Verifying intermediate language code

Data processing: software development – installation – and managem – Software program development tool – Translation of code

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C717S139000, C717S148000, C717S118000

Reexamination Certificate

active

06851108

ABSTRACT:
A verification module evaluates intermediate language code to verify that the code is type safe before passing the code for execution. Code that is not deemed type safe can cause execution errors, corrupt the runtime environment in which the code is executing, or cause unauthorized access to protected system resources. As such, the verification module protects a computer system from intentional or inadvertent breaches of the computer system's defenses. The verification module verifies the type safety of intermediate language code that supports significant high-level language constructs prohibited by verification modules in the prior art. One exemplary verification module verifies intermediate language code that includes one or more reference-based parameter, such as a pointer (or reference), a value class containing pointers, a RefAny parameter, or a nested pointer.

REFERENCES:
patent: 5659753 (1997-08-01), Murphy et al.
patent: 5668999 (1997-09-01), Gosling
patent: 5740441 (1998-04-01), Yellin et al.
patent: 5748964 (1998-05-01), Gosling
patent: 5999731 (1999-12-01), Yellin et al.
patent: 6075940 (2000-06-01), Gosling
patent: 6092147 (2000-07-01), Levy et al.
White-Gartwaite, The GC Interface in the EVM, Dec. 1998, Sun Microsystems, SML TR-98-67.*
Laukkanen, Real-time Java—Memory Management, Date unknown, University of Helsinki, Department of Computer Science.*
Thorn, “Programming Languages for Mobile Code,” ACM Computing Surveys, vol. 29, No. 3, Sep. 1997.
Rémy et al., “Objective Caml—A general purpose high-level programming language,”ERCIM NewsNo. 36, available at http://caml.inria.fr/ercim.html [accessed Jun. 1, 1999].
Rouaix, “A Web Navigator with applets in Caml,”Computer Networks and ISDN Systems, vol. 28, Nos. 7-11, Proceedings of the Fifth International World Wide Web Conference, Paris, France, May 6-10, 01996.
“Cmm and Java Compared: A comparison of modern languages for the internet and WorldWide Web,” published Apr. 1997, available at http://www.nombas.com/us/otherdoc/javavcmm.htm [accessed Jul. 12, 1999].
Howard, “Eiffel A Quick Overview,” Journal of Object-Oriented Programming, vol. 5, No. 8, Jan. 1993.
Schoenefeld, “Object-oriented Design and Programming: An Eiffel, C++, and Java Course for C Programmers,” University of Tulsa, OK, Proceedings of the twenty-eight SIGCSE Technical Symposium on Computer Science Education, vol. 29, No. 1, Mar. 1997.
“Web Programming Languages,” available at http://www.objs.com/survey/lang.htm [accessed Jul. 12, 1999].
Leroy et al., “Security properties of typed applets,” Proceedings of the 25thACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Diego, CA, Jan. 19-21, 1998.
Necula et al., “Safe Kernel Extensions Without Run-Time Checking,” Carnegie Mellon University, Pittsburgh, PA, Proceedings of the Second Symposium on Operating Systems Design and Implementation, Seattle, WA, Oct. 28-31, 1996.
Wahbe et al., “Efficient Software-Based Fault Isolation,” University of California, Berkeley, CA, Proceedings of the 14thACM Symposium on Operating Systems Principles, 1993.
Necula et al., “Safe, Untrusted Agents using Proof-Carrying Code,” Carnegie Mellon University, Pittsburgh, PA, submitted to Lecture Notes inComputer ScienceSpecial Issue on Mobile Agents, Oct. 1997.
Necula et al., “Proof-Carrying Code,” Carnegie Mellon University, Pittsburgh, PA, Proceedings of the 24thAnnual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Paris, France, Jan. 15-17, 1997.
Dorwood et al., “Inferno,” Proceedings IEEE COMPCON, San Jose, CA, Feb. 23-26, 1997.
“A comparison of Inferno and Java,” Computing Sciences Research Center of Bell Labs, Murray, NJ White Paper available at http://www,lucent-inferno.com [accessed Jul. 12, 1999].
“Inferno User's Guide.” pp.1-1 through 1-14.
