## Abstract IP traceback is a technique to combat distributed denial of service attacks. This technique can specify the routers in the path of the attack flow with forged source addresses. Although several techniques have been proposed to solve this problem, a variety of problems arise when operati
Formalisation and implementation of an algorithm for bytecode verification of @NonNull types
โ Scribed by Chris Male; David J. Pearce; Alex Potanin; Constantine Dymnikov
- Publisher
- Elsevier Science
- Year
- 2011
- Tongue
- English
- Weight
- 534 KB
- Volume
- 76
- Category
- Article
- ISSN
- 0167-6423
No coin nor oath required. For personal study only.
โฆ Synopsis
Java's annotation mechanism allows us to extend its type system with non-null types. Checking such types cannot be done using the existing bytecode verification algorithm. We extend this algorithm to verify non-null types using a novel technique that identifies aliasing relationships between local variables and stack locations in the JVM. We formalise this for a subset of Java Bytecode and report on experiences using our implementation.
๐ SIMILAR VOLUMES
In this article, we present an efficient computational implementation of an algorithm for finding the K shortest simple paths connecting a pair of vertices in an undirected graph with n vertices, m arcs, and nonnegative arc lengths. A minimal number of intermediate paths is formed based on the metho
In this article a modiยฎcation of an algorithm by Doghri (1993) for incorporating isotropic and kinematic hardening eects in von Mises elastoplasticity is proposed, whereby the discretized rate equations are reduced to a one-dimensional problem. The resulting relations for linearization of this probl