[책][B] Verification of Object-Oriented Software. The KeY Approach: Foreword by K. Rustan M. Leino
Long gone are the days when program veri? cation was a task carried out merely by hand
with paper and pen. For one, we are increasingly interested in proving actual program …
with paper and pen. For one, we are increasingly interested in proving actual program …
A program logic for resources
We introduce a reasoning infrastructure for proving statements about resource consumption
in a fragment of the Java Virtual Machine Language (JVML). The infrastructure is based on a …
in a fragment of the Java Virtual Machine Language (JVML). The infrastructure is based on a …
Secure information flow and program logics
L Beringer, M Hofmann - 20th IEEE Computer Security …, 2007 - ieeexplore.ieee.org
We present interpretations of type systems for secure information flow in Hoare logic,
complementing previous encodings in binary (eg relational) program logics. Treating base …
complementing previous encodings in binary (eg relational) program logics. Treating base …
A unified framework for verification techniques for object invariants
Object invariants define the consistency of objects. They have subtle semantics because of
call-backs, multi-object invariants and subclassing. Several visible-state verification …
call-backs, multi-object invariants and subclassing. Several visible-state verification …
Hoare-style logic for unstructured programs
Enabling Hoare-style reasoning for low-level code is attractive since it opens the way to
regain structure and modularity in a domain where structure is essentially absent. The field …
regain structure and modularity in a domain where structure is essentially absent. The field …
A dynamic logic with traces and coinduction
Abstract Dynamic Logic with Traces and Coinduction is a new program logic that has an
explicit syntactic representation of both programs and their traces. This allows to prove …
explicit syntactic representation of both programs and their traces. This allows to prove …
Formalisation and Verification of Java Card Security Properties in Dynamic Logic
W Mostowski - … Conference on Fundamental Approaches to Software …, 2005 - Springer
We present how common Java Card security properties can be formalised in Dynamic Logic
and verified, mostly automatically, with the KeY system. The properties we consider, are a …
and verified, mostly automatically, with the KeY system. The properties we consider, are a …
Mobius: Mobility, ubiquity, security: Objectives and progress report
Through their global, uniform provision of services and their distributed nature, global
computers have the potential to profoundly enhance our daily life. However, they will not …
computers have the potential to profoundly enhance our daily life. However, they will not …
Verification of Java Card applets behavior with respect to transactions and card tears
C Marché, N Rousset - Fourth IEEE International Conference on …, 2006 - ieeexplore.ieee.org
The JAVA CARD transaction mechanism allows to protect sensitive operations on smart
cards against problems due to card tears or power losses. Statements within a transaction …
cards against problems due to card tears or power losses. Statements within a transaction …
[PDF][PDF] Language Based Security for Java and JML
ME Warnier - 2006 - repository.ubn.ru.nl
Programs contain bugs. Finding program bugs is important, especially in situations where
safety and security of a program is required. This thesis proposes a number of analysis …
safety and security of a program is required. This thesis proposes a number of analysis …