Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages 2017
DOI: 10.1145/3009837.3009889
|View full text |Cite
|
Sign up to set email alerts
|

Hypercollecting semantics and its application to static analysis of information flow

Abstract: We show how static analysis for secure information flow can be expressed and proved correct entirely within the framework of abstract interpretation. The key idea is to define a Galois connection that directly approximates the hyperproperty of interest. To enable use of such Galois connections, we introduce a fixpoint characterisation of hypercollecting semantics, i.e. a "set of sets" transformer. This makes it possible to systematically derive static analyses for hyperproperties entirely within the calculatio… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 25 publications
(35 citation statements)
references
References 85 publications
0
31
0
Order By: Relevance
“…Mathematically, abstract interpretation is very close to data refinement, where intermediate steps involve changes of data representation. For example, the state space Σ of R : Σ ⊸Σ would be connected with another, say ∆, by a coupling relation ρ : ∆ ⊸ Σ subject to a simulation condition such as S ; ρ ⊇ ρ ; R, recall (3). With a functional coupling, the connection could be ρ( S ∆) ⊒ R (ρ∆).…”
Section: Specifications and Refinementmentioning
confidence: 99%
See 1 more Smart Citation
“…Mathematically, abstract interpretation is very close to data refinement, where intermediate steps involve changes of data representation. For example, the state space Σ of R : Σ ⊸Σ would be connected with another, say ∆, by a coupling relation ρ : ∆ ⊸ Σ subject to a simulation condition such as S ; ρ ⊇ ρ ; R, recall (3). With a functional coupling, the connection could be ρ( S ∆) ⊒ R (ρ∆).…”
Section: Specifications and Refinementmentioning
confidence: 99%
“…Mantel considers a range of security properties via closure operators [24]. The limited usefulness of trace refinement for proving NI even for deterministic programs, as in the chain (12), is discussed by Assaf and Pasqua [3,27]. The formulation of possibilistic noninterference as ∼;R;∼ = R;∼ is due to Joshi and Leino [22] and resembles the formulation of Roscoe et al [35].…”
Section: Related Workmentioning
confidence: 99%
“…Doing so directly (e.g. by constructing a self-composition [7,36] or a relational program analysis [5,9,11,34,40]) can magnify the overall state space to consider.…”
Section: Decomposition: the Basicsmentioning
confidence: 99%
“…Other recent uses of product programs for program equivalence include [28,44]. Also, a recent work by Assaf et al [5] proposes to verify k-safety (and more general hyper-safety) problems via an abstract interpretation over program trace sets (as opposed to traces), which may be understood as an abstract interpretation over a (possibly unbounded) product of program copies. Recent work by Çiçek et al on relational cost analysis [11] describes a program analysis for checking and inferring resource-usage properties spanning multiple programs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation