{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:06:32Z","timestamp":1762459592560,"version":"3.41.0"},"publisher-location":"Berlin, Heidelberg","reference-count":47,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662564981"},{"type":"electronic","value":"9783662564998"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-662-56499-8_6","type":"book-chapter","created":{"date-parts":[[2018,1,27]],"date-time":"2018-01-27T12:53:13Z","timestamp":1517057593000},"page":"98-135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Combining Symbolic and Numerical Domains for Information Leakage Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0946-5440","authenticated-orcid":false,"given":"Agostino","family":"Cortesi","sequence":"first","affiliation":[]},{"given":"Pietro","family":"Ferrara","sequence":"additional","affiliation":[]},{"given":"Raju","family":"Halder","sequence":"additional","affiliation":[]},{"given":"Matteo","family":"Zanioli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,28]]},"reference":[{"key":"6_CR1","unstructured":"Andersen, H.R.: An introduction to binary decision diagrams. Technical report, Course Notes on the WWW (1997)"},{"key":"6_CR2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/S0167-6423(96)00039-1","volume":"31","author":"T Armstrong","year":"1998","unstructured":"Armstrong, T., Marriott, K., Schachte, P., S\u00f8ndergaard, H.: Two classes of boolean functions for dependency analysis. Sci. Comput. Program. 31, 3\u201345 (1998)","journal-title":"Sci. Comput. Program."},{"key":"6_CR3","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.tcs.2008.04.028","volume":"402","author":"A Askarov","year":"2008","unstructured":"Askarov, A., Hedin, D., Sabelfeld, A.: Cryptographically-masked flows. Theor. Comput. Sci. 402, 82\u2013101 (2008)","journal-title":"Theor. Comput. Sci."},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/11555827_12","volume-title":"Computer Security \u2013 ESORICS 2005","author":"A Askarov","year":"2005","unstructured":"Askarov, A., Sabelfeld, A.: Security-typed languages for implementation of cryptographic protocols: a case study. In: di Vimercati, S.C., Syverson, P., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 197\u2013221. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11555827_12"},{"key":"6_CR5","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.scico.2007.08.001","volume":"72","author":"R Bagnara","year":"2008","unstructured":"Bagnara, R., Hill, P.M., Zaffanella, E.: The parma polyhedra library: toward a complete set of numerical abstractions for the analysis and verification of hardware and software systems. Sci. Comput. Program. 72, 3\u201321 (2008)","journal-title":"Sci. Comput. Program."},{"key":"6_CR6","doi-asserted-by":"crossref","first-page":"4672","DOI":"10.1016\/j.tcs.2009.07.033","volume":"410","author":"R Bagnara","year":"2009","unstructured":"Bagnara, R., Hill, P.M., Zaffanella, E.: Applications of polyhedral computations to the analysis and verification of hardware and software systems. Theor. Comput. Sci. 410, 4672\u20134691 (2009)","journal-title":"Theor. Comput. Sci."},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Banerjee, A., Naumann, D.A.: Secure information flow and pointer confinement in a Java-like language. In: Proceedings of the 15th IEEE Workshop on Computer Security Foundations, CSFW 2002. IEEE Computer Society, Washington, DC (2002)","DOI":"10.1109\/CSFW.2002.1021820"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Barthe, G., Rezk, T.: Non-interference for a JVM-like language. In: Proceedings of the 2005 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation, TLDI 2005, pp. 103\u2013112. ACM, New York (2005)","DOI":"10.1145\/1040294.1040304"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/3-540-44743-1_3","volume-title":"Parallel Computing Technologies","author":"C Bodei","year":"2001","unstructured":"Bodei, C., Degano, P., Nielson, F., Nielson, H.R.: Static analysis for secrecy and non-interference in networks of processes. In: Malyshkin, V. (ed.) PaCT 2001. LNCS, vol. 2127, pp. 27\u201341. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44743-1_3"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Clause, J., Li, W., Orso, A.: Dytan: a generic dynamic taint analysis framework. In: Proceedings of the 2007 International Symposium on Software Testing and Analysis, ISSTA 2007, pp. 196\u2013206. ACM, New York (2007)","DOI":"10.1145\/1273463.1273490"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Cortesi, A., Fil\u00e9, G., Winsborough, W.H.: Prop revisited: propositional formula as abstract domain for groundness analysis. In: LICS, pp. 322\u2013327 (1991)","DOI":"10.1109\/LICS.1991.151656"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-642-24559-6_34","volume-title":"Formal Methods and Software Engineering","author":"G Costantini","year":"2011","unstructured":"Costantini, G., Ferrara, P., Cortesi, A.: Static analysis of string values. In: Qin, S., Qiu, Z. (eds.) ICFEM 2011. LNCS, vol. 6991, pp. 505\u2013521. