Datalog Static Analysis in Secrecy

Title
Datalog Static Analysis in Secrecy
Author
이우석
Keywords
Static analysis; Servers; Protocols; Cryptography; Codes; Homomorphic encryption; Costs; Datalog; homomorphic encryption; privacy-preserving software-as-a-service; static analysis; secure two-party computation
Issue Date
2022-05
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Citation
IEEE ACCESS, v. 10, Page. 56179.0-56192.0
Abstract
We present a secure static-analysis-as-a-service (SaaaS) system where a client may outsource static analysis to the cloud. To address copyright concerns associated with SaaaS, clients are allowed to encrypt the source code of a target program and upload it to the cloud. Our goal is to secure the privacy of the design and implementation of static analysis as well as the source code of the target program. Considering a family of static analyses written in Datalog, we propose a generic protocol that combines homomorphic encryption (HE) with secure two-party computation to manage the huge cost of HE operations. The server occasionally delegates sub-parts of analysis which are costly in the cipher-world to the client without exposing the design of analysis. During server-client interactions, the information of both sides (client and server) is not leaked to the opposite. We evaluated our system on two static analyses in Datalog in secrecy, which have not been feasible using the previous techniques. For example, Andersen pointer analysis is completed in an average of 45 mins for 14 C programs comprising up to 1.6 KLoC.
URI
https://ieeexplore.ieee.org/document/9781390https://repository.hanyang.ac.kr/handle/20.500.11754/179540
ISSN
2169-3536
DOI
10.1109/ACCESS.2022.3177841
Appears in Collections:
ETC[S] > ETC
Files in This Item:
86431_이우석.pdfDownload
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE