Higher-order strategic programming: A road to software assurance

Victor L. Winter, Steve Roach, Fares Fraij

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Program transformation through the repeated application of simple rewrite rules is conducive to formal verification. In practice, program transformation oftentimes requires data to be moved throughout the program structure. This article explores the use of higher-order rewrite rules as the mechanism for accomplishing such data movement. The effectiveness of higher-order rewrite rules is demonstrated by showing how they can be used to perform field distribution within a Java class loader. An approach to formal verification of a higher-order strategic implementation of a class loader is also briefly discussed.

Original languageEnglish (US)
Title of host publicationProceedings of the Eighth IASTED International Conference on Software Engineering and Applications
EditorsM.H. Hamza
Pages350-355
Number of pages6
StatePublished - 2004
EventProceedings of the Eighth IASTED International Conference on Software Engineering and Applications - Cambridge, MA, United States
Duration: Nov 9 2004Nov 11 2004

Publication series

NameProceedings of the Eigtht IASTED International Conference on Software Engineering and Applications

Conference

ConferenceProceedings of the Eighth IASTED International Conference on Software Engineering and Applications
CountryUnited States
CityCambridge, MA
Period11/9/0411/11/04

Keywords

  • Distributed data problem
  • Higher-order rules
  • Java class loader
  • Program transformation
  • Sandia Secure Processor

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Higher-order strategic programming: A road to software assurance'. Together they form a unique fingerprint.

  • Cite this

    Winter, V. L., Roach, S., & Fraij, F. (2004). Higher-order strategic programming: A road to software assurance. In M. H. Hamza (Ed.), Proceedings of the Eighth IASTED International Conference on Software Engineering and Applications (pp. 350-355). [436-112] (Proceedings of the Eigtht IASTED International Conference on Software Engineering and Applications).