AbstractThe current definition of the Java bytecode verifier, as well as the proposals to formalize it, does not include any check about the structured use of locks by monitorenter and monitorexit instructions. So code is run, even if critical sections are corrupted. In this paper, we isolate a sublanguage of the Java Virtual Machine with thread creation and mutual exclusion. For this subset, we define a semantics and a formal verifier that enforces basic properties of threads and lock and unlock operations. The verifier integrates well with previous formalizations of the Java bytecode verifier. Our analysis of structured use of locks reveals the presence of bugs in the current compilers from Sun, IBM and Microsoft
In the standard Java implementation, a Java language program is compiled to Java bytecode and this b...
This paper gives a mathematical specification the Java Virtual Machine (JVM) bytecode verifier. The ...
When an applet is sent over the internet, Java Virtual Machine code is transmitted and remotely exec...
AbstractThe current definition of the Java bytecode verifier, as well as the proposals to formalize ...
Abstract. The current denition of the Java Bytecode Verier, as well as the proposals to formalize it...
The Java Virtual Machine executes bytecode programs that may have been sent from other, possibly unt...
This paper presents a sound type system for a large subset of the Java bytecode language including c...
Abstract Confined types enforce a form of encapsulation stronger than what the standard Java typesys...
The language-based approach to security employs programming language technologies to construct secur...
This paper presents an approach to addressing the known weaknesses and security issues of JVM stack ...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
The Java Virtual Machine embodies a verifier which performs a set of checks on bytecode programs bef...
The Java Virtual Machine embodies a verifier which performs a set of checks on bytecode programs bef...
Many concurrency models have been developed for high-level programming lan-guages such as Java. A tr...
AbstractThere are many mechanisms for concurrency control in high-level programming languages. In Ja...
In the standard Java implementation, a Java language program is compiled to Java bytecode and this b...
This paper gives a mathematical specification the Java Virtual Machine (JVM) bytecode verifier. The ...
When an applet is sent over the internet, Java Virtual Machine code is transmitted and remotely exec...
AbstractThe current definition of the Java bytecode verifier, as well as the proposals to formalize ...
Abstract. The current denition of the Java Bytecode Verier, as well as the proposals to formalize it...
The Java Virtual Machine executes bytecode programs that may have been sent from other, possibly unt...
This paper presents a sound type system for a large subset of the Java bytecode language including c...
Abstract Confined types enforce a form of encapsulation stronger than what the standard Java typesys...
The language-based approach to security employs programming language technologies to construct secur...
This paper presents an approach to addressing the known weaknesses and security issues of JVM stack ...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
The Java Virtual Machine embodies a verifier which performs a set of checks on bytecode programs bef...
The Java Virtual Machine embodies a verifier which performs a set of checks on bytecode programs bef...
Many concurrency models have been developed for high-level programming lan-guages such as Java. A tr...
AbstractThere are many mechanisms for concurrency control in high-level programming languages. In Ja...
In the standard Java implementation, a Java language program is compiled to Java bytecode and this b...
This paper gives a mathematical specification the Java Virtual Machine (JVM) bytecode verifier. The ...
When an applet is sent over the internet, Java Virtual Machine code is transmitted and remotely exec...