International audienceWe show how static analysis for secure information flow can be expressed and proved correct entirely within the framework of abstract interpretation. The key idea is to define a Galois connection that directly approximates the hyperproperty of interest. To enable use of such Galois connections, we introduce a fixpoint characterisation of hypercollecting semantics, i.e. a " set of sets " transformer. This makes it possible to systematically derive static analyses for hyper-properties entirely within the calculational framework of abstract interpretation. We evaluate this technique by deriving example static analyses. For qualitative information flow, we derive a dependence analysis similar to the logic of Amtoft and Ban...
AbstractA classic problem in security is that of checking that a program has secure information flow...
Hyperproperties are quickly becoming very popular in the context of systems security, due to their e...
We introduce an abstract domain for information-flow analysis of software. The proposal combines var...
International audienceWe show how static analysis for secure information flow can be expressed and p...
In the context of systems security, information flows play a central role. Unhandled information flo...
In the context of systems security, information flows play a central role. Unhandled information flo...
Protecting the confidentiality of information stored in a computer system or transmitted over a publ...
In the context of systems security, information flows play a central role. Unhandled information flo...
Abstract. Static analyses calculate abstract states, and their logics validate properties of the abs...
International audienceQualitative information flow aims at detecting information leaks, whereas the ...
Static analysis of a program allows to predict the properties of its executions without actually exe...
We propose an approach to quantify interference in a simple imperative language that includes a loop...
AbstractControl Flow Analysis is a static technique for predicting safe and computable approximation...
AbstractWe connect the activity of defining an abstract-interpretation-based static analysis with sy...
AbstractA classic problem in security is that of checking that a program has secure information flow...
Hyperproperties are quickly becoming very popular in the context of systems security, due to their e...
We introduce an abstract domain for information-flow analysis of software. The proposal combines var...
International audienceWe show how static analysis for secure information flow can be expressed and p...
In the context of systems security, information flows play a central role. Unhandled information flo...
In the context of systems security, information flows play a central role. Unhandled information flo...
Protecting the confidentiality of information stored in a computer system or transmitted over a publ...
In the context of systems security, information flows play a central role. Unhandled information flo...
Abstract. Static analyses calculate abstract states, and their logics validate properties of the abs...
International audienceQualitative information flow aims at detecting information leaks, whereas the ...
Static analysis of a program allows to predict the properties of its executions without actually exe...
We propose an approach to quantify interference in a simple imperative language that includes a loop...
AbstractControl Flow Analysis is a static technique for predicting safe and computable approximation...
AbstractWe connect the activity of defining an abstract-interpretation-based static analysis with sy...
AbstractA classic problem in security is that of checking that a program has secure information flow...
Hyperproperties are quickly becoming very popular in the context of systems security, due to their e...
We introduce an abstract domain for information-flow analysis of software. The proposal combines var...