Building an “ Impossible ” Verifier on a Java Card
نویسندگان
چکیده
Third, error logging and reporting is important. As an industry, we currently support very primitive logging with no mechanisms for root-cause analysis or correlation of failures. Error messages are often arcane or not useful, and “firstfailure” capture is impossible. This is evidenced by a common, though unrealistic, request from support center staff: “Turn logging on and recreate the failure.” Because logging events need to be correlated, error tracking and logging should be a basic service of the OS.
منابع مشابه
Embedding Formal Development into a Smart Card : The Java Card Byte Code verifier case study
The Java security policy is implemented by security components such as the Java Virtual Machine (JVM), the API, the verifier, the loader. It is of prime importance to ensure that the implementation of these components is in accordance with their specifications. Formal methods can be used to bring the mathematical proof that the implementation of these components corresponds to their specificati...
متن کاملDevelopment of an Embedded Verifier for Java Card Byte Code using Formal Methods Ludovic
The Java security policy is implemented using security components such as a Java Virtual Machine (JVM), API, verifier, and a loader. It is of prime importance to ensure that these components are implemented in accordance with their specifications. Formal methods can be used to bring the mathematical proof that their implementation corresponds to their specification. In this paper, we introduce ...
متن کاملFormal Development of an Embedded Verifier for Java Card Byte Code
The Java security policy is implemented by security components such as the Java Virtual Machine (JVM), the API, the verifier, the loader. It is of prime importance to ensure that the implementation of these components is in accordance with their specifications. Formal methods can be used to bring the mathematical proof that the implementation of these components corresponds to their specificati...
متن کاملUsing Control Dependencies for Space-Aware Bytecode Verification
Java applets run on a Virtual Machine that checks code integrity and correctness before execution using a module called the Bytecode Verifier. Java Card technology allows Java applets to run on smart cards. The large memory requirements of the verification process do not allow the implementation of an embedded Bytecode Verifier in the Java Card Virtual Machine. To address this problem, we propo...
متن کاملResearch on On-card Bytecode Verifier for Java Cards
The bytecode verification is a key point of the security chain of the Java Platform. This feature is optional in many embedded devices since the memory requirements of the verification process and the process capability of hardware are too high. In this paper we propose a verifier that utilizes the logical flow graph based cache policy and an improved non stressing type coding method, for the b...
متن کامل