2002
DOI: 10.1007/3-540-47813-2_3
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Correspondence between Offensive and Defensive JavaCard Virtual Machines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2002
2002
2010
2010

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…The process of delegation works as described below and shown in figure 3b: In both Java Card and Multos, additional measures are implemented in conjunction with the firewall mechanism to protect the platform. These measures include byte-code verification (on-card and off-card) [16,17], strict mechanism to install applications [18] and virtual machine based security mechanisms [19,20].…”
Section: Firewall Mechanism In Multosmentioning
confidence: 99%
“…The process of delegation works as described below and shown in figure 3b: In both Java Card and Multos, additional measures are implemented in conjunction with the firewall mechanism to protect the platform. These measures include byte-code verification (on-card and off-card) [16,17], strict mechanism to install applications [18] and virtual machine based security mechanisms [19,20].…”
Section: Firewall Mechanism In Multosmentioning
confidence: 99%
“…Note that for the clarity of presentation, the Coq code presented below is a simplified account of [3,4].…”
Section: Applications To Javacardmentioning
confidence: 99%
“…Further, we illustrate the benefits of the package in reasoning about executable specifications of the JavaCard platform [3,4], and show how its use yields compact proofs scripts, up to 10 times shorter than proofs constructed "by hand", see Section 3. Related work is discussed in Section 3.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Barthe, Dufay, Jakubiec and de Sousa [BDJdS02] formalized this intuition by considering the actual virtual machine (which is called offensive) as an abstraction of the tagged (defensive) machine, and proving that the former correctly abstracts the latter, whenever the latter does not raise a type error (which is true for verifiable bytecode). Working directly with an untagged semantics immediately frees from of the risk of making unwanted implicit typing assumptions.…”
Section: Discussionmentioning
confidence: 99%