AbstractThis paper presents a verifier for the memory-safe execution of extended Java bytecodes that support region-based memory management and explicit deallocation primitives. The verifier reads in region-annotated bytecodes that augment the standard Java bytecodes with instructions for creating and removing memory regions, allocating objects in regions, and passing regions as parameters. The verification ensures that each region is live when objects in the region are in use and that the program does not follow dangling references.The verifier requires region-safety certificates to be provided along with the bytecodes. The verification process consists of a load-time verification of method bodies, and a lazy linkage verification of method...
We propose a framework for establishing the correctness of untrusted Java bytecode components w.r.t....
The Java Virtual Machine executes bytecode programs that may have been sent from other, possibly unt...
Pointer analysis statically approximates the heap pointer structure during a program execution in or...
Java applets run on a Virtual Machine that checks code's integrity and correctness before execu...
Bytecode verification forms the corner stone of the Java security model that ensures the integrity o...
AbstractBytecode verification forms the corner stone of the Java security model that ensures the int...
The bytecode verification is a key point of the security chain of the Java Platform. This feature is...
Bytecode verification forms the corner stone of the Java security model that ensures the integrity o...
Region-based memory management offers several important potential advantages over garbage collection...
Bytecode verification is one of the key security functions of several architectures for mobile and e...
Lightweigth byte code verification uses stack maps to annotate Java byte code programs with type inf...
The Java Virtual Machine embodies a verifier which performs a set of checks on bytecode programs bef...
Dynamic array bound checks are crucial elements for the security of a Java Virtual Machines. These d...
The Java Virtual Machine embodies a verifier which performs a set of checks on bytecode programs bef...
Region-based memory management offers several important advantages over garbage-collected heap, incl...
We propose a framework for establishing the correctness of untrusted Java bytecode components w.r.t....
The Java Virtual Machine executes bytecode programs that may have been sent from other, possibly unt...
Pointer analysis statically approximates the heap pointer structure during a program execution in or...
Java applets run on a Virtual Machine that checks code's integrity and correctness before execu...
Bytecode verification forms the corner stone of the Java security model that ensures the integrity o...
AbstractBytecode verification forms the corner stone of the Java security model that ensures the int...
The bytecode verification is a key point of the security chain of the Java Platform. This feature is...
Bytecode verification forms the corner stone of the Java security model that ensures the integrity o...
Region-based memory management offers several important potential advantages over garbage collection...
Bytecode verification is one of the key security functions of several architectures for mobile and e...
Lightweigth byte code verification uses stack maps to annotate Java byte code programs with type inf...
The Java Virtual Machine embodies a verifier which performs a set of checks on bytecode programs bef...
Dynamic array bound checks are crucial elements for the security of a Java Virtual Machines. These d...
The Java Virtual Machine embodies a verifier which performs a set of checks on bytecode programs bef...
Region-based memory management offers several important advantages over garbage-collected heap, incl...
We propose a framework for establishing the correctness of untrusted Java bytecode components w.r.t....
The Java Virtual Machine executes bytecode programs that may have been sent from other, possibly unt...
Pointer analysis statically approximates the heap pointer structure during a program execution in or...