Show simple item record

dc.contributor.authorMohr, Martin
dc.date.accessioned2023-06-20T09:03:40Z
dc.date.available2023-06-20T09:03:40Z
dc.date.issued2023
dc.identifier.urihttps://library.oapen.org/handle/20.500.12657/63532
dc.description.abstractI report on applications of slicing and program dependence graphs (PDGs) to software security. Moreover, I propose a framework that generalizes both data-flow analysis on control-flow graphs and slicing on PDGs. This framework can be used to systematically derive data-flow-like analyses on PDGs that go beyond slicing. I demonstrate that data-flow analysis can be systematically applied to PDGs and show the practicability of my approach.en_US
dc.languageEnglishen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation::UYAM Maths for computer scientistsen_US
dc.subject.otherProgrammabhängigkeitsgraphen; Slicing; Informationsflusskontrolle; Datenflussanalyse; Kontrollflussgraphen; program dependence graphs; slicing; information flow control data-flow analysis; control-flow graphsen_US
dc.titleSystematic Approaches to Advanced Information Flow Analysis – and Applications to Software Securityen_US
dc.typebook
oapen.identifier.doi10.5445/KSP/1000155035en_US
oapen.relation.isPublishedBy44e29711-8d53-496b-85cc-3d10c9469be9en_US
oapen.pages464en_US
peerreview.anonymityAll identities known
peerreview.id8ad5c235-9810-49eb-b358-27c8675324d9
peerreview.open.reviewNo
peerreview.publish.responsibilityScientific or Editorial Board
peerreview.review.stagePre-publication
peerreview.review.typeFull text
peerreview.reviewer.typeInternal editor
peerreview.reviewer.typeExternal peer reviewer
peerreview.titleDissertations (Dissertationen)


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record