Deep Type Inference for Mobile Functions

We consider the problem of assessing the trustworthiness of mobile code. We introduce the idea of deep type inference on compiled object code and explain its usefulness as a method of deciding the level of security management which a unit of mobile code will require.

[1]  David B. MacQueen,et al.  The Definition of Standard ML (Revised) , 1997 .

[2]  Andrew W. Appel,et al.  Lambda-splitting: a higher-order approach to cross-module optimizations , 1997, ICFP '97.

[3]  Nick Benton,et al.  Interlanguage working without tears: blending SML with Java , 1999, ICFP '99.

[4]  Zhenyu Qian,et al.  Toward a provably-correct implementation of the JVM bytecode verifier , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[5]  Dan S. Wallach,et al.  Java security: from HotJava to Netscape and beyond , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[6]  Michael I. Schwartzbach,et al.  Type Inference for Turbo Pascal , 1995, Softw. Concepts Tools.

[7]  Geoffrey Smith,et al.  A Sound Polymorphic Type System for a Dialect of C , 1998, Sci. Comput. Program..

[8]  KennedyAndrew,et al.  Interlanguage working without tears , 1999 .

[9]  Robert D. Tennent Semantics of Interference Control , 1983, Theor. Comput. Sci..

[10]  Ralf Hinze,et al.  Haskell 98 — A Non−strict‚ Purely Functional Language , 1999 .

[11]  Masami Hagiya,et al.  On a New Method for Dataflow Analysis of Java Virtual Machine Subroutines , 1998, SAS.

[12]  Nick Benton,et al.  Compiling standard ML to Java bytecodes , 1998, ICFP '98.

[13]  Martín Abadi,et al.  A type system for Java bytecode subroutines , 1999, TOPL.

[14]  Ken Arnold,et al.  The Java Programming Language , 1996 .

[15]  Frank Yellin,et al.  The Java Virtual Machine Specification , 1996 .

[16]  David Wakeling,et al.  Mobile Haskell: Compiling Lazy Functional Programs for the Java Virtual Machine , 1998, PLILP/ALP.