-
1
-
-
0032681509
-
A core calculus of dependency
-
Abadi, M., Banerjee, A., Heintze, N. and Riecke, J. G.: A core calculus of dependency, in 26th Symposium on Principles of Programming Languages, 1999, pp. 147-160.
-
26th Symposium on Principles of Programming Languages, 1999
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
2
-
-
85009051998
-
Bytecode verification by model checking
-
Special issue on bytecode verification (this issue)
-
Basin, D., Friedrich, S. and Gawkowski, M.: Bytecode verification by model checking, J. Automated Reasoning. Special issue on bytecode verification (this issue).
-
J. Automated Reasoning
-
-
Basin, D.1
Friedrich, S.2
Gawkowski, M.3
-
5
-
-
0042715153
-
Hostile activeX control demonstrated
-
Brunnstein, K.: Hostile ActiveX Control demonstrated, RISKS Forum 18(82) (1998).
-
(1998)
RISKS Forum
, vol.18
, Issue.82
-
-
Brunnstein, K.1
-
7
-
-
11144224305
-
Model checking multi-applet Java Card applications
-
Chugunov, G., Åke Fredlund, L. and Gurov, D.: Model checking multi-applet Java Card applications, in Smart Card Research and Advanced Applications Conference (CARDIS'02), 2002.
-
Smart Card Research and Advanced Applications Conference (CARDIS'02), 2002
-
-
Chugunov, G.1
Åke Fredlund, L.2
Gurov, D.3
-
8
-
-
0348146568
-
Simple verification technique for complex Java bytecode subroutines
-
Extended version available as Kestrel Institute technical report
-
Coglio, A.: Simple verification technique for complex Java bytecode subroutines, in 4th ECOOP Workshop on Formal Techniques for Java-like Programs, 2002. Extended version available as Kestrel Institute technical report.
-
4th ECOOP Workshop on Formal Techniques for Java-like Programs, 2002
-
-
Coglio, A.1
-
9
-
-
0037307180
-
Improving the official specification of Java bytecode verification
-
Coglio, A.: Improving the official specification of Java bytecode verification, Concurrency and Computation: Practice and Experience 15(2) (2003), 155-179.
-
(2003)
Concurrency and Computation: Practice and Experience
, vol.15
, Issue.2
, pp. 155-179
-
-
Coglio, A.1
-
10
-
-
0003238577
-
Towards a provably-correct implementation of the JVM bytecode verifier
-
Coglio, A., Goldberg, A. and Qian, Z.: Towards a provably-correct implementation of the JVM bytecode verifier, in OOPSLA Workshop on Formal Underpinnings of Java, 1998.
-
OOPSLA Workshop on Formal Underpinnings of Java, 1998
-
-
Coglio, A.1
Goldberg, A.2
Qian, Z.3
-
11
-
-
0008733298
-
The defensive Java virtual machine specification
-
Technical Report, Computational Logic Inc.
-
Cohen, R.: The defensive Java virtual machine specification, Technical Report, Computational Logic Inc., 1997.
-
(1997)
-
-
Cohen, R.1
-
13
-
-
85009047889
-
A type system for the Java bytecode language and verifier
-
Special issue on bytecode verification (this issue)
-
Freund, S. N. and Mitchell, J. C.: A type system for the Java bytecode language and verifier, J. Automated Reasoning. Special issue on bytecode verification (this issue).
-
J. Automated Reasoning
-
-
Freund, S.N.1
Mitchell, J.C.2
-
16
-
-
0043216320
-
On-terminal verifier for JEFF files
-
Personal communication
-
Frey, A.: On-terminal verifier for JEFF files, Personal communication, 2001.
-
(2001)
-
-
Frey, A.1
-
18
-
-
0003801299
-
-
The JavaSeries, Addison-Wesley
-
Gong, L.: Inside Java 2 Platform Security: Architecture, API Design, and Implementation, The JavaSeries, Addison-Wesley, 1998.
-
(1998)
Inside Java 2 Platform Security: Architecture, API Design, and Implementation
-
-
Gong, L.1
-
20
-
-
84905051857
-
On a new method for dataflow analysis of Java virtual machine subroutines
-
in G. Levi (ed.)
