We present an abstract machine that encodes both type safety and control safety in an efficient manner and that is suitable as a mobile-code format. At the code consumer, a single linear-complexity algorithm performs not only verification, but simultaneously also transforms the stack-based wire format into a register-based internal format. The latter is beneficial for interpretation and native code generation. Our dual-representation approach overcomes some of the disadvantages of existing mobile-code representations, such as the JVM and CLR wire formats
AbstractThe Java Virtual Machine is primarily designed for transporting Java programs. As a conseque...
Abstract. A certified program analysis is an analysis whose implementation is accompanied by a check...
1 Introduction One of the most important challenges which computing research faces today is the deve...
We present a general framework for provably safe mobile code. It relies on a formal definition of a ...
We introduce SafeTSA, a type-safe mobile code representation based on static single assignment form....
AbstractWe present a general framework for provably safe mobile code. It relies on a formal definiti...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
We introduce SafeTSA, a type-safe mobile code representation based on static single assignment form....
AbstractRecent approaches to mobile code safety, like proof-carrying code, involve associating safet...
The interaction between software systems by means of mobile code is a powerful and truly effective m...
AbstractWe explore an intuitionistic fragment of Artëmov’s Justification Logic as a type system for ...
Abstract Proof-Carrying Code (PCC) is a general approach to mobile code safety in which programs are...
The Java Virtual Machine is primarily designed for transporting Java programs. As a consequence, whe...
Proof-Carrying Code (PCC) is a general approach to mobile code safety in which programs are augmente...
Security flaws are routinely discovered in commercial implementations of mobile code systems such as...
AbstractThe Java Virtual Machine is primarily designed for transporting Java programs. As a conseque...
Abstract. A certified program analysis is an analysis whose implementation is accompanied by a check...
1 Introduction One of the most important challenges which computing research faces today is the deve...
We present a general framework for provably safe mobile code. It relies on a formal definition of a ...
We introduce SafeTSA, a type-safe mobile code representation based on static single assignment form....
AbstractWe present a general framework for provably safe mobile code. It relies on a formal definiti...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
We introduce SafeTSA, a type-safe mobile code representation based on static single assignment form....
AbstractRecent approaches to mobile code safety, like proof-carrying code, involve associating safet...
The interaction between software systems by means of mobile code is a powerful and truly effective m...
AbstractWe explore an intuitionistic fragment of Artëmov’s Justification Logic as a type system for ...
Abstract Proof-Carrying Code (PCC) is a general approach to mobile code safety in which programs are...
The Java Virtual Machine is primarily designed for transporting Java programs. As a consequence, whe...
Proof-Carrying Code (PCC) is a general approach to mobile code safety in which programs are augmente...
Security flaws are routinely discovered in commercial implementations of mobile code systems such as...
AbstractThe Java Virtual Machine is primarily designed for transporting Java programs. As a conseque...
Abstract. A certified program analysis is an analysis whose implementation is accompanied by a check...
1 Introduction One of the most important challenges which computing research faces today is the deve...