2005
DOI: 10.1007/978-3-540-30569-9_1
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Resource Guarantees for Smart Devices

Abstract: Abstract. We present the Mobile Resource Guarantees framework: a system for ensuring that downloaded programs are free from run-time violations of resource bounds. Certificates are attached to code in the form of efficiently checkable proofs of resource bounds; in contrast to cryptographic certificates of code origin, these are independent of trust networks. A novel programming language with resource constraints encoded in function types is used to streamline the generation of proofs of resource usage.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
43
0
2

Year Published

2006
2006
2021
2021

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 34 publications
(45 citation statements)
references
References 30 publications
0
43
0
2
Order By: Relevance
“…Related work in the context of Java bytecode includes the work in the MRG project [3], which can be considered complementary to ours. MRG focuses on building a proof-carrying code [15] architecture for ensuring that bytecode programs are free from run-time violations of resource bounds.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Related work in the context of Java bytecode includes the work in the MRG project [3], which can be considered complementary to ours. MRG focuses on building a proof-carrying code [15] architecture for ensuring that bytecode programs are free from run-time violations of resource bounds.…”
Section: Discussionmentioning
confidence: 99%
“…(3) Demonstrating that the cost relations describe the cost as defined in step 2. The first two steps are straightforward as the CFG and the recursive representation describe the behavior of the original program, in particular at each branching point we have several possibilities from which only one will be executed.…”
Section: Examplementioning
confidence: 99%
See 1 more Smart Citation
“…Fortunately, this is sufficient for a wide variety of interesting programs. Moreover, the analysis was successfully used to certify such bounds in a Proof Carrying Code system [3].However, it is also important to bound the stack space requirements, especially for functional programs where it is easy to cause excessive stack usage by accident. The Hofmann-Jost analysis has previously been adapted to measure stack space [4,5], but the form of the bounds was again limited to linear functions in terms of the total size of the input.…”
mentioning
confidence: 99%
“…some cost measure. Cost analysis has a large application field, which includes resource certification [11,4,16,9], whereby code consumers can reject code which is not guaranteed to run within the resources available. The resources considered include processor cycles, memory usage, or billable events, e.g., the number of text messages or bytes sent on a mobile network.…”
Section: Introductionmentioning
confidence: 99%