Combining Abstract Interpretation and Model Checking for Analysing Security Properties of Java Bytecode
- 10 April 2002
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Checking security of Java bytecode by abstract interpretationPublished by Association for Computing Machinery (ACM) ,2002
- Checking Secure Interactions of Smart Card AppletsPublished by Springer Nature ,2000
- From system F to typed assembly languageACM Transactions on Programming Languages and Systems, 1999
- Data flow analysis is model checking of abstract interpretationsPublished by Association for Computing Machinery (ACM) ,1998
- What's in a region?ACM Letters on Programming Languages and Systems, 1993
- Abstract Interpretation FrameworksJournal of Logic and Computation, 1992
- Automatic verification of finite-state concurrent systems using temporal logic specificationsACM Transactions on Programming Languages and Systems, 1986
- An Axiomatic Approach to Information Flow in ProgramsACM Transactions on Programming Languages and Systems, 1980
- Certification of programs for secure information flowCommunications of the ACM, 1977
- A note on the confinement problemCommunications of the ACM, 1973