Publications

Detailed Information

Static analysis with Set-Closure in secrecy

Cited 0 time in Web of Science Cited 4 time in Scopus
Authors

Lee, W.; Hong, H.; Yi, K.; Cheon, J.H.

Issue Date
2015
Publisher
Springer Verlag
Citation
Lecture Notes in Computer Science, Vol.9291, pp.18-35
Abstract
We report that the homomorphic encryption scheme can unleash the possibility of static analysis of encrypted programs. Static analysis in cipher-world is desirable in the static-analysis-as-a-service setting, because it allows the program owners to encrypt and upload their programs to the static analysis service while the service provider can still analyze the encrypted programs without decrypting them. Only the owner of the decryption key (the program owner) is able to decrypt the analysis result. As a concrete example, we describe how to perform a pointer analysis in secrecy. In our method, a somewhat homomorphic encryption scheme of depth O(logm) is able to evaluate a simple pointer analysis with O(logm) homomorphic matrix multiplications, for the number m of pointer variables when the maximal pointer level is bounded. We also demonstrate the viability of our method by implementing the pointer analysis in secrecy. © Springer-Verlag Berlin Heidelberg 2015.
ISSN
0302-9743
URI
https://hdl.handle.net/10371/192920
Files in This Item:
There are no files associated with this item.
Appears in Collections:

Altmetrics

Item View & Download Count

  • mendeley

Items in S-Space are protected by copyright, with all rights reserved, unless otherwise indicated.

Share