Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ewen Denney is active.

Publication


Featured researches published by Ewen Denney.


ifip international conference on programming concepts and methods | 1998

Refinement types for specification

Ewen Denney

We develop a theory of program specification using the notion of refinement type. This provides a notion of structured specification, useful for verification and program development. We axiomatise the satisfaction of specifications by programs as a generalised typing relation and give rules for refining specifications. A per semantics based on Henkin models is given, for which the system is proven to be sound and complete.


Lecture Notes in Computer Science | 2001

An Operational Semantics of the Java Card Firewall

Marc Eluard; Thomas P. Jensen; Ewen Denney

This paper presents an operational semantics for a subset of Java Card bytecode, focussing on aspects of the Java Card firewall, method invocation, field access, variable access, shareable objects and contexts. The goal is to provide a precise description of the Java Card firewall using standard tools from operational semantics. Such a description is necessary for formally arguing the correctness of tools for validating the security of Java Card applications.


Theoretical Computer Science | 2002

Correctness of Java Card method lookup via logical relations

Ewen Denney; Thomas P. Jensen

This article presents a formalisation of the bytecode optimisation of Suns Java Card language from the class file to CAP file format as a set of constraints between the two formats, and defines and proves its correctness. Java Card bytecode is formalised using an abstract operational semantics, which can then be instantiated into the two formats. The optimisation is given as a logical relation such that the instantiated semantics are observably equal.


automated software engineering | 2001

The synthesis of a Java card tokenisation algorithm

Ewen Denney

We describe the development of a Java bytecode optimisation algorithm by the methodology of program extraction. We develop the algorithm as a collection of proofs and definitions in the Coq proof assistant, and then use Coqs extraction mechanism to automatically generate a program in OCaml. The extraction methodology guarantees that this program is correct. We discuss the feasibility of the methodology and suggest some improvements that could be made.


european symposium on programming | 2000

Correctness of Java Card Method Lookup via Logical Relations

Ewen Denney; Thomas P. Jensen

We formalise the Java Card bytecode optimisation from class file to CAP file format as a set of constraints between the two formats, and define and prove its correctness. Java Card bytecode is formalised as an abstract operational semantics, which can then be instantiated into the two formats. The optimisation is given as a logical relation such that the instantiated semantics are observably equal. The proof has been automated using the Coq theorem prover.


Springer-Verlag GmbH | 2004

Using the CORAL System to Discover Attacks on Security Protocols

Graham Steel; Alan Bundy; Ewen Denney

We have presented CORAL, our system for refuting incorrect inductive conjectures, and have shown how it can be applied to the problem of finding attacks on faulty security protocols. Our formalism is similar to Paulson’s, which allows us to deal directly with protocols involving an arbitrary number of participants and nonces, and with principals playing multiple roles. CORAL has discovered a number of known attacks, and some new attacks on a group-key protocol. In the longer term, we hope to apply the system to other, related security problems and exploit its ability to do equational reasoning in order to analyse some crytpoanalytic properties of protocols. (This paper is a shortened and updated version of [21]. )


Journal of Computer Science and Technology | 1998

Simply-typed underdeterminism

Ewen Denney

An extension of the simply-typed lambda calculus with constructs for expressing a notion calledunderdeterminism is studied. This allows us to interpret notions of stub and skeleton used in top-down program development. We axiomatise a simple notion of program refinement, and give a semantics, for which the calculus is proved sound and complete.


Archive | 2002

Finding Counterexamples to Inductive Conjectures and Discovering Security Protocol Attacks

Graham Steel; Alan Bundy; Ewen Denney


Archive | 2000

Method for verifying code transformers for an incorporated system, in particular in a chip card

Christian Goire; Thomas P. Jensen; Pascal Fradet; Daniel Le Métayer; Ewen Denney


Archive | 2002

Logic-based Program Synthesis via Program Extraction

Ewen Denney

Collaboration


Dive into the Ewen Denney's collaboration.

Top Co-Authors

Avatar

Alan Bundy

University of Edinburgh

View shared research outputs
Top Co-Authors

Avatar

Graham Steel

University of Edinburgh

View shared research outputs
Top Co-Authors

Avatar

Thomas P. Jensen

French Institute for Research in Computer Science and Automation

View shared research outputs
Top Co-Authors

Avatar

Marc Eluard

University of Edinburgh

View shared research outputs
Top Co-Authors

Avatar

Thomas P. Jensen

French Institute for Research in Computer Science and Automation

View shared research outputs
Researchain Logo
Decentralizing Knowledge