期刊文献+

可组合的描述符泄露类型检查

Compositional Type Checking of Descriptor Leaking
下载PDF
导出
摘要 应用程序通过操作系统的系统调用对文件描述符进行操作并管理文件资源。如果应用程序对资源描述符的管理出现错误并发生描述符泄漏,会严重影响系统的可用性。据此,提出了一种检查程序是否会导致描述符泄漏的类型系统,给出了描述符操作方法的语义和类型约束,证明了类型系统的可靠性定理。此外,还初步讨论了该类型系统在并发程序下的扩展。 Programs manage files, as a kind of resource, using system calls provided by operating systems to manipulate file descriptors. The availability of the system will be significantly degenerated if programs deal with file descriptors ar- bitrarily. We proposed a type system to check whether a program leaks some resource (typically, file) descriptors. We defined semantics for descriptor-related operations in sequential programs, and proved that the type system is sound with respect to our semantics. In addition, the extension of this type system with concurrent semantics was discussed.
作者 李沁 缪瑨
出处 《计算机科学》 CSCD 北大核心 2015年第10期184-188,共5页 Computer Science
基金 国家自然科学基金(61170070) 省教育厅科研项目(kj2012Z022) 国家科技支撑计划(2012BAK30B049-02) 安徽高校省级自然科学研究重大项目(KJ2014ZD05)资助
关键词 描述符泄露 类型检查 软件安全 Descriptor leaking, Type checking, Software safety
  • 相关文献

参考文献13

  • 1Albert E,et al. Resource Usage Analysis and Its Application toResource Certification[M] // Aldini V A,et al.,eds. Founda-tions of Security Analysis and Design. Springer Berlin Heidel-berg, 2009,5705 :258-288.
  • 2Albert E,et al. On the Inference of Resource Usage Upper andLower Bounds[J], ACM Trans. Comput. Logic, 2013,14(3) : 1-35.
  • 3Albert E, et al. Incremental resource usage analysis[C] //Pro-ceedings of the ACM SIGPLAN 2012 Workshop on PartialEvaluation and Program Manipulation. Philadelphia, Pennsylva-nia, USA, 2012: 25-34.
  • 4Jost S,et al. Static determination of quantitative resource usagefor higher-order programs[C] //Proceedings of the 37th AnnualACM SIGPLAN-SIGACT Symposium on Principles of Program-ming Languages. Madrid Spain ,2010.
  • 5Kobayashi N,et al. Resource Usage Analysis for the 7rCalculus[M] // Verification, Model Checking, and Abstract Interpreta-tion. Springer Berlin Heidelberg,2006 : 298-312.
  • 6Bartoletti M,et al. Local policies for resource usage analysis[J].ACM Trans. Program, Lang. Syst. ,2009,31: 1-43.
  • 7Antunes J,et al. Detection and Prediction of Resource-Exhaus-tion Vulnerabilities[C]//19th International Symposium on Soft-ware Reliability Engineering,2008(ISSRE 2008). 2008:87-96.
  • 8Calcagno C,et al. Compositional Shape Analysis by Means of Bi-Abduction[C] //POPL 09. 2009: 289-300.
  • 9Lokuciejewski P,et al. A Fast and Precise Static Loop AnalysisBased on Abstract Interpretation, Program Slicing and PolytopeModels[C] // Code Generation, and Optimization, 2009 (CGO2009). 2009 : 136-146.
  • 10Coughlin D,et al. Fissile type analysis: Modular Checking of Al-most Everywhere Invariants [J], SIGPLAN Notices, 2014, 49(1):73-85.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部