-
Hagiya, M. and Tozawa, A.: On a new method for dataflow analysis of Java virtual machine subroutines, in G. Levi (ed.), SAS'98, Lecture Notes in Comput. Sci. 1503, 1998, pp. 17-32.
-
(1998)
SAS'98, Lecture Notes in Comput. Sci.
, vol.1503
, pp. 17-32
-
-
Hagiya, M.1
Tozawa, A.2
-
21
-
-
0000952504
-
Formalizing the safety of Java, the Java virtual machine and Java card
-
Hartel, P. H. and Moreau, L. A. V.: Formalizing the safety of Java, the Java virtual machine and Java Card, ACM Computing Surveys 33(4) (2001), 517-558.
-
(2001)
ACM Computing Surveys
, vol.33
, Issue.4
, pp. 517-558
-
-
Hartel, P.H.1
Moreau, L.A.V.2
-
23
-
-
0042715133
-
A framework for bytecode verifiers: Application to intra-procedural continuations
-
Research Report, INRIA
-
Henrio, L. and Serpette, B.: A framework for bytecode verifiers: Application to intra-procedural continuations, Research Report, INRIA, 2001.
-
(2001)
-
-
Henrio, L.1
Serpette, B.2
-
24
-
-
84896693266
-
A case study in class library verification: Java's Vector class
-
Huisman, M., Jacobs, B. and van der Berg, J.: A case study in class library verification: Java's Vector class, Software Tools for Technology Transfer 3(3) (2001), 332-352.
-
(2001)
Software Tools for Technology Transfer
, vol.3
, Issue.3
, pp. 332-352
-
-
Huisman, M.1
Jacobs, B.2
Van Der Berg, J.3
-
25
-
-
84940106252
-
Verification of control flow based security properties
-
Jensen, T., Le Métayer, D. and Thorn, T.: Verification of control flow based security properties, in IEEE Symposium on Security and Privacy, 1999.
-
IEEE Symposium on Security and Privacy, 1999
-
-
Jensen, T.1
Le Métayer, D.2
Thorn, T.3
-
26
-
-
0042214012
-
Verified Java bytecode verification
-
Ph.D. thesis, Technische Universität München
-
Klein, G.: Verified Java bytecode verification, Ph.D. thesis, Technische Universität München, 2003.
-
(2003)
-
-
Klein, G.1
-
29
-
-
85009045250
-
Verified bytecode subroutines
-
Special issue on bytecode verification (this issue)
-
Klein, G. and Wildmoser, M.: Verified bytecode subroutines, J. Automated Reasoning. Special issue on bytecode verification (this issue).
-
J. Automated Reasoning
-
-
Klein, G.1
Wildmoser, M.2
-
31
-
-
0037051773
-
Bytecode verification for Java smart card
-
Leroy, X.: Bytecode verification for Java smart card, Software Practice & Experience 32 (2002), 319-340.
-
(2002)
Software Practice & Experience
, vol.32
, pp. 319-340
-
-
Leroy, X.1
-
32
-
-
84982921576
-
Security properties of type applets
-
in J. Vitek and C. Jensen (eds.); Springer-Verlag
-
Leroy, X. and Rouaix, F.: Security properties of type applets, in J. Vitek and C. Jensen (eds.), Secure Internet Programming - Security Issues for Mobile and Distributed Objects, Lecture Notes in Comput. Sci. 1603, Springer-Verlag, 1999, pp. 147-182.
-
(1999)
Secure Internet Programming - Security Issues for Mobile and Distributed Objects, Lecture Notes in Comput. Sci.
, vol.1603
, pp. 147-182
-
-
Leroy, X.1
Rouaix, F.2
-
33
-
-
0004220511
-
-
The Java Series, Addison-Wesley
-
Lindholm, T. and Yellin, F.: The Java Virtual Machine Specification, 2nd edn, The Java Series, Addison-Wesley, 1999.
-
(1999)
The Java Virtual Machine Specification, 2nd Edn
-
-
Lindholm, T.1
Yellin, F.2
-
42
-
-
84945270736
-
A systematic approach to static access control
-
in D. Sands (ed.)
