Implementing mathematics with the Nuprl proof development system
Implementing mathematics with the Nuprl proof development system
A framework for defining logics
Journal of the ACM (JACM)
Efficient software-based fault isolation
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Tcl and the Tk toolkit
Extensibility safety and performance in the SPIN operating system
SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems principles
The design and implementation of a certifying compiler
PLDI '98 Proceedings of the ACM SIGPLAN 1998 conference on Programming language design and implementation
Simplification by Cooperating Decision Procedures
ACM Transactions on Programming Languages and Systems (TOPLAS)
Guarded commands, nondeterminacy and formal derivation of programs
Communications of the ACM
The Java Language Specification
The Java Language Specification
Constructions: A Higher Order Proof System for Mechanizing Mathematics
EUROCAL '85 Invited Lectures from the European Conference on Computer Algebra-Volume I - Volume I
PVS: A Prototype Verification System
CADE-11 Proceedings of the 11th International Conference on Automated Deduction: Automated Deduction
Elf: A Meta-Language for Deductive Systems (System Descrition)
CADE-12 Proceedings of the 12th International Conference on Automated Deduction
Stanford Pascal Verifier user manual
Stanford Pascal Verifier user manual
The BSD packet filter: a new architecture for user-level packet capture
USENIX'93 Proceedings of the USENIX Winter 1993 Conference Proceedings on USENIX Winter 1993 Conference Proceedings
First international workshop, AOSE 2000 on Agent-oriented software engineering
Enforcing Safety Properties Using Type Specialization
ESOP '01 Proceedings of the 10th European Symposium on Programming Languages and Systems
Trustless Grid Computing in ConCert
GRID '02 Proceedings of the Third International Workshop on Grid Computing
Towards a Secure Agent Platform Based on FIPA
MATA '01 Proceedings of the Third International Workshop on Mobile Agents for Telecommunication Applications
MFCS '99 Proceedings of the 24th International Symposium on Mathematical Foundations of Computer Science
Object-Oriented Programming: Regaining the Excitement
ECOOP '99 Proceedings of the 13th European Conference on Object-Oriented Programming
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Secure Communication for Secure Agent-Based Electronic Commerce Applications
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
MA/LMA Architecture for Dealing with Malicious Agents in Agent-Mediated Electronic Markets
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
Java Bytecode Verification by Model Checking
CAV '99 Proceedings of the 11th International Conference on Computer Aided Verification
Skeletal Jade Components for the Construction of Institutions
AAMAS '02 Revised Papers from the Workshop on Agent Mediated Electronic Commerce on Agent-Mediated Electronic Commerce IV, Designing Mechanisms and Systems
Secure Composition of Insecure Components
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
PMMAP: A Mobile Agents Platform for Program Mining
ICCNMC '01 Proceedings of the 2001 International Conference on Computer Networks and Mobile Computing (ICCNMC'01)
A Property-Dependent Agent Transfer Protocol
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
On the Expressiveness of Forwarding in Higher-Order Communication
ICTAC '09 Proceedings of the 6th International Colloquium on Theoretical Aspects of Computing
ICLP'05 Proceedings of the 21st international conference on Logic Programming
SECMAP: a secure mobile agent platform
CEEMAS'05 Proceedings of the 4th international Central and Eastern European conference on Multi-Agent Systems and Applications
Secure mediation with mobile code
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
A survey of security issue in multi-agent systems
Artificial Intelligence Review
SAT-Based software certification
TACAS'06 Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems
Research note: Security issues related to mobile code and agent-based systems
Computer Communications
Petri nets for the verification of ubiquitous systems with transient secure association
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Model-driven construction of certified binaries
MODELS'07 Proceedings of the 10th international conference on Model Driven Engineering Languages and Systems
Programs from proofs: a PCC alternative
CAV'13 Proceedings of the 25th international conference on Computer Aided Verification
Hi-index | 0.00 |
Proof-Carrying Code (PCC) enables a computer system to determine, automatically and with certainty, that program code provided by another system is safe to install and execute without requiring interpretation or run-time checking. PCC has applications in any computing system in which the safe, efficient, and dynamic installation of code is needed. The key idea is to attach to the code an easily-checkable proof that its execution does not violate the safety policy of the receiving system. This paper describes the design and a typical implementation of Proof-Carrying Code, where the language used for specifying the safety properties is first-order predicate logic. Examples of safety properties described in this paper are memory safety and compliance with data access policies, resource usage bounds, and data abstraction boundaries.