4 Hits in 2.2 sec

FlowSpec: A Declarative Specification Language for Intra-Procedural Flow-Sensitive Data-Flow Analysis

Jeff Smits, Guido Wachsmuth, Eelco Visser
2019 Journal of Computer Languages  
In previous work researchers have proposed higher-level formalisms suitable for wholeprogram analysis in a separate tool, incremental analysis within editors, or bound to a specific intermediate representation  ...  It is an integral part of modern language specifications and compilers.  ...  Conclusion We have presented FLOWSPEC, a declarative specification language for the domain of data-flow analysis.  ... 
doi:10.1016/j.cola.2019.100924 fatcat:kclleykm3vfd3hd7t7n7jf6uau

Towards Static Flow-Based Declassification for Legacy and Untrusted Programs

Bruno P. S. Rocha, Sruthi Bandhakavi, Jerry den Hartog, William H. Winsborough, Sandro Etalle
2010 2010 IEEE Symposium on Security and Privacy  
Based on flow-based static analysis, it represents a first step towards a new approach that can be applied to untrusted and legacy source code to automatically verify that the analyzed program complies  ...  The analysis works by constructing a conservative approximation of expressions over input channel values that could be output by the program, and by determining whether all such expressions satisfy the  ...  In dataflow-based approaches, an analysis calculates dependence relationships between program variables; non-interference is ensured if low variables are independent from high variables.  ... 
doi:10.1109/sp.2010.14 dblp:conf/sp/RochaBHWE10 fatcat:m6x3diqkanah7dbxitg7xezxze

Dagstuhl Reports, Volume 8, Issue 6, June 2018, Complete Issue [article]

BGP Flowspecs; some knobs allow to accept but not apply them, defeating their own purpose.  ...  Table of Contents In this talk, we report on the analysis of 4 years of data collected by an infrastructure specifically designed to answer that question: are intentional stealthy BGP hijacks routinely  ...  A specific paradigmatic example of this technological convergence and the ethical problems that it gives rise to is discussed in this talk.  ... 
doi:10.4230/dagrep.8.6 fatcat:3ssdbne26vbafli4wg4udjocly

Information flow and declassification analysis for legacy and untrusted programs [article]

Pontes Soares Rocha, B (Bruno), Etalle, S (Sandro), Hartog, JI (Jerry) Den
Dataflow-based approaches can also be implemented as runtime enforcers, and one such example is taint analysis [LL05, TPF + 09], which keeps track of program modules/structures which are dependent of (  ...  We can make the analysis termination-sensitive either by disallowing while loops under high conditionals or introducing a flow between the conditional in which the loop is declared to all the output channels  ... 
doi:10.6100/ir720730 fatcat:xm46b6izvfghfeh67sotescnk4