Abstract interpretation-based approaches to Security - A Survey on Abstract Non-Interference and its Challenging Applications
In this paper we provide a survey on the framework of abstract non-interference. In particular, we describe a general formalization of abstract non-interference by means of three dimensions (observation, protection and semantics) that can be instantiated in order to obtain well known or even new wea...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Open Publishing Association
2013-09-01
|
Series: | Electronic Proceedings in Theoretical Computer Science |
Online Access: | http://arxiv.org/pdf/1309.5131v1 |
id |
doaj-f10e879796044abd81ff2dd5c3e39ae6 |
---|---|
record_format |
Article |
spelling |
doaj-f10e879796044abd81ff2dd5c3e39ae62020-11-25T00:25:41ZengOpen Publishing AssociationElectronic Proceedings in Theoretical Computer Science2075-21802013-09-01129Festschrift for Dave Schmidt416510.4204/EPTCS.129.4Abstract interpretation-based approaches to Security - A Survey on Abstract Non-Interference and its Challenging ApplicationsIsabella MastroeniIn this paper we provide a survey on the framework of abstract non-interference. In particular, we describe a general formalization of abstract non-interference by means of three dimensions (observation, protection and semantics) that can be instantiated in order to obtain well known or even new weakened non-interference properties. Then, we show that the notions of abstract non-interference introduced in language-based security are instances of this more general framework which allows to better understand the different components of a non-interference policy. Finally, we consider two challenging research fields concerning security where abstract non-interference seems a promising approach providing new perspectives and new solutions to open problems: Code injection and code obfuscation.http://arxiv.org/pdf/1309.5131v1 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Isabella Mastroeni |
spellingShingle |
Isabella Mastroeni Abstract interpretation-based approaches to Security - A Survey on Abstract Non-Interference and its Challenging Applications Electronic Proceedings in Theoretical Computer Science |
author_facet |
Isabella Mastroeni |
author_sort |
Isabella Mastroeni |
title |
Abstract interpretation-based approaches to Security - A Survey on Abstract Non-Interference and its Challenging Applications |
title_short |
Abstract interpretation-based approaches to Security - A Survey on Abstract Non-Interference and its Challenging Applications |
title_full |
Abstract interpretation-based approaches to Security - A Survey on Abstract Non-Interference and its Challenging Applications |
title_fullStr |
Abstract interpretation-based approaches to Security - A Survey on Abstract Non-Interference and its Challenging Applications |
title_full_unstemmed |
Abstract interpretation-based approaches to Security - A Survey on Abstract Non-Interference and its Challenging Applications |
title_sort |
abstract interpretation-based approaches to security - a survey on abstract non-interference and its challenging applications |
publisher |
Open Publishing Association |
series |
Electronic Proceedings in Theoretical Computer Science |
issn |
2075-2180 |
publishDate |
2013-09-01 |
description |
In this paper we provide a survey on the framework of abstract non-interference. In particular, we describe a general formalization of abstract non-interference by means of three dimensions (observation, protection and semantics) that can be instantiated in order to obtain well known or even new weakened non-interference properties. Then, we show that the notions of abstract non-interference introduced in language-based security are instances of this more general framework which allows to better understand the different components of a non-interference policy. Finally, we consider two challenging research fields concerning security where abstract non-interference seems a promising approach providing new perspectives and new solutions to open problems: Code injection and code obfuscation. |
url |
http://arxiv.org/pdf/1309.5131v1 |
work_keys_str_mv |
AT isabellamastroeni abstractinterpretationbasedapproachestosecurityasurveyonabstractnoninterferenceanditschallengingapplications |
_version_ |
1725347488297123840 |