Institut für Informatik,
Ludwig-Maximilians-Universität München
<hwloidl@tcs.ifi.lmu.de>
August 2005
In the first part of this document we describe how to use the proof-carrying-code infrastructure developed in the MRG project. It focuses on proving bounds for resource consumption, and some practical aspects on how to hack your certificates are discussed there. Background information on the underlying logics is given, with a separate reference page for the MRG logics. The second part is more of a developers guide, discussing how to install this infrastructure and the required components locally and how to extend it.
Next | ||
Using the PCC Infrastructure |