Results 1 to 10 of about 18,338 (256)

JAVA BYTECODE INSTRUCTION USAGE COUNTING WITH ALGATOR [PDF]

open access: diamondActa Electrotechnica et Informatica, 2019
Development of algorithms for solving various kinds of computer related problems consists of several consecutive and possibly repetitive phases. The final and very important step in this process is to implement the developed algorithm in a selected ...
Tomaž DOBRAVEC
doaj   +2 more sources

Malware homology determination using visualized images and feature fusion [PDF]

open access: yesPeerJ Computer Science, 2021
The family homology determination of malware has become a research hotspot as the number of malware variants are on the rise. However, existing studies on malware visualization only determines homology based on the global structure features of executable,
Xuejin Zhu   +3 more
doaj   +3 more sources

Verified bytecode verifiers

open access: yesTheoretical Computer Science, 2003
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Gerwin Klein, Tobias Nipkow
exaly   +3 more sources

Bytecode Rewriting in Tom

open access: yesElectronic Notes in Theoretical Computer Science, 2007
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extension of Java that adds pattern-matching facilities, to describe transformations. An originality of Tom is that it provides a powerful strategy language to express traversals over
Emilie Balland, Pierre-Étienne Moreau
exaly   +3 more sources

A Program Logic for Bytecode

open access: yesElectronic Notes in Theoretical Computer Science, 2005
AbstractProgram logics for bytecode languages such as Java bytecode or the .NET CIL can be used to apply Proof-Carrying Code concepts to bytecode programs and to verify correctness properties of bytecode programs. This paper presents a Hoare-style logic for a sequential bytecode kernel language similar to Java bytecode and CIL. The logic handles object-
Peter Müller
exaly   +2 more sources

Semantic lossless encoded image representation for malware classification [PDF]

open access: yesScientific Reports
Combining artificial intelligence with static analysis is an effective method for classifying malicious code. Due to the development of anti-analysis techniques, malicious code commonly employs obfuscation methods like packing, which result in garbled ...
Yaoxiang Yu   +7 more
doaj   +2 more sources

From CIL to Java bytecode: Semantics-based translation for static analysis leveraging

open access: hybridScience of Computer Programming, 2020
Pietro Ferrara   +2 more
exaly   +2 more sources

Superoptimization of WebAssembly bytecode [PDF]

open access: yesConference Companion of the 4th International Conference on Art, Science, and Engineering of Programming, 2020
4 pages, 3 figures. Proceedings of MoreVMs: Workshop on Modern Language Runtimes, Ecosystems, and VMs (2020)
Javier Cabrera-Arteaga   +6 more
openaire   +2 more sources

Logical bytecode reduction [PDF]

open access: yesProceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2021
Reducing a failure-inducing input to a smaller one is challenging for input with internal dependencies because most sub-inputs are invalid. Kalhauge and Palsberg made progress on this problem by mapping the task to a reduction problem for dependency graphs that avoids invalid inputs entirely.
Christian Gram Kalhauge, Jens Palsberg
openaire   +1 more source

Bytecode-based approach for Ethereum smart contract classification

open access: yes网络与信息安全学报, 2022
In recent years, blockchain technology has been widely used and concerned in many fields, including finance, medical care and government affairs.However, due to the immutability of smart contracts and the particularity of the operating environment ...
Dan LIN   +3 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy