Evan Martin (evan) wrote in evan_tech,
Evan Martin

tail calls and security models

(I do get work done, I swear; I was waiting for a compile.)

An interesting thread over at Lambda the Ultimate (aka, where all of my posts come from) about tail-call optimization's interaction with Java's security model: if you naively optimize a function off the stack because of a tail-call there's the potential you're losing the security information (what permission that code has) associated with the function as well. As always, links to some papers are included.

I especially like the comment that says "The answer is so simple and obvious I'm amazed it took so long to find." and links to a 24-page paper full of sentences like "Following Cligner's [1998] work on defining tail-optimized languages via space complexity classes, we first reformulate the λsec semantics as a CESK machine."

  • flipped bits

    % bdiff /mnt/disk1/large_file /mnt/disk2/same_large_file diffing: [........................................] offset diff 346360387: 01011111 :…

  • yep, it's toast / wait, no it's not

    It wasn't the USB enclosure. Error 47 occurred at disk power-on lifetime: 2330 hours (97 days + 2 hours) Model Family: Seagate Barracuda 7200.7…

  • my "final destination" reference was prescient

    When I last discussed my disk problems, I had finally managed to recover my data though there was an ominous noise from my new disk. In the…

  • Post a new comment


    default userpic
    When you submit the form an invisible reCAPTCHA check will be performed.
    You must follow the Privacy Policy and Google Terms of use.