A survey on the use of access permission-based specifications for program verification

被引:2
|
作者
Sadiq, Ayesha [1 ]
Li, Yuan-Fang [1 ]
Ling, Sea [1 ]
机构
[1] Monash Univ, Fac Informat Technol, Clayton, Vic, Australia
关键词
Access permissions; Program verification; Concurrency; Protocol verification; Permission inference; Survey; CONCURRENCY; DISCIPLINE; CHECKING; LANGUAGE; SYSTEM; LOGIC;
D O I
10.1016/j.jss.2019.110450
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Verifying the correctness and reliability of imperative and object-oriented programs is one of the grand challenges in computer science. In imperative programming models, programmers introduce concurrency manually by using explicit concurrency constructs such as multi-threading. Multi-threaded programs are prone to synchronization problems such as data races and dead-locks, and verifying API protocols in object-oriented programs is a non-trivial task due to improper and unexpected state transition at run time. This is in part due to the unexpected sharing of program states in such programs. With these considerations in mind, access permissions have been investigated as a means to reasoning about the correctness of such programs. Access permissions are abstract capabilities that characterize the way a shared resource can be accessed by multiple references. This paper provides a comprehensive survey of existing access permission-based verification approaches. We describe different categories of permissions and permission-based contracts. We elaborate how permission-based specifications have been used to ensure compliance of API protocols and to avoid synchronization problems in concurrent programs. We compare existing approaches based on permission usage, analysis performed, language and/or tool supported, and properties being verified. Finally, we provide insight into the research challenges posed by existing approaches and suggest future directions. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页数:25
相关论文
共 50 条
  • [21] Towards Formal Analysis of the Permission-based Security Model for Android
    Shin, Wook
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    ICWMC: 2009 FIFTH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMMUNICATIONS, 2009, : 87 - 92
  • [22] FOCUSING ON THE CUSTOMER: MOBILE MARKETING AS A TOOL FOR PERMISSION-BASED RELATIONSHIPS
    Zegreanu, Patricia
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, VOL 2, 2011, : 293 - 296
  • [23] APK Auditor: Permission-based Android malware detection system
    Kabakus, Abdullah Talha
    Alper, Dogru Ibrahim
    Aydin, Cetin
    DIGITAL INVESTIGATION, 2015, 13 : 1 - 14
  • [24] The Permission-Based Malicious Behaviors Monitoring Model for the Android OS
    Park, Min-Woo
    Choi, Young-Hyun
    Eom, Jung-Ho
    Chung, Tai-Myoung
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, PT I, 2013, 7971 : 382 - 395
  • [25] PFESG: Permission-based Android Malware Feature Extraction Algorithm
    Wang, Chengcheng
    Lan, Yuqing
    PROCEEDINGS OF 2017 VI INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2017), 2017, : 106 - 109
  • [26] PERMISSION-BASED SEPARATION LOGIC FOR MESSAGE-PASSING CONCURRENCY
    Francalanza, Adrian
    Rathke, Julian
    Sassone, Vladimiro
    LOGICAL METHODS IN COMPUTER SCIENCE, 2011, 7 (03)
  • [27] API and Permission-based Classification System for Android Malware Analysis
    Park, Jungsoo
    Chun, Hojin
    Jung, Souhwan
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 930 - 935
  • [28] Formal Analysis of Android's Permission-Based Security Model
    Betarte, Gustavo
    Campo, Juan
    Luna, Carlos
    Romano, Agustin
    SCIENTIFIC ANNALS OF COMPUTER SCIENCE, 2016, 26 (01) : 27 - 68
  • [29] Enablers and inhibitors of permission-based marketing: A case of mobile coupons
    Hyunjoo Im
    Ha, Young
    JOURNAL OF RETAILING AND CONSUMER SERVICES, 2013, 20 (05) : 495 - 503
  • [30] Permission-based Risk Signals for App Behaviour Characterization in Android Apps
    Olukoya, Oluwafemi
    Mackenzie, Lewis
    Omoronyia, Inah
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 183 - 192