Java security is a problem that is raised sharply with its ubiquity through Internet. Sun provides two kinds of specifications of Java bytecode verifier, which is used to ensure the soundness of a program. One is a prose specification and the other is a reference to implementation. Neither of these two way is a good approach to solve the security problems. This thesis proposes a new way to formalize Java bytecode verifier by using Z language. The formal method is usually a perfect choice to some novel, difficult and critical projects. As a model-based formal specification language, Z is a good language to model a well-structured system. Besides the well-structured way it can offer, Z can also support verification of the implementation based...
When an applet is sent over the internet, Java Virtual Machine code is transmitted and remotely exec...
The Java Virtual Machine embodies a verifier that performs a set of checks on Java bytecode programs...
We present a method to certify a subset of the Java bytecode, with respect to security. The method i...
This paper presents a sound type system for a large subset of the Java bytecode language including c...
The Java Virtual Machine executes bytecode programs that may have been sent from other, possibly unt...
The Java Virtual Machine embodies a verifier which performs a set of checks on bytecode programs bef...
The Java Virtual Machine embodies a verifier which performs a set of checks on bytecode programs bef...
Bytecode verification is a crucial security component for Java applets, on the Web and on embedded d...
International audienceBytecode verification is a crucial security component for Java applets, on the...
Bytecode verification is one of the key security functions of several architectures for mobile and e...
This paper provides a comprehensive analysis of the specification, along with concrete suggestions f...
We propose a framework for establishing the correctness of untrusted Java bytecode components w.r.t....
AbstractBytecode verification forms the corner stone of the Java security model that ensures the int...
Coding either a scanner or a parser from beginning has many disadvantages such as tedious, could rai...
Bytecode verification forms the corner stone of the Java security model that ensures the integrity o...
When an applet is sent over the internet, Java Virtual Machine code is transmitted and remotely exec...
The Java Virtual Machine embodies a verifier that performs a set of checks on Java bytecode programs...
We present a method to certify a subset of the Java bytecode, with respect to security. The method i...
This paper presents a sound type system for a large subset of the Java bytecode language including c...
The Java Virtual Machine executes bytecode programs that may have been sent from other, possibly unt...
The Java Virtual Machine embodies a verifier which performs a set of checks on bytecode programs bef...
The Java Virtual Machine embodies a verifier which performs a set of checks on bytecode programs bef...
Bytecode verification is a crucial security component for Java applets, on the Web and on embedded d...
International audienceBytecode verification is a crucial security component for Java applets, on the...
Bytecode verification is one of the key security functions of several architectures for mobile and e...
This paper provides a comprehensive analysis of the specification, along with concrete suggestions f...
We propose a framework for establishing the correctness of untrusted Java bytecode components w.r.t....
AbstractBytecode verification forms the corner stone of the Java security model that ensures the int...
Coding either a scanner or a parser from beginning has many disadvantages such as tedious, could rai...
Bytecode verification forms the corner stone of the Java security model that ensures the integrity o...
When an applet is sent over the internet, Java Virtual Machine code is transmitted and remotely exec...
The Java Virtual Machine embodies a verifier that performs a set of checks on Java bytecode programs...
We present a method to certify a subset of the Java bytecode, with respect to security. The method i...