We devise a mechanism to verify the safety of machine codes. We design a stack based machine etySECK whose code part is annotated with types and effects. And we propose an effect type system to verify properties of etySECK programs. Our system analyzes memory effects as a property of programs and we can extend our system to analyze other effects. 1 Effect-Typed Abstract Machine: etySECK The etySECK machine is a variant of Landin’s SECD [1, 2, 3, 4] machine with type and effect annotations. The syntax and the semantics of the machine is described in Figure 1 and 2, respectively. Since the machine supports functional values, compilation from functional languages to this machine is not difficult. Throughout this paper, we use dot(.) as a list ...
Large systems in modern development consist of many concurrent processes. To prove safety properties...
AbstractOut of annotated programs proof carrying code systems construct and prove verification condi...
Abstract. The design and implementation of a correct system can be-nefit from employing static techn...
We check statically whether it is safe for untrusted foreign machine code to be loaded into a truste...
We present the algorithms used in McVeto (Machine-Code VErification TOol), a tool to check whether ...
It is frequently needed to compile stack-machine codes into register-machine codes. One important op...
Abstract. This paper shows how type effect systems can be combined with model-checking techniques to...
Side-effect are ubiquitous in programming. Examples include mutable state, exceptions, non-determini...
Importing and executing untrusted foreign code has become an everyday occurrence: Web servers downlo...
Effect handlers have recently gained popularity amongst programming language researchers. Existing t...
In this paper we present a method for verifying Yhc bytecode, an intermediate form of Haskell suitab...
Abstract. The design and implementation of a correct system can benefit from employing static techni...
Type-and-effect systems are a powerful tool for program construction and verification. We describe i...
This paper presents a semantic framework for data abstraction and refinement for verifying safety pr...
We extend type and effect analyses to permit dynamically changing effects and dynamically changing c...
Large systems in modern development consist of many concurrent processes. To prove safety properties...
AbstractOut of annotated programs proof carrying code systems construct and prove verification condi...
Abstract. The design and implementation of a correct system can be-nefit from employing static techn...
We check statically whether it is safe for untrusted foreign machine code to be loaded into a truste...
We present the algorithms used in McVeto (Machine-Code VErification TOol), a tool to check whether ...
It is frequently needed to compile stack-machine codes into register-machine codes. One important op...
Abstract. This paper shows how type effect systems can be combined with model-checking techniques to...
Side-effect are ubiquitous in programming. Examples include mutable state, exceptions, non-determini...
Importing and executing untrusted foreign code has become an everyday occurrence: Web servers downlo...
Effect handlers have recently gained popularity amongst programming language researchers. Existing t...
In this paper we present a method for verifying Yhc bytecode, an intermediate form of Haskell suitab...
Abstract. The design and implementation of a correct system can benefit from employing static techni...
Type-and-effect systems are a powerful tool for program construction and verification. We describe i...
This paper presents a semantic framework for data abstraction and refinement for verifying safety pr...
We extend type and effect analyses to permit dynamically changing effects and dynamically changing c...
Large systems in modern development consist of many concurrent processes. To prove safety properties...
AbstractOut of annotated programs proof carrying code systems construct and prove verification condi...
Abstract. The design and implementation of a correct system can be-nefit from employing static techn...