AbstractOut of annotated programs proof carrying code systems construct and prove verification conditions that guarantee a given safety policy. The annotations may come from various program analyzers and must not be trusted as they need to be verified. A generic verification condition generator can be utilized such that a combination of annotations is verified incrementally. New annotations may be verified by using previously verified ones as trusted facts. We show how results from a trusted type analyzer may be combined with untrusted interval analysis to automatically verify that bytecode programs do not overflow. All trusted components are formalized and verified in Isabelle/HOL
textHow do we know that a bytecode-verified Java program will run safely? This dissertation address...
Code generators for realistic application domains are not directly verifiable in practice. In the ce...
AbstractThis article presents a type certifying compiler for a subset of Java and proves the type co...
AbstractOut of annotated programs proof carrying code systems construct and prove verification condi...
AbstractProgram logics for bytecode languages such as Java bytecode or the .NET CIL can be used to a...
We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized vari...
AbstractProof-carrying code (PCC) is a technique for downloading mobile code on a host machine while...
AbstractIn the Mobile Resource Guarantees project's Proof Carrying Code implementation, .class files...
Formal methods can in principle provide the highest levels of assurance of code safety by providing ...
The objective of the lectures is to present type-based and logic-based mechanisms to ensure reliabil...
International audienceBytecode verification is a crucial security component for Java applets, on the...
Automatic program verifiers typically generate verification conditions from the program and discharg...
Bytecode verification is one of the key security functions of several architectures for mobile and e...
International audienceBytecode verification is a crucial security component for Java applets, on the...
This work is about proving safety properties on programs. Such proof can be done by showing that "fo...
textHow do we know that a bytecode-verified Java program will run safely? This dissertation address...
Code generators for realistic application domains are not directly verifiable in practice. In the ce...
AbstractThis article presents a type certifying compiler for a subset of Java and proves the type co...
AbstractOut of annotated programs proof carrying code systems construct and prove verification condi...
AbstractProgram logics for bytecode languages such as Java bytecode or the .NET CIL can be used to a...
We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized vari...
AbstractProof-carrying code (PCC) is a technique for downloading mobile code on a host machine while...
AbstractIn the Mobile Resource Guarantees project's Proof Carrying Code implementation, .class files...
Formal methods can in principle provide the highest levels of assurance of code safety by providing ...
The objective of the lectures is to present type-based and logic-based mechanisms to ensure reliabil...
International audienceBytecode verification is a crucial security component for Java applets, on the...
Automatic program verifiers typically generate verification conditions from the program and discharg...
Bytecode verification is one of the key security functions of several architectures for mobile and e...
International audienceBytecode verification is a crucial security component for Java applets, on the...
This work is about proving safety properties on programs. Such proof can be done by showing that "fo...
textHow do we know that a bytecode-verified Java program will run safely? This dissertation address...
Code generators for realistic application domains are not directly verifiable in practice. In the ce...
AbstractThis article presents a type certifying compiler for a subset of Java and proves the type co...