Verified bytecode verifiers
Using the theorem prover Isabelle/HOL we have formalized and proved correct and
executable bytecode verifier in the style of Kildall's algorithm for a significant subset of the …
executable bytecode verifier in the style of Kildall's algorithm for a significant subset of the …
Multiapplication smart card: Towards an open smart card?
D Sauveron - Information security technical report, 2009 - Elsevier
Smart cards were invented four decades ago so as to keep data secrets and to process them
secretly. Even though their main goal are still the same today, the smart cards have been …
secretly. Even though their main goal are still the same today, the smart cards have been …
A paradigm shift in smart card ownership model
Smart cards have been proliferated into many aspects of modern life. Historically, the
ownership of smart cards has remained with the smart card issuers. Although this ownership …
ownership of smart cards has remained with the smart card issuers. Although this ownership …
[書籍][B] A machine-checked, type-safe model of Java concurrency: language, virtual machine, memory model, and verified compiler
A Lochbihler - 2014 - books.google.com
The Java programming language provides safety and security guarantees such as type
safety and its security architecture. They distinguish it from other mainstream programming …
safety and its security architecture. They distinguish it from other mainstream programming …
Using Coq to Verify Java CardTM Applet Isolation Properties
This paper reports on the use of the Coq proof assistant for the formal verification of applet
isolation properties in Java Card technology. We focus on the confidentiality property. We …
isolation properties in Java Card technology. We focus on the confidentiality property. We …
Operational semantics of the java card virtual machine
IA Siveroni - The Journal of Logic and Algebraic Programming, 2004 - Elsevier
We present the operational semantics of Carmel, a language that models the Java Card
Virtual Machine Language. We define a small-step relation between program configurations …
Virtual Machine Language. We define a small-step relation between program configurations …
Efficient reasoning about executable specifications in Coq
We describe a package to reason efficiently about executable specifications in Coq. The
package provides a command for synthesizing a customized induction principle for a …
package provides a command for synthesizing a customized induction principle for a …
Application management framework in user centric smart card ownership model
The predominant smart card ownership model is the issuer centric, and it has played a vital
role in the proliferation of the technology. However, recent developments of multi-application …
role in the proliferation of the technology. However, recent developments of multi-application …
Abstractions for fault-tolerant distributed system verification
Four kinds of abstraction for the design and analysis of fault–tolerant distributed systems are
discussed. These abstractions concern system messages, faults, fault–masking voting, and …
discussed. These abstractions concern system messages, faults, fault–masking voting, and …
Validation of the JavaCard platform with implicit induction techniques
The bytecode verifier (BCV), which performs a static analysis to reject potentially insecure
programs, is a key security function of the Java (Card) platform. Over the last few years there …
programs, is a key security function of the Java (Card) platform. Over the last few years there …