Using contour marking bytecode verification algorithm on the java']java card

被引:0
|
作者
Jiang, Longlong [1 ]
Li, Daiping [1 ]
机构
[1] Guangdong Univ Technol, Fac Comp, Guangzhou 510006, Guangdong, Peoples R China
关键词
card bytecode verification; multivariate verification; the verification of subroutine; contour making; type safety;
D O I
10.4028/www.scientific.net/AMM.556-562.4120
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Java bytecode verification could not be well performed in the smart card due to the resource usage especially in the resource-constrained devices. Currently, on the card there are several bytecode verifications which exist kinds of problems, in order to be better and be better adapt to the environment, such as a smart card platform, raised using the contour subroutine labeled bytecode verification algorithm on a card. First, through the analysis of existing card byte code verification algorithm to determine the imperfections and difficulties in the judgment and the verification of subroutine, and then propose a method for marking the subroutine in the place of the jump to it. Thus not only get the program structure and enhance the effectiveness and efficiency of the validation. The feasibility of the method is demonstrated by simulating typical examples verification.
引用
下载
收藏
页码:4120 / +
页数:2
相关论文
共 50 条
  • [21] Java Bytecode Verification: Algorithms and Formalizations
    Xavier Leroy
    Journal of Automated Reasoning, 2003, 30 : 235 - 269
  • [22] Memory Requirements of Java']Java Bytecode Verification on Limited Devices
    Klohs, Karsten
    Kastens, Uwe
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 132 (01) : 95 - 111
  • [23] Using abstract interpretation to add type checking for interfaces in Java']Java bytecode verification
    De Francesco, Nicoletta
    Lettieri, Giuseppe
    Martini, Luca
    THEORETICAL COMPUTER SCIENCE, 2010, 411 (22-24) : 2174 - 2201
  • [24] Reversing Bytecode of Obfuscated Java']Java Based Smart Card Using Side Chanel Analysis
    Kasmi, Mohammed Amine
    Azizi, Mostafa
    Lanet, Jean-Louis
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (11): : 347 - 356
  • [25] Checking secure information flow in Java']Java bytecode by code transformation and standard bytecode verification
    Bernardeschi, C
    De Francesco, N
    Lettieri, G
    Martini, L
    SOFTWARE-PRACTICE & EXPERIENCE, 2004, 34 (13): : 1225 - 1255
  • [26] A redundancy-based attack detection technique for Java']Java Card Bytecode
    Giunta, Rosario
    Pappalardo, Giuseppe
    Tramontana, Emiliano
    2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE), 2014, : 384 - 389
  • [27] Comparison Analysis of Acorn Algorithm and Snow Algorithm on Smart Card using Java']Java Card
    Nurwarsito, Heru
    Ayu, Sarah Kusuma
    2021 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2021), 2021, : 429 - 434
  • [28] Java']Java bytecode verification via static single assignment form
    Gal, Andreas
    Probst, Christian W.
    Franz, Michael
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2008, 30 (04):
  • [29] An Efficient, Parametric Fixpoint Algorithm for Analysis of Java']Java Bytecode
    Mendez, Mario
    Navas, Jorge
    Hermenegildo, Manuel V.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 190 (01) : 51 - 66
  • [30] Specification and Runtime Verification of Java']Java Card Programs
    da Costa, Umberto Souza
    Moreira, Anamaria Martins
    Musicante, Martin A.
    Souza Neto, Placido A.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 240 : 61 - 78