메뉴 건너뛰기




Volumn 4421 LNCS, Issue , 2007, Pages 125-140

A certified lightweight non-interference Java bytecode verifier

Author keywords

[No Author keywords available]

Indexed keywords

BINARY CODES; HIGH LEVEL LANGUAGES; MACHINE ORIENTED LANGUAGES; SEMANTICS; VERIFICATION;

EID: 37149048216     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-71316-6_10     Document Type: Conference Paper
Times cited : (51)

References (23)
  • 1
    • 0033686981 scopus 로고    scopus 로고
    • A semantic model of types and machine instuctions for proof-carrying code
    • ACM Press
    • A.W. Appel and A.P. Felty. A semantic model of types and machine instuctions for proof-carrying code. In Proceedings of POPL '00, pages 243-253. ACM Press, 2000.
    • (2000) Proceedings of POPL '00 , pp. 243-253
    • Appel, A.W.1    Felty, A.P.2
  • 3
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based access control for secure information flow
    • March
    • A. Banerjee and D. Naumann. Stack-based access control for secure information flow. Journal of Functional Programming, 15:131-177, March 2005.
    • (2005) Journal of Functional Programming , vol.15 , pp. 131-177
    • Banerjee, A.1    Naumann, D.2
  • 5
    • 85069029287 scopus 로고    scopus 로고
    • Non-interference for low level languages
    • Technical report, INRIA
    • G. Barthe, D. Pichardie, and T. Rezk. Non-interference for low level languages. Technical report, INRIA, 2006. http://hal.inria.fr/inria-00106182.
    • (2006)
    • Barthe, G.1    Pichardie, D.2    Rezk, T.3
  • 6
    • 29144532201 scopus 로고    scopus 로고
    • Non-interference for a JVM-like language
    • M. Fähndrich, editor, ACM Press
    • G. Barthe and T. Rezk. Non-interference for a JVM-like language. In M. Fähndrich, editor, Proceedings of TLDI'05, pages 103-112. ACM Press, 2005.
    • (2005) Proceedings of TLDI'05 , pp. 103-112
    • Barthe, G.1    Rezk, T.2
  • 7
    • 33749615715 scopus 로고    scopus 로고
    • Proof-Carrying Code from Certified Abstract Interpretation and Fixpoint Compression
    • F. Besson, T. Jensen, and D Pichardie. Proof-Carrying Code from Certified Abstract Interpretation and Fixpoint Compression. Theoretical Computer Science, 364(3) :273-291, 2006.
    • (2006) Theoretical Computer Science , vol.364 , Issue.3 , pp. 273-291
    • Besson, F.1    Jensen, T.2    Pichardie, D.3
  • 9
    • 33745821985 scopus 로고    scopus 로고
    • Information flow analysis for a typed assembly language with polymorphic stacks
    • Proceedings of CASSIS'05, of, Springer-Verlag
    • E. Bonelli, A.B. Compagnoni, and R. Medel. Information flow analysis for a typed assembly language with polymorphic stacks. In Proceedings of CASSIS'05, volume 3956 of Lecture Notes in Computer Science, pages 37-56. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3956 , pp. 37-56
    • Bonelli, E.1    Compagnoni, A.B.2    Medel, R.3
  • 10
    • 24144440405 scopus 로고    scopus 로고
    • Information Flow Analysis for Java Bytecode
    • Proceedings of VMCAI'05, of, Springer-Verlag
    • S. Genaim and F. Spoto. Information Flow Analysis for Java Bytecode. In Proceedings of VMCAI'05, volume 3385 of Lecture Notes in Computer Science, pages 346-362. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3385 , pp. 346-362
    • Genaim, S.1    Spoto, F.2
  • 11
    • 1442287656 scopus 로고    scopus 로고
    • Abstract non-interference: Parameterizing noninterference by abstract interpretation
    • ACM Press
