Proceedings International Conference on Dependable Systems and Networks
DOI: 10.1109/dsn.2002.1028886
|View full text |Cite
|
Sign up to set email alerts
|

Formal development of an embedded verifier for Java Card byte code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…Rather, its use lies in the generation of certificates that can then be checked on-card. A similar distinction can been observed in on-card byte code verification where the on-card verifier of Casset et al [4] relies on certificates generated off-card, whereas the verifier described by Leroy [10] imposes slight language restrictions so that the verifier can execute on-card.…”
Section: Related Workmentioning
confidence: 95%
See 1 more Smart Citation
“…Rather, its use lies in the generation of certificates that can then be checked on-card. A similar distinction can been observed in on-card byte code verification where the on-card verifier of Casset et al [4] relies on certificates generated off-card, whereas the verifier described by Leroy [10] imposes slight language restrictions so that the verifier can execute on-card.…”
Section: Related Workmentioning
confidence: 95%
“…Mechanical verification of Java analysers have so far mainly dealt with the Java byte code verifier [2,9,4]. The first exception is the work reported in [3] on formalising an interprocedural data flow analyser for Java Card, on which part of the formalisation of the present analysis is based.…”
Section: Related Workmentioning
confidence: 99%
“…Other important aspects of formal methods which are not treated in this chapter include the use of formal methods to establish a relation between the models developed for platform verification and the actual implementations of the platform, see e.g. [23], or the use of formal methods to verify cryptographic algorithms or protocols used by smartcards, see e.g. [67].…”
Section: Bytecode Verificationmentioning
confidence: 99%
“…JVM implementations include an instruction interpreter (which performs the functions of a microprocessor's ISA) as well as other components. Architectural models have been constructed [SSB01], and other components formally specified and verified, such as the byte-code verifier [Cas02,KN01] and parts of the instruction interpreter [Qia99]. At implementation level, Event-B has been used to construct a specification of some of the JVM instruction set in order verify an existing microcoded interpreter implementation [EG07].…”
Section: Related Workmentioning
confidence: 99%