In this thesis we study the static analysis of Java bytecode and its semantics foundations. The initialization of an information system is a delicate operation where security properties are enforced and invariants installed. Initialization of fields, objects and classes in Java are difficult operations. These difficulties may lead to security breaches and to bugs, and make the static verification of software more difficult. This thesis proposes static analyses to better master initialization in Java. Hence, we propose a null pointer analysis that finely tracks initialization of fields. It allows proving the absence of dereferencing of null pointers (NullPointerException) and refining the intra-procedural control flow graph. We present anoth...
This experimental paper describes the implementation and evaluation of a static nullness analyser fo...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
The Java programming language has been widely described as secure by design. Nevertheless, a number ...
Proceedings of the Fourth Workshop on Bytecode Semantics, Verification, Analysis and Transformation ...
AbstractAlthough in most cases class initialization works as expected, some static fields may be rea...
International audienceSun and the CERT recommend for secure Java development to not allow partially ...
AbstractWe propose two control flow analyses for the Java bytecode. They safely approximate the set ...
The Julia static analyzer applies abstract interpretation to the analysis and verification of Java b...
We present a method to certify a subset of the Java bytecode, with respect to security. The method i...
We describe our software tool Julia for the static analysis of full Java bytecode, for optimisation ...
Static analyses based on denotational semantics can naturally modelfunctional behaviours of the code...
Freshly created objects are a blank slate: their mutable state and their constant properties must be...
Security is becoming a major issue in our highly networked and computerized era. Malicious code dete...
International audienceThe strict and clear semantics of Java make it an ideal language for static an...
In Java, C or C++, attempts to dereference the nil value result in anexception or a segmentation fau...
This experimental paper describes the implementation and evaluation of a static nullness analyser fo...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
The Java programming language has been widely described as secure by design. Nevertheless, a number ...
Proceedings of the Fourth Workshop on Bytecode Semantics, Verification, Analysis and Transformation ...
AbstractAlthough in most cases class initialization works as expected, some static fields may be rea...
International audienceSun and the CERT recommend for secure Java development to not allow partially ...
AbstractWe propose two control flow analyses for the Java bytecode. They safely approximate the set ...
The Julia static analyzer applies abstract interpretation to the analysis and verification of Java b...
We present a method to certify a subset of the Java bytecode, with respect to security. The method i...
We describe our software tool Julia for the static analysis of full Java bytecode, for optimisation ...
Static analyses based on denotational semantics can naturally modelfunctional behaviours of the code...
Freshly created objects are a blank slate: their mutable state and their constant properties must be...
Security is becoming a major issue in our highly networked and computerized era. Malicious code dete...
International audienceThe strict and clear semantics of Java make it an ideal language for static an...
In Java, C or C++, attempts to dereference the nil value result in anexception or a segmentation fau...
This experimental paper describes the implementation and evaluation of a static nullness analyser fo...
Security of Java programs is important as they can be executed in different platforms. This paper ad...
The Java programming language has been widely described as secure by design. Nevertheless, a number ...