Decomposing bytecode verification by abstract interpretation

3Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

Bytecode verification is a key point in the security chain of the Java platform. This feature is only optional in many embedded devices since the memory requirements of the verification process are too high. In this article we propose an approach that significantly reduces the use of memory by a serial/parallel decomposition of the verification into multiple specialized passes. The algorithm reduces the type encoding space by operating on different abstractions of the domain of types. The results of our evaluation show that this bytecode verification can be performed directly on small memory systems. The method is formalized in the framework of abstract interpretation. © 2008 ACM.

Cite

CITATION STYLE

APA

Bernardeschi, C., De Francesco, N., Lettieri, G., Martini, L., & Masci, P. (2008). Decomposing bytecode verification by abstract interpretation. ACM Transactions on Programming Languages and Systems, 31(1). https://doi.org/10.1145/1452044.1452047

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free