메뉴 건너뛰기




Volumn , Issue , 2002, Pages 850-855

Using standard verifier to check secure information flow in Java bytecode

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CODES (SYMBOLS); DATA FLOW ANALYSIS; INTERNET; JAVA PROGRAMMING LANGUAGE; PROGRAM COMPILERS; SECURITY OF DATA; WEB BROWSERS;

EID: 0036389413     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (13)
  • 1
    • 84976840591 scopus 로고
    • An axiomatic approach to information flow in programs
    • G. R. Andrews and R. P. Reitman. An axiomatic approach to information flow in programs. ACM Trans. Program. Lang. Syst., 2(1):56-76, 1980.
    • (1980) ACM Trans. Program. Lang. Syst. , vol.2 , Issue.1 , pp. 56-76
    • Andrews, G.R.1    Reitman, R.P.2
  • 2
    • 0027565268 scopus 로고
    • What's in a region? Or computing control dependence regions on near-linear time for reducible control flow
    • T. Ball. What's in a region? or computing control dependence regions in near-linear time for reducible control flow. ACM Letters on Program. Lang. Syst., 2(1-4):1-16, 1993.
    • (1993) ACM Letters on Program. Lang. Syst. , vol.2 , Issue.1-4 , pp. 1-16
    • Ball, T.1
  • 5
    • 84894622815 scopus 로고    scopus 로고
    • Combining abstract interpretation and model checking for analysing security properties of java bytecode
    • C. Bernardeschi and N. D. Francesco. Combining abstract interpretation and model checking for analysing security properties of java bytecode. In WMCAI2002 Proceedings, pages 1-15, 2002.
    • (2002) WMCAI2002 Proceedings , pp. 1-15
    • Bernardeschi, C.1    Francesco, N.D.2
  • 7
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. ACM, 20(7):504-513, 1977.
    • (1977) Comm. ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 9
    • 0000046942 scopus 로고
    • A security flow control algorithm and its denotational semantics correctness proof
    • M. Mizuno and D. A. Schmidt. A security flow control algorithm and its denotational semantics correctness proof. Formal Aspects of Computing, 4:727-754, 1992.
    • (1992) Formal Aspects of Computing , vol.4 , pp. 727-754
    • Mizuno, M.1    Schmidt, D.A.2
  • 10
    • 1542352579 scopus 로고    scopus 로고
    • Bytecode verification for java smartcards based on model checking
    • J. Possegga and H. Vogt. Bytecode verification for java smartcards based on model checking. In ESORICS 98 Proceedings, 1998.
    • ESORICS 98 Proceedings, 1998
    • Possegga, J.1    Vogt, H.2
  • 12
    • 0004220511 scopus 로고    scopus 로고
    • Addison-Wesley Publishing Company, Reading, Massachusetts
    • L. T. and F. Yellin. The java virtual machine specification. Addison-Wesley Publishing Company, Reading, Massachusetts, 1996.
    • (1996) The Java Virtual Machine Specification
    • Yellin, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.