AbstractProgram logics for bytecode languages such as Java bytecode or the .NET CIL can be used to apply Proof-Carrying Code concepts to bytecode programs and to verify correctness properties of bytecode programs. This paper presents a Hoare-style logic for a sequential bytecode kernel language similar to Java bytecode and CIL. The logic handles object-oriented features such as inheritance, dynamic method binding, and object structures with destructive updates, as well as unstructured control flow with jumps. It is sound and complete
International audienceBytecode verification is a crucial security component for Java applets, on the...
AbstractMany information-flow type systems have been developed that allow to control the non-interfe...
textHow do we know that a bytecode-verified Java program will run safely? This dissertation address...
AbstractProgram logics for bytecode languages such as Java bytecode or the .NET CIL can be used to a...
One significant disadvantage of interpreted bytecode languages, such as Java, is their low execution...
AbstractOut of annotated programs proof carrying code systems construct and prove verification condi...
Bytecode verification is one of the key security functions of several architectures for mobile and e...
AbstractIn the Mobile Resource Guarantees project's Proof Carrying Code implementation, .class files...
We propose a framework for establishing the correctness of untrusted Java bytecode components w.r.t....
We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized vari...
AbstractThis article presents a type certifying compiler for a subset of Java and proves the type co...
Automatic program verifiers typically generate verification conditions from the program and discharg...
Program transformation has gained a wide interest since it is used for several purposes: altering se...
International audienceThis paper deals with formal specification and verification of Java bytecode u...
AbstractMany modern program verifiers translate the program to be verified and its specification int...
International audienceBytecode verification is a crucial security component for Java applets, on the...
AbstractMany information-flow type systems have been developed that allow to control the non-interfe...
textHow do we know that a bytecode-verified Java program will run safely? This dissertation address...
AbstractProgram logics for bytecode languages such as Java bytecode or the .NET CIL can be used to a...
One significant disadvantage of interpreted bytecode languages, such as Java, is their low execution...
AbstractOut of annotated programs proof carrying code systems construct and prove verification condi...
Bytecode verification is one of the key security functions of several architectures for mobile and e...
AbstractIn the Mobile Resource Guarantees project's Proof Carrying Code implementation, .class files...
We propose a framework for establishing the correctness of untrusted Java bytecode components w.r.t....
We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized vari...
AbstractThis article presents a type certifying compiler for a subset of Java and proves the type co...
Automatic program verifiers typically generate verification conditions from the program and discharg...
Program transformation has gained a wide interest since it is used for several purposes: altering se...
International audienceThis paper deals with formal specification and verification of Java bytecode u...
AbstractMany modern program verifiers translate the program to be verified and its specification int...
International audienceBytecode verification is a crucial security component for Java applets, on the...
AbstractMany information-flow type systems have been developed that allow to control the non-interfe...
textHow do we know that a bytecode-verified Java program will run safely? This dissertation address...