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24559-6_34"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Systematic design of program analysis frameworks. In: Proceedings of the 6th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, POPL 1979, pp. 269\u2013282. ACM, New York (1979)","DOI":"10.1145\/567752.567778"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Cousot, P., Halbwachs, N.: Automatic discovery of linear restraints among variables of a program. In: Proceedings of the 5th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, POPL 1978, pp. 84\u201396. ACM, New York (1978)","DOI":"10.1145\/512760.512770"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"De Groef, W., Devriese, D., Nikiforakis, N., Piessens, F.: FlowFox: a web browser with flexible and precise information flow control. In: Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012). ACM (2012)","DOI":"10.1145\/2382196.2382275"},{"key":"6_CR16","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"DE Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19, 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"key":"6_CR17","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"DE Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20, 504\u2013513 (1977)","journal-title":"Commun. ACM"},{"key":"6_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-642-13464-7_15","volume-title":"Formal Techniques for Distributed Systems","author":"P Ferrara","year":"2010","unstructured":"Ferrara, P.: Static type analysis of pattern matching by abstract interpretation. In: Hatcliff, J., Zucca, E. (eds.) FMOODS\/FORTE-2010. LNCS, vol. 6117, pp. 186\u2013200. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13464-7_15"},{"key":"6_CR19","unstructured":"Ferrara, P.: A fast and precise alias analysis for data race detection. In: Proceedings of the Third Workshop on Bytecode Semantics, Verification, Analysis and Transformation (Bytecode 2008), Electronic Notes in Theoretical Computer Science. Elsevier, April 2008"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Focardi, R., Centenaro, M.: Information flow security of multi-threaded distributed programs. In: Proceedings of the third ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS 2008, pp. 113\u2013124. ACM, New York (2008)","DOI":"10.1145\/1375696.1375711"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Giacobazzi, R., Mastroeni, I.: Abstract non-interference: parameterizing non-interference by abstract interpretation. In: Proceedings of the 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2004, pp. 186\u2013197. ACM, New York (2004)","DOI":"10.1145\/964001.964017"},{"key":"6_CR22","first-page":"123","volume":"38","author":"R Halder","year":"2012","unstructured":"Halder, R., Cortesi, A.: Abstract interpretation of database query languages. Comput. Lang. Syst. Struct. 38, 123\u2013157 (2012)","journal-title":"Comput. Lang. Syst. Struct."},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Halder, R., Cortesi, A.: Abstract program slicing of database query languages. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, Coimbra, Portugal, pp. 838\u2013845. ACM Press (2013)","DOI":"10.1145\/2480362.2480524"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Halder, R., Zanioli, M., Cortesi, A.: Information leakage analysis of database query languages. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing, Gyeongju, Korea, pp. 813\u2013820. ACM Press, 24\u201328 March 2014","DOI":"10.1145\/2554850.2554862"},{"key":"6_CR25","volume-title":"The Semantics of Programming Languages: An Elementary Introduction Using Structural Operational Semantics","author":"M Hennessy","year":"1990","unstructured":"Hennessy, M.: The Semantics of Programming Languages: An Elementary Introduction Using Structural Operational Semantics. Wiley, New York (1990)"},{"key":"6_CR26","unstructured":"Jeannet, B.: Convex polyhedra library, March 2002. Documentation of the \u201cNew Polka\u201d library. http:\/\/www.irisa.fr\/prive\/Bertrand.Jeannet\/newpolka.html"},{"key":"6_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/978-3-642-02658-4_52","volume-title":"Computer Aided Verification","author":"B Jeannet","year":"2009","unstructured":"Jeannet, B., Min\u00e9, A.: Apron: a library of numerical abstract domains for static analysis. In: Bouajjani, A., Maler, O. (eds.) CAV 2009. LNCS, vol. 5643, pp. 661\u2013667. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02658-4_52"},{"key":"6_CR28","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/S0167-6423(99)00024-6","volume":"37","author":"R Joshi","year":"2000","unstructured":"Joshi, R., Rustan, K., Leino, M.: A semantic approach to secure information flow. Sci. Comput. Program. 37, 113\u2013138 (2000)","journal-title":"Sci. Comput. Program."},{"key":"6_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/3-540-45309-1_6","volume-title":"Programming Languages and Systems","author":"P Laud","year":"2001","unstructured":"Laud, P.: Semantics and program analysis of computationally secure information flow. In: Sands, D. (ed.) ESOP 2001. LNCS, vol. 2028, pp. 77\u201391. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45309-1_6"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Liu, J.D., George, M.D., Vikram, K., Qi, X., Waye, L., Myers, A.C.: Fabric: a platform for secure distributed computation and storage. