Bytecode analysis for proof carrying code

Martin Wildmoser, Amine Chaieb, Tobias Nipkow

Research output: Contribution to journalArticlepeer-review

13 Scopus citations

Abstract

Out of annotated programs proof carrying code systems construct and prove verification conditions that guarantee a given safety policy. The annotations may come from various program analyzers and must not be trusted as they need to be verified. A generic verification condition generator can be utilized such that a combination of annotations is verified incrementally. New annotations may be verified by using previously verified ones as trusted facts. We show how results from a trusted type analyzer may be combined with untrusted interval analysis to automatically verify that bytecode programs do not overflow. All trusted components are formalized and verified in Isabelle/HOL.

Original languageEnglish
Pages (from-to)19-34
Number of pages16
JournalElectronic Notes in Theoretical Computer Science
Volume141
Issue number1 SPEC. ISS.
DOIs
StatePublished - 5 Dec 2005

Keywords

  • Bytecode
  • Isabelle/HOL
  • Proof carrying code
  • Safety policy
  • Type analyzer

Fingerprint

Dive into the research topics of 'Bytecode analysis for proof carrying code'. Together they form a unique fingerprint.

Cite this