University of Minnesota Ph.D. dissertation. 2021. Major: Computer Science. Advisor: Stephen McCamant. 1 computer file (PDF); viii, 81 pages.Program analysis techniques have numerous applications in software optimization and correctness. Focusing on software security, analyses like data flow analysis and symbolic execution have been proven effective in many settings. Information-flow security measures and bounds the propagation of sensitive information throughout the code. Automatic vulnerability detection provides tooling for tracking and identifying potentially buggy code. Data flow analysis is scalable but imprecise due to over-approximations. Symbolic execution is precise and sound but suffers on scalability. In this thesis, we develop m...
Noninterference, a strong security property for a computation process, informally says that the proc...
The ramping up use of network connected devices is providing hackers more incentives and opportuniti...
Many security and software testing applications require checking whether certain properties of a pro...
Static data flow analysis is an indispensable tool for finding potentially malicious data leaks in s...
Over the past 20 years, our society has become increasingly dependent on software. Today, we rely on...
Static data flow analysis is an indispensable tool for finding potentially malicious data leaks in s...
Modern software systems require the support of automatic program analyses to answer questions about ...
Quantitative program analysis is an emerging area with applications to software testing and security...
Memory corruption is a serious class of software vulnerabilities, which requires careful attention t...
acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acm...
Analysis of inter-procedural data flow (IDF) is a commonly encountered challenge for verifying safet...
We introduce an abstract domain for information-flow analysis of software. The proposal combines var...
textMany challenges in software quality can be tackled with dynamic analysis. However, these techniq...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
textThe last few years have seen a resurgence of interest in the use of symbolic execution--program ...
Noninterference, a strong security property for a computation process, informally says that the proc...
The ramping up use of network connected devices is providing hackers more incentives and opportuniti...
Many security and software testing applications require checking whether certain properties of a pro...
Static data flow analysis is an indispensable tool for finding potentially malicious data leaks in s...
Over the past 20 years, our society has become increasingly dependent on software. Today, we rely on...
Static data flow analysis is an indispensable tool for finding potentially malicious data leaks in s...
Modern software systems require the support of automatic program analyses to answer questions about ...
Quantitative program analysis is an emerging area with applications to software testing and security...
Memory corruption is a serious class of software vulnerabilities, which requires careful attention t...
acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acm...
Analysis of inter-procedural data flow (IDF) is a commonly encountered challenge for verifying safet...
We introduce an abstract domain for information-flow analysis of software. The proposal combines var...
textMany challenges in software quality can be tackled with dynamic analysis. However, these techniq...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
textThe last few years have seen a resurgence of interest in the use of symbolic execution--program ...
Noninterference, a strong security property for a computation process, informally says that the proc...
The ramping up use of network connected devices is providing hackers more incentives and opportuniti...
Many security and software testing applications require checking whether certain properties of a pro...