2008
DOI: 10.1007/s00354-008-0039-7
|View full text |Cite
|
Sign up to set email alerts
|

Abstraction-Carrying Code: a Model for Mobile Code Safety

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 40 publications
0
9
0
Order By: Relevance
“…The key benefit of this "certificate-based" approach to mobile code safety is that the task of the consumer is reduced from the level of proving to the level of checking, a procedure that should be much simpler, efficient, and automatic than generating the original certificate.Abstraction-Carrying Code (ACC) (Albert et al 2005(Albert et al , 2008 has been recently proposed as an enabling technology for PCC, in which an abstraction (or abstract model of the program) plays the role of certificate. Certicate size reduction in abstraction-carrying code.…”
mentioning
confidence: 99%
“…The key benefit of this "certificate-based" approach to mobile code safety is that the task of the consumer is reduced from the level of proving to the level of checking, a procedure that should be much simpler, efficient, and automatic than generating the original certificate.Abstraction-Carrying Code (ACC) (Albert et al 2005(Albert et al , 2008 has been recently proposed as an enabling technology for PCC, in which an abstraction (or abstract model of the program) plays the role of certificate. Certicate size reduction in abstraction-carrying code.…”
mentioning
confidence: 99%
“…If the check succeeds, i.e., the loop condition does not hold, then the body of the loop is not executed and the control goes to instruction 31, where the constant −1 is returned as the result (instruction 32) of the method. Otherwise the value of (l+u)/2 is stored in m in instructions [3][4][5][6][7][8] This section describes how a bytecode program is analyzed in order to produce a cost relation system (CRS) which describes its resource consumption. The analysis consists of a number of steps: (1) the control flow graph of the program is computed, and afterwards (2) the program is transformed into a rule-based representation which facilitates the subsequent steps of the analysis without losing information about the resource consumption; (3) size analysis and abstract compilation are used to generate size relations which describe how the size of data changes during program execution; (4) the chosen cost model is applied to each instruction in order to obtain an expression which represents its cost; (5) finally, a cost relation system is obtained by joining the information gathered in the previous steps.…”
Section: The Context: Object-oriented Bytecodementioning
confidence: 99%
“…In addition, equations are not necessarily mutually exclusive, which means that at each evaluation step there are several equations that can be applied. For example, if all three recursive equations that we have seen above are defined in the same CR, then the upper bound would be max( [7,8,9]) * (2 nat(n0) − 1) + 3 * 2 nat(n0) . Note that the worstcase for the cost of each application is determined by the first equation, which contributes the largest cost, i.e., 9.…”
Section: Bounds On the Number Of Applications Of Equationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Automatic cost analysis has interesting applications in the context of Java bytecode [3]. For instance, the code receiver may want to infer (or to check, in the spirit of Proof-Carrying Code [22]) cost information in order to decide whether to reject code which has too large cost requirements in terms of computing resources (in time and/or space) [6,17,12,9], and to accept code meeting the established requirements. Moreover, in parallel systems, knowledge about the cost of different procedures in the object code can be used in order to guide the partitioning, allocation and scheduling of parallel processes [13].…”
Section: Introductionmentioning
confidence: 99%