2003
DOI: 10.1007/3-540-36575-3_3
|View full text |Cite
|
Sign up to set email alerts
|

A Tail-Recursive Semantics for Stack Inspections

Abstract: Abstract. Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may have to allocate memory for a source-code tail call, and a program that uses only tail calls (and no other memory-allocating construct) may nevertheless exhaust the available memory. In this paper, we prove this widely held belief wrong. We exhibit an abstract machine for a language with security stack inspection whose space … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2003
2003
2007
2007

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(21 citation statements)
references
References 15 publications
0
21
0
Order By: Relevance
“…Scheme supports first-class continuations and tail evaluation, both of which are consistent with Java [11,35], so our extended Java supports them.…”
Section: Control Flowmentioning
confidence: 85%
“…Scheme supports first-class continuations and tail evaluation, both of which are consistent with Java [11,35], so our extended Java supports them.…”
Section: Control Flowmentioning
confidence: 85%
“…Clemens and Felleisen [7] present a different semantics of (eager) stack inspection on continuation CESK machines, which allows for tail-call optimizing implementations.…”
Section: Conclusion and Related Workmentioning
confidence: 99%
“…However, Clements and Felleisen have shown that this is not true and that stack inspection is in fact compatible with global tail-call optimization [7]. Their observation is that the security information of multiple tail calls can be summarized in a permission table.…”
Section: Stack Inspection As a Lifted State Monadmentioning
confidence: 99%
“…They use this equational theory to formally investigate how stack inspection affects known program transformations such as inlining and tail-call optimization. Clements and Felleisen present a properly tail-call optimized semantics for stack inspection based on Fournet and Gordon's semantics [7]. This tail-call optimized semantics is given in the form of a CESK machine, which was the starting point for our work.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation