Compilers: principles, techniques, and tools
Compilers: principles, techniques, and tools
Improvements to graph coloring register allocation
ACM Transactions on Programming Languages and Systems (TOPLAS)
Java intermediate bytecodes: ACM SIGPLAN workshop on intermediate representations (IR'95)
IR '95 Papers from the 1995 ACM SIGPLAN workshop on Intermediate representations
Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Advanced compiler design and implementation
Advanced compiler design and implementation
A simple, comprehensive type system for Java bytecode subroutines
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Inside Java 2 platform security architecture, API design, and implementation
Inside Java 2 platform security architecture, API design, and implementation
A type system for Java bytecode subroutines
ACM Transactions on Programming Languages and Systems (TOPLAS)
FACADE: a typed intermediate language dedicated to smart cards
ESEC/FSE-7 Proceedings of the 7th European software engineering conference held jointly with the 7th ACM SIGSOFT international symposium on Foundations of software engineering
A type system for object initialization in the Java bytecode language
ACM Transactions on Programming Languages and Systems (TOPLAS)
Standard fixpoint iteration for Java bytecode verification
ACM Transactions on Programming Languages and Systems (TOPLAS)
Formalizing the safety of Java, the Java virtual machine, and Java card
ACM Computing Surveys (CSUR)
Java Card Technology for Smart Cards: Architecture and Programmer's Guide
Java Card Technology for Smart Cards: Architecture and Programmer's Guide
Java Virtual Machine Specification
Java Virtual Machine Specification
Mobile Agents and Security
Register allocation & spilling via graph coloring
SIGPLAN '82 Proceedings of the 1982 SIGPLAN symposium on Compiler construction
Reducing the Memory Complexity of Type-Inference Algorithms
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Development of an Embedded Verifier for Java Card Byte Code Using Formal Methods
FME '02 Proceedings of the International Symposium of Formal Methods Europe on Formal Methods - Getting IT Right
Journal of Automated Reasoning
Java Bytecode Verification: Algorithms and Formalizations
Journal of Automated Reasoning
Java bytecode verification on Java cards
Proceedings of the 2004 ACM symposium on Applied computing
Lightweight Bytecode Verification
Journal of Automated Reasoning
Increasing smart card dependability
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
Using postdomination to reduce space requirements of data flow analysis
Information Processing Letters
Building an "impossible" verifier on a java card
WIESS'02 Proceedings of the 2nd conference on Industrial Experiences with Systems Software - Volume 2
Instruction-level security analysis for information flow in stack-based assembly languages
Information and Computation
Theoretical Computer Science
Type-based information flow analysis for bytecode languages with variable object field policies
Proceedings of the 2008 ACM symposium on Applied computing
Decomposing bytecode verification by abstract interpretation
ACM Transactions on Programming Languages and Systems (TOPLAS)
Multiapplication smart card: Towards an open smart card?
Information Security Tech. Report
Application Management Framework in User Centric Smart Card Ownership Model
Information Security Applications
Memory Requirements of Java Bytecode Verification on Limited Devices
Electronic Notes in Theoretical Computer Science (ENTCS)
A Space-Aware Bytecode Verifier for Java Cards
Electronic Notes in Theoretical Computer Science (ENTCS)
Integrated Java Bytecode Verification
Electronic Notes in Theoretical Computer Science (ENTCS)
Using postdomination to reduce space requirements of data flow analysis
Information Processing Letters
A very small bytecode-verifier based on PCC algorithm for smart card
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
An efficient small sized on-card verifier for java card
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
A certified lightweight non-interference java bytecode verifier
ESOP'07 Proceedings of the 16th European conference on Programming
Applet verification strategies for RAM-constrained devices
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Computer security from a programming language and static analysis perspective
ESOP'03 Proceedings of the 12th European conference on Programming
Using abstract interpretation to add type checking for interfaces in Java bytecode verification
Theoretical Computer Science
Using abstract interpretation to add type checking for interfaces in Java bytecode verification
Theoretical Computer Science
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
On the relative completeness of bytecode analysis versus source code analysis
CC'08/ETAPS'08 Proceedings of the Joint European Conferences on Theory and Practice of Software 17th international conference on Compiler construction
On-device control flow verification for Java programs
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
The research on how to reduce the number of EEPROM writing to improve speed of java card
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A high performance buffering of java objects for java card systems with flash memory
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Mobile resource guarantees for smart devices
CASSIS'04 Proceedings of the 2004 international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
Combined attacks and countermeasures
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Programs from proofs: a PCC alternative
CAV'13 Proceedings of the 25th international conference on Computer Aided Verification
Memory-efficient on-card byte code verification for Java cards
Proceedings of the First Workshop on Cryptography and Security in Computing Systems
Hi-index | 0.00 |
This article presents a novel approach to the problem of bytecode verification for Java Card applets. By relying on prior off-card bytecode transformations, we simplify the bytecode verifier and reduce its memory requirements to the point where it can be embedded on a smart card, thus increasing significantly the security of post-issuance downloading of applets on Java Cards. This article describes the on-card verification algorithm and the off-card code transformations, and evaluates experimentally their impact on applet code size.