Publications

Detailed Information

Static analysis with Set-Closure in secrecy

DC Field Value Language
dc.contributor.authorLee, W.-
dc.contributor.authorHong, H.-
dc.contributor.authorYi, K.-
dc.contributor.authorCheon, J.H.-
dc.date.accessioned2023-06-27T06:39:05Z-
dc.date.available2023-06-27T06:39:05Z-
dc.date.created2023-06-19-
dc.date.issued2015-
dc.identifier.citationLecture Notes in Computer Science, Vol.9291, pp.18-35-
dc.identifier.issn0302-9743-
dc.identifier.urihttps://hdl.handle.net/10371/192920-
dc.description.abstractWe report that the homomorphic encryption scheme can unleash the possibility of static analysis of encrypted programs. Static analysis in cipher-world is desirable in the static-analysis-as-a-service setting, because it allows the program owners to encrypt and upload their programs to the static analysis service while the service provider can still analyze the encrypted programs without decrypting them. Only the owner of the decryption key (the program owner) is able to decrypt the analysis result. As a concrete example, we describe how to perform a pointer analysis in secrecy. In our method, a somewhat homomorphic encryption scheme of depth O(logm) is able to evaluate a simple pointer analysis with O(logm) homomorphic matrix multiplications, for the number m of pointer variables when the maximal pointer level is bounded. We also demonstrate the viability of our method by implementing the pointer analysis in secrecy. © Springer-Verlag Berlin Heidelberg 2015.-
dc.language영어-
dc.publisherSpringer Verlag-
dc.titleStatic analysis with Set-Closure in secrecy-
dc.typeArticle-
dc.citation.journaltitleLecture Notes in Computer Science-
dc.identifier.scopusid2-s2.0-84946086911-
dc.citation.endpage35-
dc.citation.startpage18-
dc.citation.volume9291-
dc.description.isOpenAccessN-
dc.contributor.affiliatedAuthorYi, K.-
dc.contributor.affiliatedAuthorCheon, J.H.-
dc.description.journalClass1-
Appears in Collections:
Files in This Item:
There are no files associated with this item.

Altmetrics

Item View & Download Count

  • mendeley

Items in S-Space are protected by copyright, with all rights reserved, unless otherwise indicated.

Share