Proceedings of the 8th ACM Conference on Computer and Communications Security - CCS '01 2001
DOI: 10.1145/501993.501994
|View full text |Cite
|
Sign up to set email alerts
|

An efficient security verification method for programs with stack inspection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2003
2003
2010
2010

Publication Types

Select...
3
2
1

Relationship

4
2

Authors

Journals

citations
Cited by 8 publications
(19 citation statements)
references
References 0 publications
0
19
0
Order By: Relevance
“…Changing the arguments of check statements Let M ex be the pushdown system obtained from M π by extending the stack frames to 4-tuples and substituting the following inference rules (20) and (21) for Rule (15) for check statements. The fourth component of a stack frame is a pair n, Q of a program point and a subset of permissions.…”
Section: Phase (2)mentioning
confidence: 99%
See 1 more Smart Citation
“…Changing the arguments of check statements Let M ex be the pushdown system obtained from M π by extending the stack frames to 4-tuples and substituting the following inference rules (20) and (21) for Rule (15) for check statements. The fourth component of a stack frame is a pair n, Q of a program point and a subset of permissions.…”
Section: Phase (2)mentioning
confidence: 99%
“…for safety verification [15,20], LTL model checking [11], analysis of current permission sets [6,16]. Pottier et al [23] and Besson et al [7] proposed type systems such that type safety implies no violation against runtime access control in an SBAC program.…”
Section: Introductionmentioning
confidence: 99%
“…Stack inspection has been extended in several ways. For example, stack pattern can be specified by LTL formula in [7] and regular language in [4], [8]. Automatic verification methods for a program with stack inspection are also discussed in [4], [7], [8].…”
Section: Introductionmentioning
confidence: 99%
“…However, their approach has severe restrictions, e.g, a mutual recursion is prohibited. Nitta et al [19,20] improve the result of [14] by using indexed grammar in formal language theory and show that a verication problem is decidable for an arbitrary program with stack inspection.…”
Section: Introductionmentioning
confidence: 99%
“…In [20], a subclass of programs which exactly represents programs with JDK1.2 stack inspection is proposed and it is shown that verication of the safety property can be performed in polynomial time of the program size in the subclass. They also present verication results by using a verication tool.…”
Section: Introductionmentioning
confidence: 99%