{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T05:24:05Z","timestamp":1776317045621,"version":"3.50.1"},"reference-count":53,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T00:00:00Z","timestamp":1517788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2018,5,31]]},"abstract":"<jats:p>Non-interference happens when some elements of a dynamic system do not interfere, i.e., do not affect, other elements in the same system. Originally introduced in language-based security, non-interference means that the manipulation of private information has no effect on public observations of data. In this article, we introduce<jats:italic>abstract non-interference<\/jats:italic>as a weakening of non-interference by abstract interpretation. Abstract non-interference is parametric on which private information we want to protect and which are the observational capabilities of the external observer, i.e., what the attacker can observe of a computation and of the data manipulated during the computation. This allows us to model a variety of situations in information-flow security, where the security of a system can be mastered by controlling the degree of precision of the strongest harmless attacker and the properties that are potentially leaked in case of successful attack.<\/jats:p>","DOI":"10.1145\/3175660","type":"journal-article","created":{"date-parts":[[2018,2,6]],"date-time":"2018-02-06T18:13:28Z","timestamp":1517940808000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Abstract Non-Interference"],"prefix":"10.1145","volume":"21","author":[{"given":"Roberto","family":"Giacobazzi","sequence":"first","affiliation":[{"name":"University of Verona 8 IMDEA SW Institute"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1213-536X","authenticated-orcid":false,"given":"Isabella","family":"Mastroeni","sequence":"additional","affiliation":[{"name":"University of Verona, Italy"}]}],"member":"320","published-online":{"date-parts":[[2018,2,5]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Open Web Application Security Project (OWASP). 2016. Retrieved November 13 2016 from https:\/\/www.owasp.org. Open Web Application Security Project (OWASP). 2016. Retrieved November 13 2016 from https:\/\/www.owasp.org."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.31"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"A. Askarov and A. C. Myers. 2011. Attacker control and impact for confidentiality and integrity. Logical Methods in Computer Science 7 3 (2011). A. Askarov and A. C. Myers. 2011. Attacker control and impact for confidentiality and integrity. Logical Methods in Computer Science 7 3 (2011).","DOI":"10.2168\/LMCS-7(3:17)2011"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.22"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1255329.1255339"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009889"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2166956.2166962"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1985581.1985592"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.20"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"F. Bellini R. Chiodi and I. Mastroeni . 2016 . MIME - A formal approach for multiple investigation in (android) malware emulation analysis. In Proceedings of the 8th International Symposium on Foundation and Practice of Security (FPS\u201915) Lecture Notes in Computer Science Vol. 9482 . Springer 259--267. F. Bellini R. Chiodi and I. Mastroeni. 2016. MIME - A formal approach for multiple investigation in (android) malware emulation analysis. In Proceedings of the 8th International Symposium on Foundation and Practice of Security (FPS\u201915) Lecture Notes in Computer Science Vol. 9482. Springer 259--267.","DOI":"10.1007\/978-3-319-30303-1_16"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2006.04.007"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1554339.1554352"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-008-0058-x"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"S. Buro and I. Mastroeni . 2018 . Abstract code injection - A semantic approach based on abstract non-interference. In Proceedings of the 19th International Conference on Verification Model Checking and Abstract Interpretation (VMCAI\u201918) Lecture Notes in Computer Science . Springer-Verlag . To appear. S. Buro and I. Mastroeni. 2018. Abstract code injection - A semantic approach based on abstract non-interference. In Proceedings of the 19th International Conference on Verification Model Checking and Abstract Interpretation (VMCAI\u201918) Lecture Notes in Computer Science. Springer-Verlag. To appear.","DOI":"10.1007\/978-3-319-73721-8_6"},{"key":"e_1_2_1_15_1","volume-title":"Foundations of Secure Computation","author":"Cohen E. S.","unstructured":"E. S. Cohen . 1978. Information transmission in sequential programs . In Foundations of Secure Computation , DeMillo et al. (Ed.). Academic Press , New York , 297--335. E. S. Cohen. 1978. Information transmission in sequential programs. In Foundations of Secure Computation, DeMillo et al. (Ed.). Academic Press, New York, 297--335."},{"key":"e_1_2_1_16_1","doi-asserted-by":"crossref","unstructured":"P. Cousot. 2001. Abstract interpretation based formal methods and future challenges. In Informatics - 10 Years Back. 10 Years Ahead. 138--156. P. Cousot. 2001. Abstract interpretation based formal methods and future challenges. In Informatics - 10 Years Back. 10 Years Ahead. 138--156.","DOI":"10.1007\/3-540-44577-3_10"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(00)00313-3"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2140\/pjm.1979.82.43"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/567752.567778"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503290"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2011.08.033"},{"key":"e_1_2_1_23_1","unstructured":"B. A. Davey and H. A. Priestley. 1990. Introduction to Lattices and Order. Cambridge University Press Cambridge UK. B. A. Davey and H. A. Priestley. 1990. Introduction to Lattices and Order. Cambridge University Press Cambridge UK."