메뉴 건너뛰기




Volumn 3855 LNCS, Issue , 2006, Pages 174-189

A framework for certified program analysis and its applications to mobile-code safety

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATION; CODES (SYMBOLS); DATA ACQUISITION; MOBILE COMPUTING; PROGRAM ASSEMBLERS; SECURITY OF DATA;

EID: 33745675485     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (32)
  • 5
    • 84958752428 scopus 로고    scopus 로고
    • Formalizing a JVML verifier for initialization in a theorem prover
    • Proc. of the 13th International Conference on Computer Aided Verification, July
    • Y. Bertot. Formalizing a JVML verifier for initialization in a theorem prover. In Proc. of the 13th International Conference on Computer Aided Verification, volume 2102 of LNCS, pages 14-24, July 2001.
    • (2001) LNCS , vol.2102 , pp. 14-24
    • Bertot, Y.1
  • 8
    • 35048859291 scopus 로고    scopus 로고
    • Extracting a data flow analyser in constructive logic
    • D. A. Schmidt, editor, Proc. of the 13th European Symposium on Programming, Mar.
    • D. Cachera, T. P. Jensen, D. Pichardie, and V. Rusu. Extracting a data flow analyser in constructive logic. In D. A. Schmidt, editor, Proc. of the 13th European Symposium on Programming, volume 2986 of LNCS, pages 385-400, Mar. 2004.
    • (2004) LNCS , vol.2986 , pp. 385-400
    • Cachera, D.1    Jensen, T.P.2    Pichardie, D.3    Rusu, V.4
  • 9
    • 33745667809 scopus 로고    scopus 로고
    • A framework for certified program analysis and its applications to mobile-code safety
    • University of California, Berkeley
    • B.-Y. E. Chang, A. Chlipala, and G. C. Necula. A framework for certified program analysis and its applications to mobile-code safety. Technical Report UCB ERL M05/32, University of California, Berkeley, 2005.
    • (2005) Technical Report , vol.UCB ERL M05-32
    • Chang, B.-Y.E.1    Chlipala, A.2    Necula, G.C.3
  • 12
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • Jan.
    • P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proc. of the 4th Symposium on Principles of Programming Languages, pages 234-252, Jan. 1977.
    • (1977) Proc. of the 4th Symposium on Principles of Programming Languages , pp. 234-252
    • Cousot, P.1    Cousot, R.2
  • 13
    • 0000963996 scopus 로고
    • Abstract interpretation frameworks
    • P. Cousot and R. Cousot. Abstract interpretation frameworks. J. Log. Comput., 2(4):511-547, 1992.
    • (1992) J. Log. Comput. , vol.2 , Issue.4 , pp. 511-547
    • Cousot, P.1    Cousot, R.2
  • 15
    • 0016543936 scopus 로고
    • Guarded commands, nondeterminancy and formal derivation of programs
    • E. W. Dijkstra. Guarded commands, nondeterminancy and formal derivation of programs. Communications of the ACM, 18:453-457, 1975.
    • (1975) Communications of the ACM , vol.18 , pp. 453-457
    • Dijkstra, E.W.1
  • 16
    • 24244437523 scopus 로고    scopus 로고
    • Why: A multi-language multi-prover verification tool
    • LRI, Université Paris Sud, March
    • J.-C. Filliâtre. Why: a multi-language multi-prover verification tool. Research Report 1366, LRI, Université Paris Sud, March 2003.
    • (2003) Research Report , vol.1366
    • Filliâtre, J.-C.1
  • 17
    • 35048862900 scopus 로고    scopus 로고
    • Multi-prover verification of C programs
    • Proc. of the 6th International Conference on Formal Engineering Methods, Nov.
    • J.-C. Filliâtre and C. Marché. Multi-Prover Verification of C Programs. In Proc. of the 6th International Conference on Formal Engineering Methods, volume 3308 of LNCS, pages 15-29, Nov. 2004.
    • (2004) LNCS , vol.3308 , pp. 15-29
    • Filliâtre, J.-C.1    Marché, C.2
  • 19
    • 33745666568 scopus 로고    scopus 로고
    • Evaluating the Java virtual machine as a target for languages other than Java
    • Sept.
    • K. J. Cough and D. Corney. Evaluating the Java virtual machine as a target for languages other than Java. In Joint Modula Languages Conference, Sept. 2000.
    • (2000) Joint Modula Languages Conference
    • Cough, K.J.1    Corney, D.2
  • 22
    • 0037432611 scopus 로고    scopus 로고
    • Verified bytecode verifiers
    • G. Klein and T. Nipkow. Verified bytecode verifiers. Theor. Comput. Sci., 298(3):583-626, 2003.
    • (2003) Theor. Comput. Sci. , vol.298 , Issue.3 , pp. 583-626
    • Klein, G.1    Nipkow, T.2
  • 23
    • 33745659269 scopus 로고    scopus 로고
    • Toolkits for the automatic construction of data flow analyzers
    • University of Oregon
    • J. H. E. F. Lasseter. Toolkits for the automatic construction of data flow analyzers. Technical Report CIS-TR-04-03, University of Oregon, 2003.
    • (2003) Technical Report , vol.CIS-TR-04-03
    • Lasseter, J.H.E.F.1
  • 30
    • 1942516273 scopus 로고    scopus 로고
    • Lightweight bytecode verification
    • E. Rose. Lightweight bytecode verification. J. Autom. Reason., 31(3-4):303-334, 2003.
    • (2003) J. Autom. Reason. , vol.31 , Issue.3-4 , pp. 303-334
    • Rose, E.1
  • 31
    • 84955607329 scopus 로고
    • Monads for functional programming
    • Advanced Functional Programming, Springer
    • P. Wadler. Monads for functional programming. In Advanced Functional Programming, volume 925 of LNCS, pages 24-52. Springer, 1995.
    • (1995) LNCS , vol.925 , pp. 24-52
    • Wadler, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.