- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
java智能卡内字节码校验算法研究与实践2380msbf
华 中 科 技 大 学 硕 士 学 位 论 文
Abstract
Java card is widly used in the highly security fields such as bank, communication etc.
Byte code verification on the Java card is an indispensable part for a safe embedded
system. Traditional byte code verification is infeasible as limited by the space of the Java
card itself and the capability of the arithmetic unit. To solve this problem, three algorithms,
namely a cache policy based algorithm, a CFT(Control Flow Tree)based algorithm, and
a hybrid algorithm, are attempted for the byte code verification on the Java card in this
paper.
The key points of this paper are designing and implementing on-card Java card byte
code verification algorithms to solve the time and space limition of traditional algorithm.
Based on analyzing the translated byte code files construction and the hardware resources
on card, an effective on-card cache policy is designed and adopted after translating the
byte code files in the off-card part. The algorithm based on cache policy and that based on
CFT are prsented first. Then a new hybrid algorithm is proposed to trading off the
disadvantage of the previous two algorithms. These three algorithms improve the
traditional algorithm efficiency on aspects such as time complexity, space complexity and
time-space complexity respectively. And then the detailed schemes of Java card on-card
verifier based on off-card translation and on-card cache policy, building environment for
development, rewriting the Java card virtual machine, implementing off-card translater
and so on are put forward. At last the result of this paper and some suggestions of
improving the verification efficiency in the future are presented.
Keywords: Java card, byte code, Byte code verifier, Cache policy, Control Flow Tree
II
独创性声明
本人声明所呈交的学位论文是我个人在导师指导下进行的研究工作
及取得的研究成果。尽我所知,除文中已经标明引用的内容外,本论文不
包含任何其他个人或集体已经发表或撰写过的研究成果。对本文的研究做
出贡献的个人和集体,均已在文中以明确方式标明。本人完全意识到本声
明的法律结果由本人承担。
学位论文作者签名:
日期:
年
月
日
学位论文版权使用授权书
本学位论文作者完全了解学校有关保留、使用学位论文的规定,即:
学校有权保留
您可能关注的文档
最近下载
- 数学中考总复习.doc VIP
- 限制型心肌病超声诊断与评估.pptx
- _【课件】第四章 三角形 +问题解决策略:特殊化课件北师大版七年级数学下册.pptx VIP
- 中考数学总复习第一轮考点复习(重庆专版).pptx VIP
- 2025在线网课《信息检索与科技写作( 理大)》单元测试考核答案.pdf VIP
- 高频精选:京东快递员ai面试题及答案.doc VIP
- 新北师大版初中七年级数学下册《第四章三角形问题解决策略:特殊化(1)》教学课件.pptx VIP
- 河北 2023年农信社储蓄知识考试真题模拟汇编(共213题).doc VIP
- 河北 2023年农信社基础知识考试真题模拟汇编(共672题).doc VIP
- 四川省宜宾市2023-2024学年高一下学期期末学业质量监测语文试卷(原卷版+解析版).docx VIP
文档评论(0)