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964017"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1841962.1841965"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exp053"},{"key":"e_1_2_1_27_1","doi-asserted-by":"crossref","unstructured":"R. Giacobazzi and F. Ranzato . 1997 . Refining and compressing abstract domains. In Proceedings of the 24th International Colloquium on Automata Languages and Programming (ICALP\u201997) Lecture Notes in Computer Science Vol. 1256 P. Degano R. Gorrieri and A. Marchetti-Spaccamela (Eds.). Springer-Verlag Berlin 771--781. R. Giacobazzi and F. Ranzato. 1997. Refining and compressing abstract domains. In Proceedings of the 24th International Colloquium on Automata Languages and Programming (ICALP\u201997) Lecture Notes in Computer Science Vol. 1256 P. Degano R. Gorrieri and A. Marchetti-Spaccamela (Eds.). Springer-Verlag Berlin 771--781.","DOI":"10.1007\/3-540-63165-8_230"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/333979.333989"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy. IEEE Comp. Soc. Press","author":"Goguen J. A.","unstructured":"J. A. Goguen and J. Meseguer . 1982. Security policies and security models . In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Comp. Soc. Press , Los Alamitos, CA, 11--20. J. A. Goguen and J. Meseguer. 1982. Security policies and security models. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Comp. Soc. Press, Los Alamitos, CA, 11--20."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11547662_13"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655148.1655151"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040319"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/11575467_27"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1787526.1787542"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.129.4"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1017\/S096012951100020X"},{"key":"e_1_2_1_37_1","doi-asserted-by":"crossref","unstructured":"I. Mastroeni and D. Nikolic . 2010 . Abstract program slicing: From theory towards an implementation. In Proceedings of the 12th International Conference on Formal Engineering Methods (ICFEM\u201910) Lecture Notes in Computer Science Vol. 6447 . Springer 452--467. I. Mastroeni and D. Nikolic. 2010. Abstract program slicing: From theory towards an implementation. In Proceedings of the 12th International Conference on Formal Engineering Methods (ICFEM\u201910) Lecture Notes in Computer Science Vol. 6447. Springer 452--467.","DOI":"10.1007\/978-3-642-16901-4_30"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the Static Analysis Symposium (SAS\u201917)","volume":"10422","author":"Mastroeni I.","unstructured":"I. Mastroeni and M. Pasqua . 2017. Hyperhierarchy of semantics - A formal framework for hyperproperties verification . In Proceedings of the Static Analysis Symposium (SAS\u201917) , Vol. 10422 . Springer, 232--252. I. Mastroeni and M. Pasqua. 2017. Hyperhierarchy of semantics - A formal framework for hyperproperties verification. In Proceedings of the Static Analysis Symposium (SAS\u201917), Vol. 10422. Springer, 232--252."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328408.1328428"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029052"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10990-006-8609-1"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1137\/0216062"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103678"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_2_1_45_1","doi-asserted-by":"crossref","unstructured":"A. Sabelfeld and A. C. Myers . 2004 . A model for delimited information release. In Proceedings of the International Symposium on Software Security (ISSS\u201903) Lecture Notes in Computer Science Vol. 3233 N. Yonezaki K. Futatsugi F. Mizoguchi (Ed.). Springer-Verlag Berlin 174--191. A. Sabelfeld and A. C. Myers. 2004. A model for delimited information release. In Proceedings of the International Symposium on Software Security (ISSS\u201903) Lecture Notes in Computer Science Vol. 3233 N. Yonezaki K. Futatsugi F. Mizoguchi (Ed.). Springer-Verlag Berlin 174--191.","DOI":"10.1007\/978-3-540-37621-7_9"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011553200337"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/1662658.1662659"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.41"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.28"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"e_1_2_1_51_1","volume-title":"The Formal Semantics of Programming Languages: An Introduction","author":"Winskel G.","unstructured":"G. Winskel . 1993. The Formal Semantics of Programming Languages: An Introduction . MIT Press, Cambridge , MA. G. Winskel. 1993. The Formal Semantics of Programming Languages: An Introduction. MIT Press, Cambridge, MA."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2008.19"},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the IEEE Computer Security Foundations Workshop. IEEE Comput. Soc. Press","author":"Zdancewic S.","unstructured":"S. Zdancewic and A. C. Myers . 2001. Robust declassification . In Proceedings of the IEEE Computer Security Foundations Workshop. IEEE Comput. Soc. Press , Los Alamitos, CA, 15--23. S. Zdancewic and A. C. Myers. 2001. Robust declassification. In Proceedings of the IEEE Computer Security Foundations Workshop. IEEE Comput. Soc. Press, Los Alamitos, CA, 15--23."}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3175660","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3175660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:49Z","timestamp":1750273489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3175660"}},"subtitle":["A Unifying Framework for Weakening Information-flow"],"short-title":[],"issued":{"date-parts":[[2018,2,5]]},"references-count":53,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,5,31]]}},"alternative-id":["10.1145\/3175660"],"URL":"https:\/\/doi.org\/10.1145\/3175660","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"value":"2471-2566","type":"print"},{"value":"2471-2574","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,5]]},"assertion":[{"value":"2017-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-02-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}