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP 2009, pp. 321\u2013334. ACM, New York (2009)","DOI":"10.1145\/1629575.1629606"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Liu, Y., Milanova, A.: Static information flow analysis with handling of implicit flows and a study on effects of implicit flows vs explicit flows. In: Proceedings of the 2010 14th European Conference on Software Maintenance and Reengineering, CSMR 2010, pp. 146\u2013155. IEEE Computer Society, Washington, DC (2010)","DOI":"10.1109\/CSMR.2010.26"},{"key":"6_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/3-540-44978-7_10","volume-title":"Programs as Data Objects","author":"A Min\u00e9","year":"2001","unstructured":"Min\u00e9, A.: A new numerical abstract domain based on difference-bound matrices. In: Danvy, O., Filinski, A. (eds.) PADO 2001. LNCS, vol. 2053, pp. 155\u2013172. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44978-7_10"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Min\u00e9, A.: The octagon abstract domain. In: Proceedings of the Workshop on Analysis, Slicing, and Transformation (AST 2001), pp. 310\u2013319. IEEE CS Press, October 2001","DOI":"10.1109\/WCRE.2001.957836"},{"key":"6_CR34","unstructured":"Myers, A.C., Zheng, L., Zdancewic, S., Chong, S., Nystrom, N.: JIF: Java information flow. Software release, July 2001\u20132004"},{"key":"6_CR35","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/596980.596983","volume":"25","author":"F Pottier","year":"2003","unstructured":"Pottier, F., Simonet, V.: Information flow inference for ML. ACM Trans. Program. Lang. Syst. 25, 117\u2013158 (2003)","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"1","key":"6_CR36","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1), 5\u201319 (2003)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"6_CR37","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1145\/514188.514190","volume":"24","author":"M Sagiv","year":"2002","unstructured":"Sagiv, M., Reps, T., Wilhelm, R.: Parametric shape analysis via 3-valued logic. ACM Trans. Program. Lang. Syst. 24, 217\u2013298 (2002)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"6_CR38","unstructured":"Simonet, V.: The flow Caml System: documentation and user\u2019s manual. Technical report 0282, Institut National de Recherche en Informatique et en Automatique (INRIA), July 2003"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Smith, G.: Principles of secure information flow analysis. In: Malware Detection, pp. 297\u2013307 (2007)","DOI":"10.1007\/978-0-387-44599-1_13"},{"key":"6_CR40","doi-asserted-by":"crossref","unstructured":"Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 1998, pp. 355\u2013364. ACM, New York (1998)","DOI":"10.1145\/268946.268975"},{"issue":"12","key":"6_CR41","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1145\/2096148.2034688","volume":"46","author":"D Stefan","year":"2011","unstructured":"Stefan, D., Russo, A., Mitchell, J.C., Mazi\u00e8res, D.: Flexible dynamic information flow control in Haskell. SIGPLAN Not. 46(12), 95\u2013106 (2011)","journal-title":"SIGPLAN Not."},{"key":"6_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/11535294_8","volume-title":"Parallel Computing Technologies","author":"TK Tolstrup","year":"2005","unstructured":"Tolstrup, T.K., Nielson, F., Nielson, H.R.: Information flow analysis for VHDL. In: Malyshkin, V. (ed.) PaCT 2005. LNCS, vol. 3606, pp. 79\u201398. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11535294_8"},{"key":"6_CR43","unstructured":"Stanford University. Stanford SecuriBench Micro. http:\/\/suif.stanford.edu\/~livshits\/work\/securibench-micro\/"},{"key":"6_CR44","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D Volpano","year":"1996","unstructured":"Volpano, D., Irvine, C., Smith, G.: A sound type system for secure flow analysis. J. Comput. Secur. 4, 167\u2013187 (1996)","journal-title":"J. Comput. Secur."},{"key":"6_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/978-3-642-18381-2_45","volume-title":"SOFSEM 2011: Theory and Practice of Computer Science","author":"M Zanioli","year":"2011","unstructured":"Zanioli, M., Cortesi, A.: Information leakage analysis by abstract interpretation. In: \u010cern\u00e1, I., Gyim\u00f3thy, T., Hromkovi\u010d, J., Jefferey, K., Kr\u00e1lovi\u0107, R., Vukoli\u0107, M., Wolf, S. (eds.) SOFSEM 2011. LNCS, vol. 6543, pp. 545\u2013557. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-18381-2_45"},{"key":"6_CR46","doi-asserted-by":"crossref","unstructured":"Zanioli, M., Ferrara, P., Cortesi, A.: Sails: static analysis of information leakage with sample. In: Proceedings of the 2012 ACM Symposium on Applied Computing, pp. 1308\u20131313. ACM Press (2012)","DOI":"10.1145\/2245276.2231983"},{"key":"6_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/3-540-45789-5_26","volume-title":"Static Analysis","author":"M Zanotti","year":"2002","unstructured":"Zanotti, M.: Security typings by abstract interpretation. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 360\u2013375. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45789-5_26"}],"container-title":["Lecture Notes in Computer Science","Transactions on Computational Science XXXI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-56499-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T01:24:40Z","timestamp":1751246680000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-56499-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783662564981","9783662564998"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-56499-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}