    • R. Giacobazzi and I. Mastroeni. Abstract non-interference: Parameterizing noninterference by abstract interpretation. In Proceedings of POPL'04, pages 186-197. ACM Press, 2004.
    • (2004) Proceedings of POPL'04 , pp. 186-197
    • Giacobazzi, R.1    Mastroeni, I.2
  • 12
    • 33947687258 scopus 로고    scopus 로고
    • Noninterference in the presence of non-opaque pointers
    • IEEE Computer Society Press
    • D. Hedin and D. Sands. Noninterference in the presence of non-opaque pointers. In Proceedings of CSFW'06, pages 255-269. IEEE Computer Society Press, 2006.
    • (2006) Proceedings of CSFW'06 , pp. 255-269
    • Hedin, D.1    Sands, D.2
  • 13
    • 33745218338 scopus 로고    scopus 로고
    • On Flow-Sensitive Security Types
    • ACM Press
    • S. Hunt and D. Sands. On Flow-Sensitive Security Types. In Proceedings of POPL'06, pages 79-90. ACM Press, 2006.
    • (2006) Proceedings of POPL'06 , pp. 79-90
    • Hunt, S.1    Sands, D.2
  • 14
    • 0037051773 scopus 로고    scopus 로고
    • Bytecode verification on Java smart cards
    • April
    • X. Leroy. Bytecode verification on Java smart cards. Software-practice and experience, 32(4):319-340, April 2002.
    • (2002) Software-practice and experience , vol.32 , Issue.4 , pp. 319-340
    • Leroy, X.1
  • 15
    • 0032646625 scopus 로고    scopus 로고
    • Jflow: Practical mostly-static information flow control
    • ACM Press
    • A.C. Myers. Jflow: Practical mostly-static information flow control. In Proceedings of POPL'99, pages 228-241. ACM Press, 1999.
    • (1999) Proceedings of POPL'99 , pp. 228-241
    • Myers, A.C.1
  • 16
    • 26844529721 scopus 로고    scopus 로고
    • Verifying a secure information flow analyzer
    • Proceedings of TPHOLs'05, of, Springer-Verlag
    • D. Naumann. Verifying a secure information flow analyzer. In Proceedings of TPHOLs'05, volume 3603 of Lecture Notes in Computer Science, pages 211-226. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3603 , pp. 211-226
    • Naumann, D.1
  • 18
    • 33947645959 scopus 로고    scopus 로고
    • Securing interaction between threads and the scheduler
    • A. Russo and A. Sabelfeld. Securing interaction between threads and the scheduler. In Proceedings of CSFW'06, 2006.
    • (2006) Proceedings of CSFW'06
    • Russo, A.1    Sabelfeld, A.2
  • 20
    • 28144453799 scopus 로고    scopus 로고
    • Dimensions and principles of declassification
    • IEEE Press
    • A. Sabelfeld and D. Sands. Dimensions and principles of declassification. In Proceedings of CSFW'05. IEEE Press, 2005.
    • (2005) Proceedings of CSFW'05
    • Sabelfeld, A.1    Sands, D.2
  • 21
    • 84956989228 scopus 로고    scopus 로고
    • A Type-Based Approach to Program Security
    • M. Bidoit and M. Dauchet, editors, Proceedings of TAPSOFT'97, of, Springer-Verlag
    • D. Volpano and G. Smith. A Type-Based Approach to Program Security. In M. Bidoit and M. Dauchet, editors, Proceedings of TAPSOFT'97, volume 1214 of Lecture Notes in Computer Science, pages 607-621. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1214 , pp. 607-621
    • Volpano, D.1    Smith, G.2
  • 22
    • 33745771350 scopus 로고    scopus 로고
    • A typed assembly language for confidentiality
    • P. Sestoft, editor, Proceedings of ESOP'06, of, Springer-Verlag
    • D. Yu and N. Islam. A typed assembly language for confidentiality. In P. Sestoft, editor, Proceedings of ESOP'06, volume 3924 of Lecture Notes in Computer Science, pages 162-179. Springer-Verlag, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3924 , pp. 162-179
    • Yu, D.1    Islam, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.