Thorn, “Programming Languages for Mobile Code,”ACM Computing Surveys, vol. 29, No. 3, Sep. 1997.
Gostling et al., “The Java ™ Language Environment,” White Paper, Sun Microsystems, Mountain View, CA, May 1996.
Franz et al., “Does Java Have Allternatives,” University of California, Irvine, CA, Proceedings of the Third California Software Symposium (CCS 1997).
Youmans, “Java: Cornerstone of the Global Network Enterprise,” Virginia Tech, Spring 1997.
Ortiz, Jr., “The Battle over Real-Time Java,”Computer, Jun. 1999.
“Elements of comparison Java/Hotjava vs. Caml/MMM,” available at http://pauillac.inria.fr/˜rouaix/mmm/current/javacomp.html [accessed May 28, 1999].
Kramer et al., “The Java™ Platform,” Sun Microsystems 1997 available at http://www.javasoft.com/docs/white/platform/javaplatformTOC.doc.html [accessed Jul. 22, 1999].
Liang et al., “Dynamic Class Loading in the Java™ Virtual Machine,” Sun Microsystems, Palo Alto, CA,ACM Sigplan Notices, vol. 33, No. 10, Oct. 1998.
Yelland, “A Compositional Account of the Java™ Virtual Machine,” Sun Microsystems, Palo Alto, CA, Proceedings of the 26thACM SIGPLAN-SIGACT on Principles of Programming Languages, 1999.
Goldberg, “A Specification of Java Loading and Bytecode Verification,” Kestrell Institute, Palo Alto, CA, Proceedings of the 5thACM Conference on Computer and Communications Security, 1998.
Franz et al., “Introducing Juice,” University of California, Irvine, CA, Oct. 30, 1996, available at http://caesar.ics.uci.edu/intro.html [accessedJul. 7, 1999].
Waddington et al., “Java: Virtual Machine for Virtually Any Platform,” Embedded Systems Programming, vol. 9, No. 6, Jun. 1966.
Gosling et al., “Java Intermediate Bytecodes,” Proceedings ACM Sigplan Workshop on Intermediate Representations, San Francisco, CA, Jan. 22, 1995. ACM SIGGPLAN Notices, vol. 30, No. 3, Mar. 1995.
Frascadore, “Java Application Server Security Using Capabilities,”Java™ Report, Mar. 1999, pp. 31-42.
Zhang, “Secure Code Distribution,”Computer, vol. 30, Issue 6, Jun. 1997, pp. 76-79.
Hester et al., “Building Flexible and Extensible Web Applications with Lua,”Journal of Universal Computer Science,vol. 4, No. 9, 1998, pp. 748-762.
Waldo, “Programming with Java,”Unix Review, May 1996, pp. 31-37.
Harbison, “Modula-3,”BYTE, vol.15, No. 12, Nov. 1990, pp. 385-392.
The Modula-3 Programming Language, Dr. Dobb's Journal, vol. 19, No. 12, Winter 1994.
Grimm et al., “Access Control for the SPIN Extensible Operating System,” University of Washington, Seattle, WA, IEEE Symposium on Security and Privacy, 1997, p. 205.
Robinson, “Modula-3 in an undergraduate Computer Science course,” The Second International MODULA-2 Conference, ‘MODULA-2 and BEYOND’, Sep. 11, 1991.
Templ, “Oberon vs. C++,” The Modula Tor, Oberon-2 and Modula-2 Technical Publication, No. 9, Oct. 1994.
Adl-Tabatabi et al., “Efficient and Language-Independent Mobile Programs,” ACM Sigplan Notices, vol. 31, No. 5, May 1996.
“Differences Between Phantom and Java,” from Internet at http://www.apocalypse.org/pub/u/antony/phantom/javadiffs.htm [accessed Jul. 19, 1999].
Rook, “A Language Collector Comments on: Java, Perl & Python,” available at http://www.chips.navy.mil/chips/archives/97 [accessed Jul. 12, 1999].
Masse, “Development Strategies for Better Software: An Analysis of Two Next-Generation Languages: Java and Python,” Fifth Python Workshop, Nov. 26, 1996, from Pythin website http://www.python.org/˜masse/papers/java-python96 [accessed Jul 12, 1999].
“Development Strategies for Better Software,” Fifth Python Workshop, Dec. 12, 1996, from Python website http://www.python.org/˜masse/papers/java-python96.
Nicolaou, “CS 642 Term

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Verifying intermediate language code does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Verifying intermediate language code, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Verifying intermediate language code will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3454686

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.