Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Datalog Static Analysis in Secrecy

Full metadata record
DC Field Value Language
dc.contributor.authorKouhounestani, Mojgan-
dc.contributor.authorLee, Woosuk-
dc.date.accessioned2022-12-20T05:51:24Z-
dc.date.available2022-12-20T05:51:24Z-
dc.date.issued2022-05-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/111320-
dc.description.abstractWe present a secure static-analysis-as-a-service (SaaaS) system where a client may outsource static analysis to the cloud. To address copyright concerns associated with SaaaS, clients are allowed to encrypt the source code of a target program and upload it to the cloud. Our goal is to secure the privacy of the design and implementation of static analysis as well as the source code of the target program. Considering a family of static analyses written in Datalog, we propose a generic protocol that combines homomorphic encryption (HE) with secure two-party computation to manage the huge cost of HE operations. The server occasionally delegates sub-parts of analysis which are costly in the cipher-world to the client without exposing the design of analysis. During server-client interactions, the information of both sides (client and server) is not leaked to the opposite. We evaluated our system on two static analyses in Datalog in secrecy, which have not been feasible using the previous techniques. For example, Andersen pointer analysis is completed in an average of 45 mins for 14 C programs comprising up to 1.6 KLoC.-
dc.format.extent14-
dc.language영어-
dc.language.isoENG-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.titleDatalog Static Analysis in Secrecy-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1109/ACCESS.2022.3177841-
dc.identifier.scopusid2-s2.0-85130824766-
dc.identifier.wosid000804620600001-
dc.identifier.bibliographicCitationIEEE Access, v.10, pp 56179 - 56192-
dc.citation.titleIEEE Access-
dc.citation.volume10-
dc.citation.startPage56179-
dc.citation.endPage56192-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusC (programming language)-
dc.subject.keywordPlusCodes (symbols)-
dc.subject.keywordPlusCost benefit analysis-
dc.subject.keywordPlusPrivacy-preserving techniques-
dc.subject.keywordPlusSoftware as a service (SaaS)-
dc.subject.keywordPlusWeb services-
dc.subject.keywordAuthorStatic analysis-
dc.subject.keywordAuthorServers-
dc.subject.keywordAuthorProtocols-
dc.subject.keywordAuthorCryptography-
dc.subject.keywordAuthorCodes-
dc.subject.keywordAuthorHomomorphic encryption-
dc.subject.keywordAuthorCosts-
dc.subject.keywordAuthorDatalog-
dc.subject.keywordAuthorhomomorphic encryption-
dc.subject.keywordAuthorprivacy-preserving software-as-a-service-
dc.subject.keywordAuthorstatic analysis-
dc.subject.keywordAuthorsecure two-party computation-
dc.identifier.urlhttps://ieeexplore.ieee.org/document/9781390-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Woo suk photo

Lee, Woo suk
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE