메뉴 건너뛰기




Volumn 30, Issue 3-4, 2003, Pages 271-321

A type system for the Java bytecode language and verifier

Author keywords

Bytecode verification; Java Virtual Machine; Type systems

Indexed keywords

ALGORITHMS; COMPUTER CRIME; COMPUTER NETWORKS; COMPUTER PROGRAMMING; INTERFACES (COMPUTER); JAVA PROGRAMMING LANGUAGE; RESPONSE TIME (COMPUTER SYSTEMS); SECURITY OF DATA; SUBROUTINES;

EID: 0042383146     PISSN: 01687433     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1025011624925     Document Type: Article
Times cited : (45)

References (49)
  • 2
    • 84958752428 scopus 로고    scopus 로고
    • Formalizing a JVML verifier for initialization in a theorem prover
    • Bertot, Y.: Formalizing a JVML verifier for initialization in a theorem prover, in CAV 01: Computer Aided Verification, 2001, pp. 14-24.
    • CAV 01: Computer Aided Verification, 2001 , pp. 14-24
    • Bertot, Y.1
  • 4
    • 24344461667 scopus 로고    scopus 로고
    • Programmer friendly modular definition of the semantics of Java
    • in J. Alves-Foss (ed.); Springer-Verlag
    • Börger, E and Schulte, W.: Programmer friendly modular definition of the semantics of Java, in J. Alves-Foss (ed)., Formal Syntax and Semantics of Java, Lecture Notes in Comput. Sci. 1523, Springer-Verlag, 1999, pp. 353-404.
    • (1999) Formal Syntax and Semantics of Java, Lecture Notes in Comput. Sci. , vol.1523 , pp. 353-404
    • Börger, E.1    Schulte, W.2
  • 6
    • 0035506226 scopus 로고    scopus 로고
    • Type safety in the JVM: Some problems in the Java 2 SDK 1.2 and proposed solutions
    • Coglio A. and Goldberg, A.: Type safety in the JVM: Some problems in the Java 2 SDK 1.2 and proposed solutions, Concurrency and Computation: Practice and Experience 13(13) (2001), 1153-1171.
    • (2001) Concurrency and Computation: Practice and Experience , vol.13 , Issue.13 , pp. 1153-1171
    • Coglio, A.1    Goldberg, A.2
  • 8
    • 0038844291 scopus 로고    scopus 로고
    • Defensive Java virtual machine version 0.5 alpha release
    • Cohen, R.: Defensive Java Virtual Machine version 0.5 alpha release, available from http://www.cli.com/software/djvm/index.html, 1997.
    • (1997)
    • Cohen, R.1
  • 12
    • 0003396723 scopus 로고    scopus 로고
    • Formal aspects of mobile code security
    • Ph.D. thesis, Princeton University
    • Dean, R. D.: Formal aspects of mobile code security, Ph.D. thesis, Princeton University, 1999.
    • (1999)
    • Dean, R.D.1
  • 13
    • 84959050850 scopus 로고    scopus 로고
    • An abstract model of Java dynamic linking, loading and verification
    • in R. Harper (ed.)
    • Drossopoulou, S.: An abstract model of Java dynamic linking, loading and verification, in R. Harper (ed.), Workshop on Types in Compilation, Lecture Notes in Comput. Sci. 2071, 2001, pp. 53-84.
    • (2001) Workshop on Types in Compilation, Lecture Notes in Comput. Sci. , vol.2071 , pp. 53-84
    • Drossopoulou, S.1
  • 15
    • 0003935435 scopus 로고    scopus 로고
    • Type systems for object-oriented intermediate languages
    • Ph.D. thesis, Stanford University
    • Freund, S. N.: Type systems for object-oriented intermediate languages, Ph.D. thesis, Stanford University, 2000.
    • (2000)
    • Freund, S.N.1
  • 17
    • 0010046176 scopus 로고    scopus 로고
    • Specification and verification of Java bytecode subroutines and exceptions
    • Stanford Computer Science Technical Note STAN-CS-TN-99-91
    • Freund, S. N. and Mitchell, J. C.: Specification and verification of Java bytecode subroutines and exceptions, Stanford Computer Science Technical Note STAN-CS-TN-99-91, 1999.
    • (1999)
