Java bytecode verification: algorithms and formalizations
X Leroy - Journal of Automated Reasoning, 2003 - Springer
Bytecode verification is a crucial security component for Java applets, on the Web and on
embedded devices such as smart cards. This paper reviews the various bytecode …
embedded devices such as smart cards. This paper reviews the various bytecode …
[图书][B] Java and the Java virtual machine: definition, verification, validation
RF Stärk, J Schmid, E Börger - 2012 - books.google.com
The origin of this book goes back to the Dagstuhl seminar on Logic for System Engineering,
organized during the first week of March 1997 by S. Jiihnichen, J. Loeckx, and M. Wirsing …
organized during the first week of March 1997 by S. Jiihnichen, J. Loeckx, and M. Wirsing …
Flow-sensitive type qualifiers
We present a system for extending standard type systems with flow-sensitive type qualifiers.
Users annotate their programs with type qualifiers, and inference checks that the …
Users annotate their programs with type qualifiers, and inference checks that the …
Formalizing the safety of Java, the Java virtual machine, and Java card
We review the existing literature on Java safety, emphasizing formal approaches, and the
impact of Java safety on small footprint devices such as smartcards. The conclusion is that …
impact of Java safety on small footprint devices such as smartcards. The conclusion is that …
[PDF][PDF] TALx86: A realistic typed assembly language
The goal of typed assembly language (TAL) is to provide a low-level, statically typed target
language that is better suited than Java bytecodes for supporting a wide variety of source …
language that is better suited than Java bytecodes for supporting a wide variety of source …
Bytecode verification on Java smart cards
X Leroy - Software: Practice and Experience, 2002 - Wiley Online Library
This article presents a novel approach to the problem of bytecode verification for Java Card
applets. By relying on prior off‐card bytecode transformations, we simplify the bytecode …
applets. By relying on prior off‐card bytecode transformations, we simplify the bytecode …
Stack-based typed assembly language
In previous work, we presented a Typed Assembly Language (TAL). TAL is sufficiently
expressive to serve as a target language for compilers of high-level languages such as ML …
expressive to serve as a target language for compilers of high-level languages such as ML …
Stack-based typed assembly language
This paper presents STAL, a variant of Typed Assembly Language with constructs and types
to support a limited form of stack allocation. As with other statically-typed low-level …
to support a limited form of stack allocation. As with other statically-typed low-level …
A type system for the Java bytecode language and verifier
SN Freund, JC Mitchell - Journal of Automated Reasoning, 2003 - Springer
Abstract The Java Virtual Machine executes bytecode programs that may have been sent
from other, possibly untrusted, locations on the network. Since the transmitted code may be …
from other, possibly untrusted, locations on the network. Since the transmitted code may be …
Language-Based Security: Invited Lecture
D Kozen - … Symposium on Mathematical Foundations of Computer …, 1999 - Springer
Security of mobile code is a major issue in today's global computing environment. When you
download a program from an untrusted source, how can you be sure it will not do something …
download a program from an untrusted source, how can you be sure it will not do something …