AbstractMany information-flow type systems have been developed that allow to control the non-interference of information between the levels of classification in the Bell-LaPadula model. We present here a translation of typing information collected for bytecode programs to a bytecode program logic. This translation uses the syntax of a bytecode specification language BML. A translation of this kind allows including the check of the non-interference property in a single, unified verification framework based on a program logic and thus can be exploited within a foundational proof-carrying code infrastructure. It also provides a flexible basis for various declassification strategies that may be useful in a particular code body
Abstract. The proof-carrying code (PCC) techniques allow the exe-cutable code to be augmented with a...
International audienceLightweight bytecode verification uses stack maps to annotate Java bytecode pr...
Automatic program verifiers typically generate verification conditions from the program and discharg...
International audienceNon-interference guarantees the absence of illicit information flow throughout...
submitted to TOPLAS in September 2007Non-interference is a semantical condition on programs that gua...
The Bytecode Modeling Language (BML) is a specification language for Java bytecode, that provides a ...
We propose a framework for establishing the correctness of untrusted Java bytecode components w.r.t....
AbstractProgram logics for bytecode languages such as Java bytecode or the .NET CIL can be used to a...
AbstractThis article presents a type certifying compiler for a subset of Java and proves the type co...
This document contains the Isabelle/HOL sources underlying our paper A bytecode logic for JML and ty...
AbstractBytecode verification algorithms are traditionally based on dataflow analysis. We present an...
Abstract. Non-interference is the property of a program not to leak any secret information. In this ...
AbstractOut of annotated programs proof carrying code systems construct and prove verification condi...
In this paper, we describe the application of the interactive theorem prover Coq to the security ana...
AbstractMany modern program verifiers translate the program to be verified and its specification int...
Abstract. The proof-carrying code (PCC) techniques allow the exe-cutable code to be augmented with a...
International audienceLightweight bytecode verification uses stack maps to annotate Java bytecode pr...
Automatic program verifiers typically generate verification conditions from the program and discharg...
International audienceNon-interference guarantees the absence of illicit information flow throughout...
submitted to TOPLAS in September 2007Non-interference is a semantical condition on programs that gua...
The Bytecode Modeling Language (BML) is a specification language for Java bytecode, that provides a ...
We propose a framework for establishing the correctness of untrusted Java bytecode components w.r.t....
AbstractProgram logics for bytecode languages such as Java bytecode or the .NET CIL can be used to a...
AbstractThis article presents a type certifying compiler for a subset of Java and proves the type co...
This document contains the Isabelle/HOL sources underlying our paper A bytecode logic for JML and ty...
AbstractBytecode verification algorithms are traditionally based on dataflow analysis. We present an...
Abstract. Non-interference is the property of a program not to leak any secret information. In this ...
AbstractOut of annotated programs proof carrying code systems construct and prove verification condi...
In this paper, we describe the application of the interactive theorem prover Coq to the security ana...
AbstractMany modern program verifiers translate the program to be verified and its specification int...
Abstract. The proof-carrying code (PCC) techniques allow the exe-cutable code to be augmented with a...
International audienceLightweight bytecode verification uses stack maps to annotate Java bytecode pr...
Automatic program verifiers typically generate verification conditions from the program and discharg...