id |
oapen-20.500.12657-63532
|
record_format |
dspace
|
spelling |
oapen-20.500.12657-635322023-06-21T04:20:47Z Systematic Approaches to Advanced Information Flow Analysis – and Applications to Software Security Mohr, Martin Programmabhängigkeitsgraphen; Slicing; Informationsflusskontrolle; Datenflussanalyse; Kontrollflussgraphen; program dependence graphs; slicing; information flow control data-flow analysis; control-flow graphs bic Book Industry Communication::U Computing & information technology::UY Computer science::UYA Mathematical theory of computation::UYAM Maths for computer scientists I report on applications of slicing and program dependence graphs (PDGs) to software security. Moreover, I propose a framework that generalizes both data-flow analysis on control-flow graphs and slicing on PDGs. This framework can be used to systematically derive data-flow-like analyses on PDGs that go beyond slicing. I demonstrate that data-flow analysis can be systematically applied to PDGs and show the practicability of my approach. 2023-06-20T09:03:40Z 2023-06-20T09:03:40Z 2023 book https://library.oapen.org/handle/20.500.12657/63532 eng application/pdf Attribution-ShareAlike 4.0 International systematic-approaches-to-advanced-information-flow-analysis-and-applications-to-software-security.pdf https://doi.org/10.5445/KSP/1000155035 KIT Scientific Publishing 10.5445/KSP/1000155035 10.5445/KSP/1000155035 44e29711-8d53-496b-85cc-3d10c9469be9 464 open access
|
institution |
OAPEN
|
collection |
DSpace
|
language |
English
|
description |
I report on applications of slicing and program dependence graphs (PDGs) to software security. Moreover, I propose a framework that generalizes both data-flow analysis on control-flow graphs and slicing on PDGs. This framework can be used to systematically derive data-flow-like analyses on PDGs that go beyond slicing. I demonstrate that data-flow analysis can be systematically applied to PDGs and show the practicability of my approach.
|
title |
systematic-approaches-to-advanced-information-flow-analysis-and-applications-to-software-security.pdf
|
spellingShingle |
systematic-approaches-to-advanced-information-flow-analysis-and-applications-to-software-security.pdf
|
title_short |
systematic-approaches-to-advanced-information-flow-analysis-and-applications-to-software-security.pdf
|
title_full |
systematic-approaches-to-advanced-information-flow-analysis-and-applications-to-software-security.pdf
|
title_fullStr |
systematic-approaches-to-advanced-information-flow-analysis-and-applications-to-software-security.pdf
|
title_full_unstemmed |
systematic-approaches-to-advanced-information-flow-analysis-and-applications-to-software-security.pdf
|
title_sort |
systematic-approaches-to-advanced-information-flow-analysis-and-applications-to-software-security.pdf
|
publisher |
KIT Scientific Publishing
|
publishDate |
2023
|
url |
https://doi.org/10.5445/KSP/1000155035
|
_version_ |
1771297433372852224
|