Datalog Static Analysis in Secrecy
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kouhounestani, Mojgan | - |
dc.contributor.author | Lee, Woosuk | - |
dc.date.accessioned | 2022-12-20T05:51:24Z | - |
dc.date.available | 2022-12-20T05:51:24Z | - |
dc.date.issued | 2022-05 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/111320 | - |
dc.description.abstract | We present a secure static-analysis-as-a-service (SaaaS) system where a client may outsource static analysis to the cloud. To address copyright concerns associated with SaaaS, clients are allowed to encrypt the source code of a target program and upload it to the cloud. Our goal is to secure the privacy of the design and implementation of static analysis as well as the source code of the target program. Considering a family of static analyses written in Datalog, we propose a generic protocol that combines homomorphic encryption (HE) with secure two-party computation to manage the huge cost of HE operations. The server occasionally delegates sub-parts of analysis which are costly in the cipher-world to the client without exposing the design of analysis. During server-client interactions, the information of both sides (client and server) is not leaked to the opposite. We evaluated our system on two static analyses in Datalog in secrecy, which have not been feasible using the previous techniques. For example, Andersen pointer analysis is completed in an average of 45 mins for 14 C programs comprising up to 1.6 KLoC. | - |
dc.format.extent | 14 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Datalog Static Analysis in Secrecy | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/ACCESS.2022.3177841 | - |
dc.identifier.scopusid | 2-s2.0-85130824766 | - |
dc.identifier.wosid | 000804620600001 | - |
dc.identifier.bibliographicCitation | IEEE Access, v.10, pp 56179 - 56192 | - |
dc.citation.title | IEEE Access | - |
dc.citation.volume | 10 | - |
dc.citation.startPage | 56179 | - |
dc.citation.endPage | 56192 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | C (programming language) | - |
dc.subject.keywordPlus | Codes (symbols) | - |
dc.subject.keywordPlus | Cost benefit analysis | - |
dc.subject.keywordPlus | Privacy-preserving techniques | - |
dc.subject.keywordPlus | Software as a service (SaaS) | - |
dc.subject.keywordPlus | Web services | - |
dc.subject.keywordAuthor | Static analysis | - |
dc.subject.keywordAuthor | Servers | - |
dc.subject.keywordAuthor | Protocols | - |
dc.subject.keywordAuthor | Cryptography | - |
dc.subject.keywordAuthor | Codes | - |
dc.subject.keywordAuthor | Homomorphic encryption | - |
dc.subject.keywordAuthor | Costs | - |
dc.subject.keywordAuthor | Datalog | - |
dc.subject.keywordAuthor | homomorphic encryption | - |
dc.subject.keywordAuthor | privacy-preserving software-as-a-service | - |
dc.subject.keywordAuthor | static analysis | - |
dc.subject.keywordAuthor | secure two-party computation | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/9781390 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.