    • Freund, S.N.1    Mitchell, J.C.2
  • 19
    • 25944440841 scopus 로고    scopus 로고
    • Srcjava implementation
    • Ghemawat, S.: Srcjava implementation, 1999. Available from http://www.research.digital.com/SRC/java.
    • (1999)
    • Ghemawat, S.1
  • 21
    • 84905051857 scopus 로고    scopus 로고
    • On a new method for dataflow analysis of Java virtual machine subroutines
    • Hagiya, M. and Tozawa, A.: On a new method for dataflow analysis of Java virtual machine subroutines, in Static Analysis Symposium, 1998, pp. 17-32.
    • Static Analysis Symposium, 1998 , pp. 17-32
    • Hagiya, M.1    Tozawa, A.2
  • 27
    • 84958745294 scopus 로고    scopus 로고
    • Java bytecode verification: An overview
    • Leroy, X.: Java bytecode verification: An overview, in CAV 01: Computer Aided Verification, 2001, pp. 265-285.
    • (2001) CAV 01: Computer Aided Verification , pp. 265-285
    • Leroy, X.1
  • 28
    • 0042733585 scopus 로고    scopus 로고
    • Java bytecode verification: Algorithms and formalizations
    • To appear
    • Leroy, X.: Java bytecode verification: Algorithms and formalizations, J. Automated Reasoning (2003). To appear.
    • (2003) J. Automated Reasoning
    • Leroy, X.1
  • 36
    • 0001076184 scopus 로고    scopus 로고
    • A formal specification of Java virtual machine instructions for objects, methods and subroutines
    • in J. Alves-Foss (ed.); Springer-Verlag
    • Qian, Z.: A formal specification of Java Virtual Machine instructions for objects, methods and subroutines, in J. Alves-Foss (ed.), Formal Syntax and Semantics of Java, Lecture Notes in Comput. Sci. 1523, Springer-Verlag, 1999, pp. 271-312.
    • (1999) Formal Syntax and Semantics of Java, Lecture Notes in Comput. Sci. , vol.1523 , pp. 271-312
    • Qian, Z.1
  • 37
    • 0001362437 scopus 로고    scopus 로고
    • Standard fixpoint iteration for Java bytecode verification
    • Qian, Z.: Standard fixpoint iteration for Java bytecode verification, ACM Transactions on Programming Languages and Systems 22(4) (2000), 638-672.
    • (2000) ACM Transactions on Programming Languages and Systems , vol.22 , Issue.4 , pp. 638-672
    • Qian, Z.1
  • 40
    • 0041713430 scopus 로고    scopus 로고
    • Kimera: A Java system architecture
    • Sirer, E. G., McDirmid, S. and Bershad, B.: Kimera: A Java system architecture, 1997, Available from http://kimera.cs.washington.edu.
    • (1997)
    • Sirer, E.G.1    Mcdirmid, S.2    Bershad, B.3
  • 42
    • 0043234794 scopus 로고    scopus 로고
    • Completeness of a bytecode verifier and a certifying Java-to-JVM compiler
    • To appear
    • Stärk, R. F. and Schmid, J.: Completeness of a bytecode verifier and a certifying Java-to-JVM compiler, J. Automated Reasoning (2003). To appear.
    • (2003) J. Automated Reasoning
    • Stärk, R.F.1    Schmid, J.2
  • 44
    • 0003747398 scopus 로고    scopus 로고
    • Proving Java type soundness
    • Technical Report 427, University of Cambridge
    • Syme, D.: Proving Java type soundness, Technical Report 427, University of Cambridge, 1997.
    • (1997)
    • Syme, D.1
  • 45
    • 0019588127 scopus 로고
    • A unified approach to path problems
    • Tarjan, R. E.: A unified approach to path problems, J. ACM 28 (1981), 577-593.
    • (1981) J. ACM , vol.28 , pp. 577-593
    • Tarjan, R.E.1
  • 46
    • 0002936669 scopus 로고    scopus 로고
    • Careful analysis of type spoofing
    • Tozawa, A. and Hagiya, M.: Careful analysis of type spoofing, in Java-Informations-Tage, 1999, pp. 290-296.
    • (1999) Java-Informations-Tage , pp. 290-296
    • Tozawa, A.1    Hagiya, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.