A survey on the use of access permission-based specifications for program verification

被引:2
|
作者
Sadiq, Ayesha [1 ]
Li, Yuan-Fang [1 ]
Ling, Sea [1 ]
机构
[1] Monash Univ, Fac Informat Technol, Clayton, Vic, Australia
关键词
Access permissions; Program verification; Concurrency; Protocol verification; Permission inference; Survey; CONCURRENCY; DISCIPLINE; CHECKING; LANGUAGE; SYSTEM; LOGIC;
D O I
10.1016/j.jss.2019.110450
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Verifying the correctness and reliability of imperative and object-oriented programs is one of the grand challenges in computer science. In imperative programming models, programmers introduce concurrency manually by using explicit concurrency constructs such as multi-threading. Multi-threaded programs are prone to synchronization problems such as data races and dead-locks, and verifying API protocols in object-oriented programs is a non-trivial task due to improper and unexpected state transition at run time. This is in part due to the unexpected sharing of program states in such programs. With these considerations in mind, access permissions have been investigated as a means to reasoning about the correctness of such programs. Access permissions are abstract capabilities that characterize the way a shared resource can be accessed by multiple references. This paper provides a comprehensive survey of existing access permission-based verification approaches. We describe different categories of permissions and permission-based contracts. We elaborate how permission-based specifications have been used to ensure compliance of API protocols and to avoid synchronization problems in concurrent programs. We compare existing approaches based on permission usage, analysis performed, language and/or tool supported, and properties being verified. Finally, we provide insight into the research challenges posed by existing approaches and suggest future directions. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页数:25
相关论文
共 50 条
  • [41] A simple R-UAV permission-based distributed mutual exclusion in FANET
    Ashish Singh Parihar
    Swarnendu Kumar Chakraborty
    Wireless Networks, 2022, 28 : 779 - 795
  • [42] A simple R-UAV permission-based distributed mutual exclusion in FANET
    Parihar, Ashish Singh
    Chakraborty, Swarnendu Kumar
    WIRELESS NETWORKS, 2022, 28 (02) : 779 - 795
  • [43] Permission-Based E-Mail Marketing Websites Success: An Integrated Perspective
    Lin, Hsin-Hui
    Li, Hsien-Ta
    Wang, Yi-Shun
    JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2015, 23 (02) : 1 - 23
  • [44] Permission-based Android malware analysis by using dimension reduction with PCA and LDA
    Sahin, Durmus Ozkan
    Kural, Oguz Emre
    Akleylek, Sedat
    Kilic, Erdal
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [45] Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android
    Bartel, Alexandre
    Klein, Jacques
    Le Traon, Yves
    Monperrus, Martin
    2012 PROCEEDINGS OF THE 27TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2012, : 274 - 277
  • [46] Permission-based Analysis of Android Applications Using Categorization and Deep Learning Scheme
    Alimardani, Hamidreza
    Nazeh, Mohammed
    ENGINEERING APPLICATION OF ARTIFICIAL INTELLIGENCE CONFERENCE 2018 (EAAIC 2018), 2019, 255
  • [47] Permission-based ownership: Encapsulating state in higher-order typed languages
    Krishnaswami, N
    Aldrich, J
    ACM SIGPLAN NOTICES, 2005, 40 (06) : 96 - 106
  • [48] Injecting a Permission-based Delegation Model to Secure Web-based Workflow Systems
    Wang, Xiaoran
    Bayrak, Coskun
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 101 - 106
  • [49] Permission-Based Malware Detection System for Android Using Machine Learning Techniques
    Arslan, Recep Sinan
    Dogru, Ibrahim Alper
    Barisci, Necaattin
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2019, 29 (01) : 43 - 61
  • [50] Trustless, Censorship-Resilient and Scalable Votings in the Permission-Based Blockchain Model
    Gajek, Sebastian
    Lewandowsky, Marco
    EURO-PAR 2020: PARALLEL PROCESSING WORKSHOPS, 2021, 12480 : 54 - 65