This thesis is concerned with different aspects of Java Card application development and use of formal methods in the Java Card world. Java Card is a technology that provides means to program smart (chip) cards with (a subset of) the Java language. The use of formal methods in the Java Card context is highly justified due to the criticality of Java Card applications. First of all, Java Card applications are usually security critical (e.g., authentication, electronic cash), second, they are cost critical (i.e. they are distributed in large amounts making updates quite difficult) and finally, they can also be legally critical (e.g., when the digital signature law is considered). Thus the robustness and correctness of Java Card applications...
AbstractThis paper presents a case study in the formal specification and verification of a smart car...
Abstract. We present a formally verified reference implementation of the JAVA CARD API. This case st...
International audienceThis paper presents a novel approach to the problem of bytecode verification f...
This thesis is concerned with formal development of Java Card applets. Java Card is a technology tha...
We present an approach to rigorous, tool supported design and development of Java Card applications....
Smart cards are used in security critical applications where money or private data is involved. Exam...
COSTA, Umberto Souza da; MOREIRA, Anamaria Martins; MUSICANTE, Martin A. Specification and Runtime V...
COSTA, Umberto Souza; MOREIRA, Anamaria Martins; MUSICANTE, Matin A.; SOUZA NETO, Plácido A. JCML: A...
AbstractJava Card is a version of Java developed to run on devices with severe storage and processin...
AbstractJava Card is a version of Java developed to run on devices with severe storage and processin...
We present how common Java Card security properties can be formalised in Dynamic Logic and verified,...
Although formal methods can dramatically increase the quality of software systems, they have not wid...
bUniversity of Nijmegen, the Netherlands This paper presents a case study in formal specification an...
Formal methods should be used to specify and verify on-card software in Java Card applications. Furt...
Abstract This paper describes the design and implementation of a static analysis tool for certifying...
AbstractThis paper presents a case study in the formal specification and verification of a smart car...
Abstract. We present a formally verified reference implementation of the JAVA CARD API. This case st...
International audienceThis paper presents a novel approach to the problem of bytecode verification f...
This thesis is concerned with formal development of Java Card applets. Java Card is a technology tha...
We present an approach to rigorous, tool supported design and development of Java Card applications....
Smart cards are used in security critical applications where money or private data is involved. Exam...
COSTA, Umberto Souza da; MOREIRA, Anamaria Martins; MUSICANTE, Martin A. Specification and Runtime V...
COSTA, Umberto Souza; MOREIRA, Anamaria Martins; MUSICANTE, Matin A.; SOUZA NETO, Plácido A. JCML: A...
AbstractJava Card is a version of Java developed to run on devices with severe storage and processin...
AbstractJava Card is a version of Java developed to run on devices with severe storage and processin...
We present how common Java Card security properties can be formalised in Dynamic Logic and verified,...
Although formal methods can dramatically increase the quality of software systems, they have not wid...
bUniversity of Nijmegen, the Netherlands This paper presents a case study in formal specification an...
Formal methods should be used to specify and verify on-card software in Java Card applications. Furt...
Abstract This paper describes the design and implementation of a static analysis tool for certifying...
AbstractThis paper presents a case study in the formal specification and verification of a smart car...
Abstract. We present a formally verified reference implementation of the JAVA CARD API. This case st...
International audienceThis paper presents a novel approach to the problem of bytecode verification f...