In this paper we exploit abstract interpretation for transforming abstract domains and semantics. The driving force in both transformations is making domains and semantics, ie abstract interpretations themselves, complete, namely precise, for some given observation. We prove that a common geometric pattern is shared by all these transformations, both at the domain and semantic level. This pattern is based on the notion residuated closures, which in our case can be viewed as an instance of abstract interpretation. We consider these operations in the context of language-based security, and show how domain and semantic transformations model security policies and attackers, opening new perspectives in the model of information flow in programmin...
Completeness is an ideal, although uncommon, feature of abstract interpretations, formalizing the in...
In this paper, we illustrate the role of the notion of Abstract Non-Interference in language based s...
Abstract interpretation is a well established theory that supports reasoning about the run-time beha...
In this paper we prove that attack models and robust declassification in language-based security can...
AbstractIn 1997, Cousot introduced a hierarchy where semantics are related with each other by abstra...
Completeness in abstract interpretation models the ideal situation where no loss of precision is int...
Hiding information means both hiding as making it imperceptible and obscuring as making it incompreh...
In this paper we introduce a semantic-based approach for code obfuscation. The aim of code obfusca...
In recent years code obfuscation has attracted research interest as a promising technique for protec...
In this paper we provide a survey on the framework of abstract non-interference. In particular, we d...
In this paper we provide a survey on the framework of abstract non-interference. In particular, we d...
In 1997, Cousot introduced a hierarchy where semantics are related with each other by abstract inter...
Control code obfuscation is intended to prevent malicious reverse engineering of software by masking...
The aim of this thesis is to extend the Abstract Interpretation framework to the broader context of ...
Recent studies on code protection showed that incompleteness, in the abstract interpretation framewo...
Completeness is an ideal, although uncommon, feature of abstract interpretations, formalizing the in...
In this paper, we illustrate the role of the notion of Abstract Non-Interference in language based s...
Abstract interpretation is a well established theory that supports reasoning about the run-time beha...
In this paper we prove that attack models and robust declassification in language-based security can...
AbstractIn 1997, Cousot introduced a hierarchy where semantics are related with each other by abstra...
Completeness in abstract interpretation models the ideal situation where no loss of precision is int...
Hiding information means both hiding as making it imperceptible and obscuring as making it incompreh...
In this paper we introduce a semantic-based approach for code obfuscation. The aim of code obfusca...
In recent years code obfuscation has attracted research interest as a promising technique for protec...
In this paper we provide a survey on the framework of abstract non-interference. In particular, we d...
In this paper we provide a survey on the framework of abstract non-interference. In particular, we d...
In 1997, Cousot introduced a hierarchy where semantics are related with each other by abstract inter...
Control code obfuscation is intended to prevent malicious reverse engineering of software by masking...
The aim of this thesis is to extend the Abstract Interpretation framework to the broader context of ...
Recent studies on code protection showed that incompleteness, in the abstract interpretation framewo...
Completeness is an ideal, although uncommon, feature of abstract interpretations, formalizing the in...
In this paper, we illustrate the role of the notion of Abstract Non-Interference in language based s...
Abstract interpretation is a well established theory that supports reasoning about the run-time beha...