Results 1 to 10 of about 18,338 (256)
JAVA BYTECODE INSTRUCTION USAGE COUNTING WITH ALGATOR [PDF]
Development of algorithms for solving various kinds of computer related problems consists of several consecutive and possibly repetitive phases. The final and very important step in this process is to implement the developed algorithm in a selected ...
Tomaž DOBRAVEC
doaj +2 more sources
Malware homology determination using visualized images and feature fusion [PDF]
The family homology determination of malware has become a research hotspot as the number of malware variants are on the rise. However, existing studies on malware visualization only determines homology based on the global structure features of executable,
Xuejin Zhu +3 more
doaj +3 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Gerwin Klein, Tobias Nipkow
exaly +3 more sources
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extension of Java that adds pattern-matching facilities, to describe transformations. An originality of Tom is that it provides a powerful strategy language to express traversals over
Emilie Balland, Pierre-Étienne Moreau
exaly +3 more sources
AbstractProgram logics for bytecode languages such as Java bytecode or the .NET CIL can be used to apply Proof-Carrying Code concepts to bytecode programs and to verify correctness properties of bytecode programs. This paper presents a Hoare-style logic for a sequential bytecode kernel language similar to Java bytecode and CIL. The logic handles object-
Peter Müller
exaly +2 more sources
Semantic lossless encoded image representation for malware classification [PDF]
Combining artificial intelligence with static analysis is an effective method for classifying malicious code. Due to the development of anti-analysis techniques, malicious code commonly employs obfuscation methods like packing, which result in garbled ...
Yaoxiang Yu +7 more
doaj +2 more sources
From CIL to Java bytecode: Semantics-based translation for static analysis leveraging
Pietro Ferrara +2 more
exaly +2 more sources
Superoptimization of WebAssembly bytecode [PDF]
4 pages, 3 figures. Proceedings of MoreVMs: Workshop on Modern Language Runtimes, Ecosystems, and VMs (2020)
Javier Cabrera-Arteaga +6 more
openaire +2 more sources
Logical bytecode reduction [PDF]
Reducing a failure-inducing input to a smaller one is challenging for input with internal dependencies because most sub-inputs are invalid. Kalhauge and Palsberg made progress on this problem by mapping the task to a reduction problem for dependency graphs that avoids invalid inputs entirely.
Christian Gram Kalhauge, Jens Palsberg
openaire +1 more source
Bytecode-based approach for Ethereum smart contract classification
In recent years, blockchain technology has been widely used and concerned in many fields, including finance, medical care and government affairs.However, due to the immutability of smart contracts and the particularity of the operating environment ...
Dan LIN +3 more
doaj +3 more sources

