Sciweavers

170 search results - page 16 / 34
» Externally verifiable code execution
Sort
View
CSL
2004
Springer
13 years 11 months ago
A Functional Scenario for Bytecode Verification of Resource Bounds
We consider a scenario where (functional) programs in pre-compiled form are exchanged among untrusted parties. Our contribution is a system of annotations for the code that can be ...
Roberto M. Amadio, Solange Coupet-Grimal, Silvano ...
CC
2009
Springer
142views System Software» more  CC 2009»
14 years 8 months ago
Extensible Proof-Producing Compilation
This paper presents a compiler which produces machine code from functions defined in the logic of a theorem prover, and at the same time proves that the generated code executes the...
Magnus O. Myreen, Konrad Slind, Michael J. C. Gord...
SCAM
2007
IEEE
14 years 1 months ago
Barrier Slicing for Remote Software Trusting
Remote trusting aims at verifying the “healthy” execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giv...
Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, C...
OOPSLA
2010
Springer
13 years 5 months ago
A time-aware type system for data-race protection and guaranteed initialization
We introduce a type system based on intervals, objects representing the time in which a block of code will execute. The type system can verify time-based properties such as when a...
Nicholas D. Matsakis, Thomas R. Gross
CSMR
1998
IEEE
13 years 11 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont