2008 |
11 | EE | Cinzia Bernardeschi,
Nicoletta De Francesco,
Giuseppe Lettieri,
Luca Martini,
Paolo Masci:
Decomposing bytecode verification by abstract interpretation.
ACM Trans. Program. Lang. Syst. 31(1): (2008) |
2007 |
10 | EE | Nicoletta De Francesco,
Luca Martini:
Instruction-level security analysis for information flow in stack-based assembly languages.
Inf. Comput. 205(9): 1334-1370 (2007) |
9 | EE | Nicoletta De Francesco,
Luca Martini:
Instruction-level security typing by abstract interpretation.
Int. J. Inf. Sec. 6(2-3): 85-106 (2007) |
2006 |
8 | EE | Cinzia Bernardeschi,
Giuseppe Lettieri,
Luca Martini,
Paolo Masci:
Using Control Dependencies for Space-Aware Bytecode Verification.
Comput. J. 49(2): 234-248 (2006) |
7 | EE | Cinzia Bernardeschi,
Giuseppe Lettieri,
Luca Martini,
Paolo Masci:
Using postdomination to reduce space requirements of data flow analysis.
Inf. Process. Lett. 98(1): 11-18 (2006) |
2005 |
6 | EE | Nicoletta De Francesco,
Luca Martini:
Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations.
Formal Aspects in Security and Trust 2005: 63-80 |
5 | EE | Cinzia Bernardeschi,
Giuseppe Lettieri,
Luca Martini,
Paolo Masci:
A Space-Aware Bytecode Verifier for Java Cards.
Electr. Notes Theor. Comput. Sci. 141(1): 237-254 (2005) |
2004 |
4 | | Cinzia Bernardeschi,
Luca Martini,
Paolo Masci:
Java bytecode verification with dynamic structures.
IASTED Conf. on Software Engineering and Applications 2004: 559-564 |
3 | | Cinzia Bernardeschi,
Luca Martini:
Enforcement of applet boundaries in Java card systems.
IASTED Conf. on Software Engineering and Applications 2004: 96-101 |
2 | EE | Cinzia Bernardeschi,
Nicoletta De Francesco,
Giuseppe Lettieri,
Luca Martini:
Checking secure information flow in Java bytecode by code transformation and standard bytecode verification.
Softw., Pract. Exper. 34(13): 1225-1255 (2004) |
2003 |
1 | EE | Cinzia Bernardeschi,
Nicoletta De Francesco,
Luca Martini:
Efficient Bytecode Verification Using Immediate Postdominators in Control Flow Graphs: Extended Abstract.
OTM Workshops 2003: 425-436 |