-
Pottier, F., Skalka, C. and Smith, S.: A systematic approach to static access control, in D. Sands (ed.), Proceedings of the 10th European Symposium on Programming (ESOP'01), Lecture Notes in Comput. Sci. 2028, 2001, pp. 30-45.
-
(2001)
Proceedings of the 10th European Symposium on Programming (ESOP'01), Lecture Notes in Comput. Sci.
, vol.2028
, pp. 30-45
-
-
Pottier, F.1
Skalka, C.2
Smith, S.3
-
43
-
-
84948948452
-
Proving the soundness of a Java bytecode verifier specification in Isabelle/HOL
-
in W. R. Cleaveland (ed.)
-
Pusch, C., Proving the soundness of a Java bytecode verifier specification in Isabelle/HOL, in W. R. Cleaveland (ed.), TACAS'99, Lecture Notes in Comput. Sci. 1579, 1999, pp. 89-103.
-
(1999)
TACAS'99, Lecture Notes in Comput. Sci.
, vol.1579
, pp. 89-103
-
-
Pusch, C.1
-
44
-
-
0003361902
-
A formal specification of Java virtual machine instructions for objects, methods and subroutines
-
in J. Alves-Foss (ed.); Springer-Verlag
-
Qian, Z.: A formal specification of Java virtual machine instructions for objects, methods and subroutines, in J. Alves-Foss (ed.), Formal Syntax and Semantics of Java, Lecture Notes in Comput. Sci. 1523, Springer-Verlag, 1998.
-
(1998)
Formal Syntax and Semantics of Java, Lecture Notes in Comput. Sci.
, vol.1523
-
-
Qian, Z.1
-
45
-
-
0001362437
-
Standard fixpoint iteration for Java bytecode verification
-
Qian, Z.: Standard fixpoint iteration for Java bytecode verification, ACM Transactions on Programming Languages and Systems 22(4) (2000), 638-672.
-
(2000)
ACM Transactions on Programming Languages and Systems
, vol.22
, Issue.4
, pp. 638-672
-
-
Qian, Z.1
-
46
-
-
0041713631
-
Vérification de code d'octet de la machine virtuelle Java: Formalisation et implantation
-
Ph.D. thesis, University Paris 7
-
Rose, E.: Vérification de code d'octet de la machine virtuelle Java: formalisation et implantation, Ph.D. thesis, University Paris 7, 2002.
-
(2002)
-
-
Rose, E.1
-
50
-
-
85009055143
-
Completeness of a bytecode verifier and a certifying Java-to-JVM compiler
-
Special issue on bytecode verification (this issue)
-
Stärk, R. F. and Schmid, J.: Completeness of a bytecode verifier and a certifying Java-to-JVM compiler, J. Automated Reasoning, Special issue on bytecode verification (this issue).
-
J. Automated Reasoning
-
-
Stärk, R.F.1
Schmid, J.2
-
52
-
-
0008695946
-
Java 2 platform micro edition technology for creating mobile devices
-
Sun Microsystems; White paper
-
Sun Microsystems: Java 2 platform micro edition technology for creating mobile devices, White paper, http://java.sun.com/products/cldc/wp/KVMwp.pdf, 2000.
-
(2000)
-
-
-
53
-
-
0042214011
-
Off-card bytecode verifier for Java card
-
Trusted Logic; Distributed as part of Sun's Java Card Development Kit
-
Trusted Logic: Off-card bytecode verifier for Java card, 2001. Distributed as part of Sun's Java Card Development Kit.
-
(2001)
-
-
-
55
-
-
84956989228
-
A type-based approach to program security
-
Volpano, D. and Smith, G.: A type-based approach to program security, in Proceedings of TAPSOFT'97, Colloquium on Formal Approaches in Software Engineering, Lecture Notes in Comput. Sci. 1214, 1997, pp. 607-621.
-
(1997)
Proceedings of TAPSOFT'97, Colloquium on Formal Approaches in Software Engineering, Lecture Notes in Comput. Sci.
, vol.1214
, pp. 607-621
-
-
Volpano, D.1
Smith, G.2
-
56
-
-
0001905093
-
A sound type system for secure flow analysis
-
Volpano, D., Smith, G. and Irvine, C.: A sound type system for secure flow analysis, J. Computer Security 4(3) (1996), 1-21.
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 1-21
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|