Java bytecode verification on Java cards
Abstract
References
Index Terms
- Java bytecode verification on Java cards
Recommendations
Bytecode verification on Java smart cards
This article presents a novel approach to the problem of bytecode verification for Java Card applets. By relying on prior off-card bytecode transformations, we simplify the bytecode verifier and reduce its memory requirements to the point where it can ...
A Study on the Optimization of Class File for Java Card Platform
ICOIN '02: Revised Papers from the International Conference on Information Networking, Wireless Communications Technologies and Network Applications-Part IThe Java Card technology enables programs written in the Java programming language to run on smart cards and other resource-constrained devices. Smart cards represent one of the smallest platforms in use today. The memory configuration of a smart card ...
From CIL to Java bytecode: Semantics-based translation for static analysis leveraging
Highlights- A formal translation of CIL (.Net) bytecode into Java bytecode is introduced and proved sound w.r.t. the language semantics
AbstractA formal translation of CIL (i.e., .Net) bytecode into Java bytecode is introduced and proved sound with respect to the language semantics. The resulting code is then analyzed with Julia, an industrial static analyzer of Java bytecode. ...
Comments
Information & Contributors
Information
Published In
- Conference Chair:
- Hisham M. Haddad,
- Program Chairs:
- Andrea Omicini,
- Roger L. Wainwright,
- Publications Chair:
- Lorie M. Liebrock
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 459Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in