A survey on the use of access permission-based specifications for program verification

被引:2
|
作者
Sadiq, Ayesha [1 ]
Li, Yuan-Fang [1 ]
Ling, Sea [1 ]
机构
[1] Monash Univ, Fac Informat Technol, Clayton, Vic, Australia
关键词
Access permissions; Program verification; Concurrency; Protocol verification; Permission inference; Survey; CONCURRENCY; DISCIPLINE; CHECKING; LANGUAGE; SYSTEM; LOGIC;
D O I
10.1016/j.jss.2019.110450
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Verifying the correctness and reliability of imperative and object-oriented programs is one of the grand challenges in computer science. In imperative programming models, programmers introduce concurrency manually by using explicit concurrency constructs such as multi-threading. Multi-threaded programs are prone to synchronization problems such as data races and dead-locks, and verifying API protocols in object-oriented programs is a non-trivial task due to improper and unexpected state transition at run time. This is in part due to the unexpected sharing of program states in such programs. With these considerations in mind, access permissions have been investigated as a means to reasoning about the correctness of such programs. Access permissions are abstract capabilities that characterize the way a shared resource can be accessed by multiple references. This paper provides a comprehensive survey of existing access permission-based verification approaches. We describe different categories of permissions and permission-based contracts. We elaborate how permission-based specifications have been used to ensure compliance of API protocols and to avoid synchronization problems in concurrent programs. We compare existing approaches based on permission usage, analysis performed, language and/or tool supported, and properties being verified. Finally, we provide insight into the research challenges posed by existing approaches and suggest future directions. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页数:25
相关论文
共 50 条
  • [31] SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures
    Chen, Jing
    Chen, Jiong
    He, Kun
    Du, Ruiying
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 115 : 448 - 458
  • [32] Permission-based fault-tolerant distributed mutual exclusion algorithm
    Jayaprakash, S
    Muthukrishnan, CR
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 1999, 14 (01): : 51 - 60
  • [33] PERMISSION-BASED ELECTRONIC MAIL FACTORS FROM RECIPIENT'S PERSPECTIVE
    Torkaman, Saeid
    Mohamed, Norshidah
    INTERNATIONAL JOURNAL OF MANAGEMENT STUDIES, 2015, 22 : 1 - 19
  • [34] Permission-Based Feature Scaling Method for Lightweight Android Malware Detection
    Zhu, Dali
    Xi, Tong
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, KSEM 2019, PT I, 2019, 11775 : 714 - 725
  • [35] AEMINIUM: A Permission-Based Concurrent-by-Default Programming Language Approach
    Stork, Sven
    Naden, Karl
    Sunshine, Joshua
    Mohr, Manuel
    Fonseca, Alcides
    Marques, Paulo
    Aldrich, Jonathan
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2014, 36 (01):
  • [36] A static analysis approach for Android permission-based malware detection systems
    Arif, Juliza Mohamad
    Ab Razak, Mohd Faizal
    Awang, Suryanti
    Mat, Sharfah Ratibah Tuan
    Ismail, Nor Syahidatul Nadiah
    Firdaus, Ahmad
    PLOS ONE, 2021, 16 (09):
  • [37] BotDroid: Permission-Based Android Botnet Detection Using Neural Networks
    Seraj, Saeed
    Pimenidis, Elias
    Pavlidis, Michalis
    Kapetanakis, Stelios
    Trovati, Marcello
    Polatidis, Nikolaos
    24TH INTERNATIONAL CONFERENCE ON ENGINEERING APPLICATIONS OF NEURAL NETWORKS, EAAAI/EANN 2023, 2023, 1826 : 71 - 84
  • [38] Exploring and modelling digital natives' intention to use permission-based location-aware mobile advertising
    Richard, James
    Meuli, Paul
    JOURNAL OF MARKETING MANAGEMENT, 2013, 29 (5-6) : 698 - 719
  • [39] PHRiMA: A permission-based hybrid risk management framework for android apps
    Hu, Xinwen
    Zhuang, Yi
    COMPUTERS & SECURITY, 2020, 94
  • [40] Permission-based Index Clustering for Secure Multi-User Search
    Micheli, Eirini C.
    Margaritis, Giorgos
    Anastasiadis, Stergios V.
    TRANSACTIONS ON DATA PRIVACY, 2015, 8 (01) : 29 - 53