Information Flow Investigations (CMU-CS-13-118)
نویسندگان
چکیده
Information-flow analysis has largely ignored the setting where the analyst has neither control over nor a complete model of the analyzed system. We formalize such limited information flow investigations and study it in three domains: (1) the determination of what third-party web trackers do with the information they collect, (2) the identification of copyright violators, and (3) the detection of insiders leaking data. We use a common framework based on information flow analysis to relate these three problems while pushing beyond traditional information flow analysis. Viewing these seemingly disparate problems in a common framework allows us to identify the assumptions underlying analyses used for these problems and to show where each area could benefit from the other. Our systematic study leads to practical advice for improving work on tracking web trackers, a previously unformalized area.
منابع مشابه
Reconciling Mobile App Privacy and Usability on Smartphones: Could User Privacy Profiles Help? (CMU-CS-13-128, CMU-ISR-13-114)
As they compete for developers, mobile app ecosystems have been exposing a growing number of APIs through their software development kits. Many of these APIs involve accessing sensitive functionality and/or user data and require approval by users. Android for instance allows developers to select from over 130 possible permissions. Expecting users to review and possibly adjust settings related t...
متن کاملDiversity or Difference? New Research Supports the Case for a Cultural Perspective on Women in Computing
Gender difference approaches to the participation of women in computing have not provided adequate explanations for women’s declining interest in computer science (CS) and related technical fields. Indeed, the search for gender differences can work against diversity which we define as a cross-gender spectrum of characteristics, interests, abilities, experiences, beliefs and identities. Our ongo...
متن کاملAn Interpretation of Standard ML in Type Theory
We de ne an interpretation of Standard ML into type theory. The interpretation takes the form of a set of elaboration rules reminiscent of the static semantics given in The De nition of Standard ML. In particular, the elaboration rules are given in a relational style, exploiting indeterminacy to avoid over-commitment to speci c implementation techniques. Elaboration consists of identi er scope ...
متن کاملFinal report on information processing research
ion and the methodical development of fault-tolerantsoftware. PhD thesis, Carnegie Mellon University Computer Science Depart-ment, February, 1986.Also available as Technical Report CMU-CS-86-112.The reliable operation of software is a factor of increasing im-portance with the use of computers for critical functions.Software in general is demonstrably unreliable, particul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015