dblp.uni-trier.dewww.uni-trier.de

Luca Martini

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
11EECinzia Bernardeschi, Nicoletta De Francesco, Giuseppe Lettieri, Luca Martini, Paolo Masci: Decomposing bytecode verification by abstract interpretation. ACM Trans. Program. Lang. Syst. 31(1): (2008)
2007
10EENicoletta De Francesco, Luca Martini: Instruction-level security analysis for information flow in stack-based assembly languages. Inf. Comput. 205(9): 1334-1370 (2007)
9EENicoletta De Francesco, Luca Martini: Instruction-level security typing by abstract interpretation. Int. J. Inf. Sec. 6(2-3): 85-106 (2007)
2006
8EECinzia Bernardeschi, Giuseppe Lettieri, Luca Martini, Paolo Masci: Using Control Dependencies for Space-Aware Bytecode Verification. Comput. J. 49(2): 234-248 (2006)
7EECinzia Bernardeschi, Giuseppe Lettieri, Luca Martini, Paolo Masci: Using postdomination to reduce space requirements of data flow analysis. Inf. Process. Lett. 98(1): 11-18 (2006)
2005
6EENicoletta De Francesco, Luca Martini: Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations. Formal Aspects in Security and Trust 2005: 63-80
5EECinzia Bernardeschi, Giuseppe Lettieri, Luca Martini, Paolo Masci: A Space-Aware Bytecode Verifier for Java Cards. Electr. Notes Theor. Comput. Sci. 141(1): 237-254 (2005)
2004
4 Cinzia Bernardeschi, Luca Martini, Paolo Masci: Java bytecode verification with dynamic structures. IASTED Conf. on Software Engineering and Applications 2004: 559-564
3 Cinzia Bernardeschi, Luca Martini: Enforcement of applet boundaries in Java card systems. IASTED Conf. on Software Engineering and Applications 2004: 96-101
2EECinzia Bernardeschi, Nicoletta De Francesco, Giuseppe Lettieri, Luca Martini: Checking secure information flow in Java bytecode by code transformation and standard bytecode verification. Softw., Pract. Exper. 34(13): 1225-1255 (2004)
2003
1EECinzia Bernardeschi, Nicoletta De Francesco, Luca Martini: Efficient Bytecode Verification Using Immediate Postdominators in Control Flow Graphs: Extended Abstract. OTM Workshops 2003: 425-436

Coauthor Index

1Cinzia Bernardeschi [1] [2] [3] [4] [5] [7] [8] [11]
2Nicoletta De Francesco [1] [2] [6] [9] [10] [11]
3Giuseppe Lettieri [2] [5] [7] [8] [11]
4Paolo Masci [4] [5] [7] [8] [11]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)