DOI: 10.1007/978-3-540-69166-2_1
|View full text |Cite
|
Sign up to set email alerts
|

Transforming Abstract Interpretations by Abstract Interpretation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
26
0

Publication Types

Select...
5
1

Relationship

5
1

Authors

Journals

citations
Cited by 16 publications
(26 citation statements)
references
References 18 publications
0
26
0
Order By: Relevance
“…This means that there exist the closest complete approximations from above and from below of any given (possibly incomplete) semantics. For any f ∈ C m −→ C and η, ρ ∈ uco(C) define: One of the major achievements in [29] is the construction of a symmetric family of semantics transformers which induce maximal incompleteness. These are the adjoint operations associated with F ↓ and F ↑ , see Figure 1:…”
Section: Semantic Completenessmentioning
confidence: 99%
See 3 more Smart Citations
“…This means that there exist the closest complete approximations from above and from below of any given (possibly incomplete) semantics. For any f ∈ C m −→ C and η, ρ ∈ uco(C) define: One of the major achievements in [29] is the construction of a symmetric family of semantics transformers which induce maximal incompleteness. These are the adjoint operations associated with F ↓ and F ↑ , see Figure 1:…”
Section: Semantic Completenessmentioning
confidence: 99%
“…All transformed semantics can be made monotone without afflicting minimality and completeness, see [29] for details. In this case, when they exist,…”
Section: Semantic Completenessmentioning
confidence: 99%
See 2 more Smart Citations
“…We show how obfuscation can be viewed as a program transformation making abstractions incomplete and at the same time we show how watermark extraction can be viewed as a complete abstract interpretation against a secret program property, extending abstract watermarking [5] to any watermarking method. Both obfuscation and watermarking can be specified as transformers to achieve completeness/incompleteness in abstract interpretation [7], provided that the transformed code does not interfere with the expected input/output behaviour of programs. This latter correctness criteria can be again specified as a completeness problem by considering abstract non-interference [6] as the method for controlling information leakage in obfuscation and steganography.…”
mentioning
confidence: 99%