메뉴 건너뛰기




Volumn 30, Issue 3-4, 2003, Pages 235-269

Java bytecode verification: Algorithms and formalizations

Author keywords

Abstract interpretation; Bytecode verification; Dataflow analysis; Java virtual machine; Subroutines

Indexed keywords

ALGORITHMS; DATA FLOW ANALYSIS; JAVA PROGRAMMING LANGUAGE; SECURITY OF DATA; SMART CARDS; SUBROUTINES; WORLD WIDE WEB;

EID: 0042733585     PISSN: 01687433     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1025055424017     Document Type: Article
Times cited : (94)

References (58)
  • 2
    • 85009051998 scopus 로고    scopus 로고
    • Bytecode verification by model checking
    • Special issue on bytecode verification (this issue)
    • Basin, D., Friedrich, S. and Gawkowski, M.: Bytecode verification by model checking, J. Automated Reasoning. Special issue on bytecode verification (this issue).
    • J. Automated Reasoning
    • Basin, D.1    Friedrich, S.2    Gawkowski, M.3
  • 5
    • 0042715153 scopus 로고    scopus 로고
    • Hostile activeX control demonstrated
    • Brunnstein, K.: Hostile ActiveX Control demonstrated, RISKS Forum 18(82) (1998).
    • (1998) RISKS Forum , vol.18 , Issue.82
    • Brunnstein, K.1
  • 8
    • 0348146568 scopus 로고    scopus 로고
    • Simple verification technique for complex Java bytecode subroutines
    • Extended version available as Kestrel Institute technical report
    • Coglio, A.: Simple verification technique for complex Java bytecode subroutines, in 4th ECOOP Workshop on Formal Techniques for Java-like Programs, 2002. Extended version available as Kestrel Institute technical report.
    • 4th ECOOP Workshop on Formal Techniques for Java-like Programs, 2002
    • Coglio, A.1
  • 9
    • 0037307180 scopus 로고    scopus 로고
    • Improving the official specification of Java bytecode verification
    • Coglio, A.: Improving the official specification of Java bytecode verification, Concurrency and Computation: Practice and Experience 15(2) (2003), 155-179.
    • (2003) Concurrency and Computation: Practice and Experience , vol.15 , Issue.2 , pp. 155-179
    • Coglio, A.1
  • 11
    • 0008733298 scopus 로고    scopus 로고
    • The defensive Java virtual machine specification
    • Technical Report, Computational Logic Inc.
    • Cohen, R.: The defensive Java virtual machine specification, Technical Report, Computational Logic Inc., 1997.
    • (1997)
    • Cohen, R.1
  • 13
    • 85009047889 scopus 로고    scopus 로고
    • A type system for the Java bytecode language and verifier
    • Special issue on bytecode verification (this issue)
    • Freund, S. N. and Mitchell, J. C.: A type system for the Java bytecode language and verifier, J. Automated Reasoning. Special issue on bytecode verification (this issue).
    • J. Automated Reasoning
    • Freund, S.N.1    Mitchell, J.C.2
  • 16
    • 0043216320 scopus 로고    scopus 로고
    • On-terminal verifier for JEFF files
    • Personal communication
    • Frey, A.: On-terminal verifier for JEFF files, Personal communication, 2001.
    • (2001)
    • Frey, A.1
  • 20
    • 84905051857 scopus 로고    scopus 로고
    • On a new method for dataflow analysis of Java virtual machine subroutines
    • in G. Levi (ed.)
    • Hagiya, M. and Tozawa, A.: On a new method for dataflow analysis of Java virtual machine subroutines, in G. Levi (ed.), SAS'98, Lecture Notes in Comput. Sci. 1503, 1998, pp. 17-32.
    • (1998) SAS'98, Lecture Notes in Comput. Sci. , vol.1503 , pp. 17-32
    • Hagiya, M.1    Tozawa, A.2
  • 21
    • 0000952504 scopus 로고    scopus 로고
    • Formalizing the safety of Java, the Java virtual machine and Java card
    • Hartel, P. H. and Moreau, L. A. V.: Formalizing the safety of Java, the Java virtual machine and Java Card, ACM Computing Surveys 33(4) (2001), 517-558.
    • (2001) ACM Computing Surveys , vol.33 , Issue.4 , pp. 517-558
    • Hartel, P.H.1    Moreau, L.A.V.2
  • 23
    • 0042715133 scopus 로고    scopus 로고
    • A framework for bytecode verifiers: Application to intra-procedural continuations
    • Research Report, INRIA
    • Henrio, L. and Serpette, B.: A framework for bytecode verifiers: Application to intra-procedural continuations, Research Report, INRIA, 2001.
