Aiding code change understanding with semantic change impact analysis

Q Hanam, A Mesbah, R Holmes - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Code reviews are often used as a means for developers to manually examine source code
changes to ensure the behavioural effects of a change are well understood. Unfortunately …

Abstract non-interference: a unifying framework for weakening information-flow

R Giacobazzi, I Mastroeni - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
Non-interference happens when some elements of a dynamic system do not interfere, ie, do
not affect, other elements in the same system. Originally introduced in language-based …

Obfuscation by partial evaluation of distorted interpreters

R Giacobazzi, ND Jones, I Mastroeni - Proceedings of the ACM …, 2012 - dl.acm.org
How to construct a general program obfuscator? We present a novel approach to
automatically generating obfuscated code P2 from any program P whose source code is …

Data minimisation: a language-based approach

T Antignac, D Sands, G Schneider - … on ICT Systems Security and Privacy …, 2017 - Springer
Data minimisation is a privacy-enhancing principle considered as one of the pillars of
personal data regulations. This principle dictates that personal data collected should be no …

Extending abstract interpretation to dependency analysis of database applications

A Jana, R Halder, KV Abhishekh… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Dependency information (data-and/or control-dependencies) among program variables and
program statements is playing crucial roles in a wide range of software-engineering …

Abstract program slicing: An abstract interpretation-based approach to program slicing

I Mastroeni, D Zanardini - ACM Transactions on Computational Logic …, 2017 - dl.acm.org
In the present article, we formally define the notion of abstract program slicing, a general
form of program slicing where properties of data are considered instead of their exact value …

Making abstract interpretation incomplete: Modeling the potency of obfuscation

R Giacobazzi, I Mastroeni - … , SAS 2012, Deauville, France, September 11 …, 2012 - Springer
Recent studies on code protection showed that incompleteness, in the abstract interpretation
framework, has a key role in understanding program obfuscation. In particular, it is well …

Maximal incompleteness as obfuscation potency

R Giacobazzi, I Mastroeni, M Dalla Preda - Formal Aspects of Computing, 2017 - Springer
Obfuscation is the art of making code hard to reverse engineer and understand. In this
paper, we propose a formal model for specifying and understanding the strength of …

Searching for Criteria for a Thinking Machine

M Ambrozy - Brain, Decision Making and Mental Health, 2023 - Springer
The paper discusses whether any reliable criterion can be found to conclude that thinking
can be attributed to a machine. It outlines a brief history of the concept of criteria for machine …

Abstract interpretation-based approaches to security-A survey on abstract non-interference and its challenging applications

I Mastroeni - arXiv preprint arXiv:1309.5131, 2013 - arxiv.org
In this paper we provide a survey on the framework of abstract non-interference. In
particular, we describe a general formalization of abstract non-interference by means of …