Systematic Approaches to Advanced Information Flow Analysis – and Applications to Software Security
Dissertations (Dissertationen)
dc.contributor.author | Mohr, Martin | |
dc.date.accessioned | 2023-06-20T09:03:40Z | |
dc.date.available | 2023-06-20T09:03:40Z | |
dc.date.issued | 2023 | |
dc.identifier.uri | https://library.oapen.org/handle/20.500.12657/63532 | |
dc.description.abstract | I report on applications of slicing and program dependence graphs (PDGs) to software security. Moreover, I propose a framework that generalizes both data-flow analysis on control-flow graphs and slicing on PDGs. This framework can be used to systematically derive data-flow-like analyses on PDGs that go beyond slicing. I demonstrate that data-flow analysis can be systematically applied to PDGs and show the practicability of my approach. | en_US |
dc.language | English | en_US |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation::UYAM Maths for computer scientists | en_US |
dc.subject.other | Programmabhängigkeitsgraphen; Slicing; Informationsflusskontrolle; Datenflussanalyse; Kontrollflussgraphen; program dependence graphs; slicing; information flow control data-flow analysis; control-flow graphs | en_US |
dc.title | Systematic Approaches to Advanced Information Flow Analysis – and Applications to Software Security | en_US |
dc.type | book | |
oapen.identifier.doi | 10.5445/KSP/1000155035 | en_US |
oapen.relation.isPublishedBy | 44e29711-8d53-496b-85cc-3d10c9469be9 | en_US |
oapen.pages | 464 | en_US |
peerreview.anonymity | All identities known | |
peerreview.id | 8ad5c235-9810-49eb-b358-27c8675324d9 | |
peerreview.open.review | No | |
peerreview.publish.responsibility | Scientific or Editorial Board | |
peerreview.review.stage | Pre-publication | |
peerreview.review.type | Full text | |
peerreview.reviewer.type | Internal editor | |
peerreview.reviewer.type | External peer reviewer | |
peerreview.title | Dissertations (Dissertationen) |