    • (2001)
    • Henrio, L.1    Serpette, B.2
  • 26
    • 0042214012 scopus 로고    scopus 로고
    • Verified Java bytecode verification
    • Ph.D. thesis, Technische Universität München
    • Klein, G.: Verified Java bytecode verification, Ph.D. thesis, Technische Universität München, 2003.
    • (2003)
    • Klein, G.1
  • 29
    • 85009045250 scopus 로고    scopus 로고
    • Verified bytecode subroutines
    • Special issue on bytecode verification (this issue)
    • Klein, G. and Wildmoser, M.: Verified bytecode subroutines, J. Automated Reasoning. Special issue on bytecode verification (this issue).
    • J. Automated Reasoning
    • Klein, G.1    Wildmoser, M.2
  • 31
    • 0037051773 scopus 로고    scopus 로고
    • Bytecode verification for Java smart card
    • Leroy, X.: Bytecode verification for Java smart card, Software Practice & Experience 32 (2002), 319-340.
    • (2002) Software Practice & Experience , vol.32 , pp. 319-340
    • Leroy, X.1
  • 43
    • 84948948452 scopus 로고    scopus 로고
    • Proving the soundness of a Java bytecode verifier specification in Isabelle/HOL
    • in W. R. Cleaveland (ed.)
    • Pusch, C., Proving the soundness of a Java bytecode verifier specification in Isabelle/HOL, in W. R. Cleaveland (ed.), TACAS'99, Lecture Notes in Comput. Sci. 1579, 1999, pp. 89-103.
    • (1999) TACAS'99, Lecture Notes in Comput. Sci. , vol.1579 , pp. 89-103
    • Pusch, C.1
  • 44
    • 0003361902 scopus 로고    scopus 로고
    • A formal specification of Java virtual machine instructions for objects, methods and subroutines
    • in J. Alves-Foss (ed.); Springer-Verlag
    • Qian, Z.: A formal specification of Java virtual machine instructions for objects, methods and subroutines, in J. Alves-Foss (ed.), Formal Syntax and Semantics of Java, Lecture Notes in Comput. Sci. 1523, Springer-Verlag, 1998.
    • (1998) Formal Syntax and Semantics of Java, Lecture Notes in Comput. Sci. , vol.1523
    • Qian, Z.1
  • 45
    • 0001362437 scopus 로고    scopus 로고
    • Standard fixpoint iteration for Java bytecode verification
    • Qian, Z.: Standard fixpoint iteration for Java bytecode verification, ACM Transactions on Programming Languages and Systems 22(4) (2000), 638-672.
    • (2000) ACM Transactions on Programming Languages and Systems , vol.22 , Issue.4 , pp. 638-672
    • Qian, Z.1
  • 46
    • 0041713631 scopus 로고    scopus 로고
    • Vérification de code d'octet de la machine virtuelle Java: Formalisation et implantation
    • Ph.D. thesis, University Paris 7
    • Rose, E.: Vérification de code d'octet de la machine virtuelle Java: formalisation et implantation, Ph.D. thesis, University Paris 7, 2002.
    • (2002)
    • Rose, E.1
  • 50
    • 85009055143 scopus 로고    scopus 로고
    • Completeness of a bytecode verifier and a certifying Java-to-JVM compiler
    • Special issue on bytecode verification (this issue)
    • Stärk, R. F. and Schmid, J.: Completeness of a bytecode verifier and a certifying Java-to-JVM compiler, J. Automated Reasoning, Special issue on bytecode verification (this issue).
    • J. Automated Reasoning
    • Stärk, R.F.1    Schmid, J.2
  • 52
    • 0008695946 scopus 로고    scopus 로고
    • Java 2 platform micro edition technology for creating mobile devices
    • Sun Microsystems; White paper
    • Sun Microsystems: Java 2 platform micro edition technology for creating mobile devices, White paper, http://java.sun.com/products/cldc/wp/KVMwp.pdf, 2000.
    • (2000)
  • 53
    • 0042214011 scopus 로고    scopus 로고
    • Off-card bytecode verifier for Java card
    • Trusted Logic; Distributed as part of Sun's Java Card Development Kit
    • Trusted Logic: Off-card bytecode verifier for Java card, 2001. Distributed as part of Sun's Java Card Development Kit.
    • (2001)
  • 56
    • 0001905093 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Volpano, D., Smith, G. and Irvine, C.: A sound type system for secure flow analysis, J. Computer Security 4(3) (1996), 1-21.
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 1-21
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.