Abstract
Control Flow Analysis is a static technique for predicting safe and computable approximations to the set of values that the objects of a program may assume during its execution. We present an analysis for the π-calculus that shows how names will be bound to actual channels at run time. The formulation of the analysis requires no extensions to the π-calculus, except for assigning “channels” to the occurrences of names within restrictions, and assigning “binders” to the occurrences of names within input prefixes.
The result of our analysis establishes a super-set of the set of names to which a given name may be bound and of the set of names that may be sent along a given channel. Applications of our analysis include establishing simple security properties of processes. One example is that P has no leaks, i.e. P offers communication through public channels only, and confines its secret names within itself.
This is a preview of subscription content, log in via an institution.
Preview
Unable to display preview. Download preview PDF.
References
M. Abadi. Secrecy by typing in security protocols. In Proceedings of Theoretical Aspects of Computer Software, Third International Symposiuoum, LNCS 1281, pages 611–638. Springer-Verlag, 1997.
R.M. Amadio. An asynchronous model of locality, failure, and process mobility. In Proceedings of COORDINATION'97, LNCS 1282. Springer-Verlag, 1997.
D.E. Bell and L.J. La Padula. Secure computer systems: Unified exposition and multics interpretation. Technical Report ESD-TR-75-306, Mitre C., 1976.
M. Dam. Proving trust in systems of second-order processes: Preliminary results. Technical Report LOMAPS-SICS 19, SICS, Sweden, 1997.
R. De Nicola, G. Ferrari, and R. Pugliese. Coordinating mobile agents via blackboards and access rights. In Proceedings of COORDINATION'97, LNCS 1282. Springer-Verlag, 1997.
R. Focardi. Comparing two information flow security properties. In Proceedings of 9th IEEE Computer Science Security Foundation W/S, pages 116–122, 1996.
R. Focardi and R. Gorrieri. The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering. To appear.
C. Fournet, C. Laneve, L. Maranget, and D. Remy. Implicit typing à la ML for the join calculus. In Proceedings of CONCUR'97, LNCS. Springer-Verlag, 1997.
K.L.S. Gasser, F. Nielson, and H.R. Nielson. Systematic realisation of control flow analysis for CML. In Proceedings of ICFP'97, pages 38–51. ACM Press, 1997.
J.A. Goguen and J. Meseguer. Security policy and security models. In Proceedings of the 1982 IEEE Symposioum on Security and Privacy, pages 11–20, 1982.
T.J. Marlowe and B.J. Ryder. Properties of data flow frameworks — a unified model. Acta Informatica, 28(2):121–163, 1990.
R. Milner, J. Parrow, and D. Walker. A calculus of mobile processes (I and II). Information and Computation, 100(1):1–77, 1992.
R. Milner, J. Parrow, and D. Walker. Modal logics for mobile processes. TCS, 114:149–171, 1993.
J. Palsberg and M.J. Schwartzbach. Object-Oriented Type Systems. Wiley, 1994.
B.C. Pierce and D. Sangiorgi. Typing and sub-typing for mobile processes. Mathematical Structures in Computer Science, 6(5):409–454, 1996.
J. Riely and M. Hennessy. A typed language for distributed mobile processes. In Proceedings of POPL'98. ACM Press, 1998.
P. Sewell. Global/local subtyping for a distributed π-calculus. Technical Report 435, Computer Laboratory, University of Cambridge, 1997.
O. Shivers. Control flow analysis in Scheme. In Proceedings of PLDI'88, volume 7(1). ACM SIGPLAN Notices, 1988.
A. Venet. Abstract interpretation of the π-calculus. In Analysis and Verification of Multiple-Agent Languages, LNCS, volume 1192. Springer-Verlag, 1997.
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4:4–21, 1996.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bodei, C., Degano, P., Nielson, F., Nielson, H.R. (1998). Control flow analysis for the π-calculus. In: Sangiorgi, D., de Simone, R. (eds) CONCUR'98 Concurrency Theory. CONCUR 1998. Lecture Notes in Computer Science, vol 1466. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055617
Download citation
DOI: https://doi.org/10.1007/BFb0055617
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64896-3
Online ISBN: 978-3-540-68455-8
eBook Packages: Springer Book Archive