A Practical Mobile-Code Format with Linear Verification Effort
نویسنده
چکیده
We present an abstract machine that encodes both type safety and control safety in an efficient manner and that is suitable as a mobile-code format. At the code consumer, a single linear-complexity algorithm performs not only verification, but simultaneously also transforms the stack-based wire format into a register-based internal format. The latter is beneficial for interpretation and native code generation. Our dual-representation approach overcomes some of the disadvantages of existing mobile-code representations, such as the JVM and CLR wire formats.
منابع مشابه
Development of a Phase Space Generator software for Medical Linear Accelerator Applications
Introduction: During the last decades, simulation of radiation therapy treatment conditions in treatment room for studying with more details in comparison with treatment planning system (TPS) is taken into consideration. The most problem with starting these kind of researches is the geometry of Medical linacs and verification of the accelerators. Therefore, researchers tried to...
متن کاملMaking Mobile Code Both Safe And Efficient
Mobile programs can potentially be malicious. To protect itself, a host that receives such mobile programs from an untrusted party or via an untrusted network connection will want some kind of guarantee that the mobile code is not about to cause any damage. The traditional solution to this problem has been verification, by which the receiving host examines the mobile program to discover all its...
متن کاملProofing: Efficient SSA-based Java Verification
Verification is essential for assuring the integrity of a Java virtual machine when executing untrusted code. Existing verifiers decide whether or not a given bytecode program is safe. In contrast, we introduce the concept of proofing. Proofing does not change the semantics of programs that would have passed the original bytecode verifier. For programs that would have failed verification, our a...
متن کاملSoftware Activation Using Multithreading
Software activation is an anti-piracy technology designed to verify that software products have been legitimately licensed. Activation should be quick and simple while simultaneously being secure and protecting customer privacy. The most common form of software activation is for the user to enter a legitimate product serial number. However, software activation based on serial numbers appears to...
متن کاملCheko : Aspect-Oriented Runtime Monitor Certification via Model-Checking (Extended Version)
In-lining runtime monitors into untrusted binary programs via aspectweaving is an increasingly popular technique for efficiently and flexibly securing untrusted mobile code. However, the complexity of the monitor implementation and in-lining process in these frameworks can lead to vulnerabilities and low assurance for code-consumers. This paper presents a machine-verification technique for aspe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003