to program security
    • Proceedings of Theory and Practice of Software Development. TAPSOFT'97, Springer-Verlag
    • Volpano D., and Smith G. A type-based approach to program security. Proceedings of Theory and Practice of Software Development. TAPSOFT'97. Lecture Notes in Computer Science no. 1214 (1997), Springer-Verlag 607-621
    • (1997) Lecture Notes in Computer Science , vol.1214 , pp. 607-621
    • Volpano, D.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.