期刊文献+

一种混合模式的Java卡内字节码校验算法 被引量:3

A Hybrid Bytecode Verification Algorithm on Java Card
下载PDF
导出
摘要 字节码校验是Java智能卡安全体系结构的重要保障之一.基于控制流程树CFT字节码校验算法,引入缓存策略,提出了一种混合模式的字节码校验算法,有效解决了环结构问题.同时,对于此混合模式的Java卡内字节码校验算法进行的分析表明,相对于传统算法其时间和空间效率得到有效提高. Bytecode verification is one of the important parts for Java card security architecture. A novel hybrid algorithm based on control flow tree combined with cache policy is presented to address loop problem. Meanwhile, the analysis on this hybrid algorithm manifests that its time and space efficencies are improved greatly compared to the conventional one.
出处 《微电子学与计算机》 CSCD 北大核心 2009年第4期152-155,共4页 Microelectronics & Computer
基金 武汉市科学技术局重大科技产业化项目(20061005119) 武汉市电子信息产业发展基金项目(2007008109)
关键词 JAVA卡 字节码校验 控制流程树 缓存策略 Java card bytecode verification control flow tree cache policy
  • 相关文献

参考文献8

二级参考文献25

  • 1朱林,刘晓东,刘国荣,席延军.利用XML技术实现基于知识的虚拟农作物生长过程[J].微电子学与计算机,2004,21(6):79-83. 被引量:10
  • 2KatharineWhitehead 王海鹏 沈华峰译.基于组件开发[M].人民邮电出版社,2003..
  • 3http://asm.objectweb.org/
  • 4Iray Booch Object-Oriented Design with Applications[M].RedWood city,CA benjamin cummings,1991
  • 5CHEN ZHIQUN.Java card technology for smart cards:architecture and programmer's guide[M].Reading,MA:Addison Wesley Longman Publishing,2000.
  • 6DEVILLE D.Building an "impossible" verifier on a Java card[C] // USENIX Workshop on Industrial Experiences with Systems Software (WIESS'02).Berkeley,CA:SENIX,2002:15-24.
  • 7LEROY X.Java bytecode verification:algorithms and formalizations[J].Journal on Automated Reasoning,2003,30(3/4):235-269.
  • 8LEROY X.Bytecode verification on Java smart card[J].Software Practice & Experience,2002,32(4):319-340.
  • 9ROSE E,ROSE K.Lightweight bytecode verification[J].Journal of Automated Reasoning,2003,31(3/4):303-334.
  • 10POSEGGA J,VOGT H.Java bytecode verification using model checking[J].Journal of Automated Reasoning,2003,30(3/4):399-444.

共引文献4

同被引文献17

  • 1周捷,吴东辉,陈章龙.JAVA卡平台安全性的设计与实现[J].计算机工程与应用,2004,40(21):114-117. 被引量:7
  • 2Lazaro J I, Astarloa A, Zuloaga A. I2CSec: A secure serial chip-to- chip communication protocol. Journal of Systems Architecture, 2012; 57(2) : 206-213.
  • 3Aziz S M. A cycle-accurate transaction level SystemC model for a ser- ial communication bus. Computers & Electrical Engineering, 2009; 35(5) : 790-802.
  • 4Zeqiri Nderin, Luma Artaru Intelligent communication system, automation control, java card and security[C] // Mathematics and Computers in Science and Engi- neering. North Holland, 2008 : 117-121.
  • 5Woiciech Mostowski, Erik Poll. Malicious code on ja- va card smartcards: attacks and countermeasures[J]. Smart Card Research and Advanced Applications, Lec-ture Notes in Computer Science, 2008(5189):1-16.
  • 6Yuchuan Wu, Yaqin Sun. Analysis and research of se- curing from attack for Java CaM[C]// Proceedings of the International Conference on E-Business and E-Gov- ernment, ICEE. Shanghai, 2010:1296-1298.
  • 7张学红,李小慧,杜瑞庆.Java中内存泄露及垃圾回收机制[J].唐山师范学院学报,2008,30(2):80-82. 被引量:3
  • 8李伦,陈芳.内存溢出和数据库锁表的分析与解决[J].电脑编程技巧与维护,2008(11):82-84. 被引量:3
  • 9王晓亮,方勇,彭彦.Java智能卡安全运行时环境的设计[J].网络安全技术与应用,2009(2):39-41. 被引量:2
  • 10朱强.Java内存泄露问题及对策[J].电脑编程技巧与维护,2009(13):81-83. 被引量:2

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部