메뉴 건너뛰기




Volumn 2410, Issue , 2002, Pages 47-66

Verified bytecode model checkers

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE REUSABILITY; DATA FLOW ANALYSIS; DATA TRANSFER; JAVA PROGRAMMING LANGUAGE; NETWORK SECURITY; THEOREM PROVING; VIRTUAL MACHINE;

EID: 84945292289     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45685-6_5     Document Type: Conference Paper
Times cited : (13)

References (19)
  • 4
    • 0346246659 scopus 로고    scopus 로고
    • A type system for object initialisation in the Java byte-code language
    • Systems, Languages and Applications
    • S. Freund and J. Mitchell. A type system for object initialisation in the Java byte-code language. In ACM Conf. Object-Oriented Programming: Systems, Languages and Applications, 1998.
    • (1998) ACM Conf. Object-Oriented Programming
    • Freund, S.1    Mitchell, J.2
  • 5
    • 0033203874 scopus 로고    scopus 로고
    • A formal framework for the java bytecode language and verifier
    • Systems, Languages and Applications
    • S.N. Freund and J. C. Mitchell. A formal framework for the java bytecode language and verifier. In ACM Conf. Object-Oriented Programming: Systems, Languages and Applications, 1999.
    • (1999) ACM Conf. Object-Oriented Programming
    • Freund, S.N.1    Mitchell, J.C.2
  • 7
    • 84905051857 scopus 로고    scopus 로고
    • On a new method for dataflow analysis of Java virtual machine subroutines
    • of LNCS, Springer-Verlag
    • M. Hagiya and A. Tozawa. On a new method for dataflow analysis of Java virtual machine subroutines. In G. Levi, editor. Static Analysis (SAS'98), volume 1503 of LNCS, pages 17-32. Springer-Verlag, 1998.
    • (1998) G. Levi, Editor. Static Analysis (SAS'98) , vol.1503 , pp. 17-32
    • Hagiya, M.1    Tozawa, A.2
  • 9
    • 84958745294 scopus 로고    scopus 로고
    • Java Bytecode Verification: An Overview
    • G. Berry, H. Comon, and A. Finkel, editors, Springer-Verlag
    • X. Leroy. Java Bytecode Verification: An Overview. In G. Berry, H. Comon, and A. Finkel, editors. CAV 2001, LNCS, pages 265-285. Springer-Verlag, 2001.
    • (2001) CAV 2001, LNCS , pp. 265-285
    • Leroy, X.1
  • 13
    • 0002038543 scopus 로고    scopus 로고
    • Java: Embedding a programming language in a theorem prover
    • F. Bauer and R. Steinbraggen, editors, IOS Press
    • T. Nipkow, D.v. Oheimb, and C. Pusch. Java: Embedding a programming language in a theorem prover. In F. Bauer and R. Steinbraggen, editors, Foundations ofSecure Computation, pages 117-144. IOS Press, 2000.
    • (2000) Foundations Ofsecure Computation , pp. 117-144
    • Nipkow, T.1    Oheimb, D.V.2    Pusch, C.3
  • 16
    • 0031701157 scopus 로고    scopus 로고
    • Data flow analysis is model checking of abstract interpretations
    • ACM Press
    • D.A. Schmidt. Data flow analysis is model checking of abstract interpretations. In POPL'98, pages 38-48. ACM Press 1998.
    • (1998) POPL'98 , pp. 38-48
    • Schmidt, D.A.1
  • 17
    • 0001076184 scopus 로고    scopus 로고
    • A formal specification of Java Virtual Machine instructions for objects, methods and subroutines
    • J. Alves-Foss, editor, Springer-Verlag
    • Z. Qian. A formal specification of Java Virtual Machine instructions for objects, methods and subroutines. In J. Alves-Foss, editor, Formal Syntax and Semantics of Java, volume 1523 of LNCS, pages 271-311. Springer-Verlag, 1999.
    • (1999) Formal Syntax and Semantics of Java , vol.1523 , pp. 271-311
    • Qian, Z.1
  • 18
    • 0001362437 scopus 로고    scopus 로고
    • Standard fixpoint iteration for Java bytecode verification. ACM Trans
    • Z. Qian. Standard fixpoint iteration for Java bytecode verification. ACM Trans. Programming Languages and Systems, 22(4):638-672, 2000.
    • (2000) Programming Languages and Systems , vol.22 , Issue.4 , pp. 638-672
    • Qian, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.