A survey on the use of access permission-based specifications for program verification

被引:2
|
作者
Sadiq, Ayesha [1 ]
Li, Yuan-Fang [1 ]
Ling, Sea [1 ]
机构
[1] Monash Univ, Fac Informat Technol, Clayton, Vic, Australia
关键词
Access permissions; Program verification; Concurrency; Protocol verification; Permission inference; Survey; CONCURRENCY; DISCIPLINE; CHECKING; LANGUAGE; SYSTEM; LOGIC;
D O I
10.1016/j.jss.2019.110450
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Verifying the correctness and reliability of imperative and object-oriented programs is one of the grand challenges in computer science. In imperative programming models, programmers introduce concurrency manually by using explicit concurrency constructs such as multi-threading. Multi-threaded programs are prone to synchronization problems such as data races and dead-locks, and verifying API protocols in object-oriented programs is a non-trivial task due to improper and unexpected state transition at run time. This is in part due to the unexpected sharing of program states in such programs. With these considerations in mind, access permissions have been investigated as a means to reasoning about the correctness of such programs. Access permissions are abstract capabilities that characterize the way a shared resource can be accessed by multiple references. This paper provides a comprehensive survey of existing access permission-based verification approaches. We describe different categories of permissions and permission-based contracts. We elaborate how permission-based specifications have been used to ensure compliance of API protocols and to avoid synchronization problems in concurrent programs. We compare existing approaches based on permission usage, analysis performed, language and/or tool supported, and properties being verified. Finally, we provide insight into the research challenges posed by existing approaches and suggest future directions. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页数:25
相关论文
共 50 条
  • [1] Extracting Permission-based Specifications from a Sequential Java']Java Program
    Sadiq, Ayesha
    Li, Yuan-Fang
    Ling, Sea
    Ahmed, Ijaz
    2016 21ST INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2016), 2016, : 215 - 218
  • [2] Viper: A Verification Infrastructure for Permission-Based Reasoning
    Mueller, Peter
    Schwerhoff, Malte
    Summers, Alexander J.
    DEPENDABLE SOFTWARE SYSTEMS ENGINEERING, 2017, 50 : 104 - 125
  • [3] Viper: A Verification Infrastructure for Permission-Based Reasoning
    Mueller, Peter
    Schwerhoff, Malte
    Summers, Alexander J.
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, VMCAI 2016, 2016, 9583 : 41 - 62
  • [4] Permission-Based Verification of Red-Black Trees and Their Merging
    Armborst, Lukas
    Huisman, Marieke
    2021 IEEE/ACM 9TH INTERNATIONAL CONFERENCE ON FORMAL METHODS IN SOFTWARE ENGINEERING (FORMALISE 2021), 2021, : 111 - 123
  • [5] A survey of permission-based distributed mutual exclusion algorithms
    Saxena, PC
    Rai, J
    COMPUTER STANDARDS & INTERFACES, 2003, 25 (02) : 159 - 181
  • [6] Constraints for Permission-Based Delegations
    Shang, Qinghua
    Wang, Xingang
    8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY WORKSHOPS: CIT WORKSHOPS 2008, PROCEEDINGS, 2008, : 216 - +
  • [7] Towards a multilayered permission-based access control for extending Android security
    Chang, Rui
    Jiang, Liehui
    Chen, Wenzhi
    He, Hongqi
    Yang, Shuiqiao
    Jiang, Hang
    Liu, Wei
    Liu, Yong
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (05):
  • [8] Drivers and barriers of permission-based marketing
    Bhatia, Vinita
    JOURNAL OF RESEARCH IN INTERACTIVE MARKETING, 2020, 14 (01) : 51 - 70
  • [9] Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model
    Aftab, Muhammad Umar
    Qin, Zhiguang
    Hundera, Negalign Wake
    Ariyo, Oluwasanmi
    Zakria
    Ngo Tung Son
    Dinh, Tran Van
    SYMMETRY-BASEL, 2019, 11 (05):
  • [10] Generating Permission-Based Security Policies
    Li, Xin
    Hua Vy Le Thanh
    Deng, Yuxin
    Dolby, Julian
    2018 5TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND THEIR APPLICATIONS (DSA), 2018, : 1 - 7