Results 91 to 100 of about 18,338 (256)

Adversarial Examples with Unlimited Amount of Additions [PDF]

open access: yesJisuanji kexue yu tansuo
Malware detection methods based on gray images and deep learning have the characteristics of high detection accuracy and no need of feature engineering. Unfortunately, adversarial examples (AEs) can deceive such detection methods.
JIANG Zhoujie, CHEN Yi, XIONG Ziman, GUO Chun, SHEN Guowei
doaj   +1 more source

AEDroid: Adaptive Enhanced Android Malware Detection‐Based on Interpretability of Deep Learning

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
As the most widely used operating system in the world, Android has naturally become the main target of malicious hackers. The current research on Android malware detection relies on manually defined sensitive API feature sets. With the continuous innovation and change of malicious behavior, new threats and attack methods have emerged.
Pengfei Liu   +5 more
wiley   +1 more source

Yul2Vec: Yul Code Embeddings

open access: yesApplied Sciences
In this paper, I propose Yul2Vec, a novel method for representing Yul programs as distributed embeddings in continuous space. Yul serves as an intermediate language between Solidity and Ethereum Virtual Machine (EVM) bytecode, designed to enable more ...
Krzysztof Fonał
doaj   +1 more source

Refactoring Java Programs for Customizable Locks Based on Bytecode Transformation

open access: yesIEEE Access, 2019
Developers of parallel programming are faced with choices of using various Java locks. Choosing the best lock is a challenging task because a multithreaded application implemented using different locks may end up with uncertain performance.
Yang Zhang   +5 more
doaj   +1 more source

WinDroid: A Novel Framework for Windows and Android Malware Family Classification Using Hierarchical Ensemble Support Vector Machines With Multiview Handcrafted and Deep Learning Features

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The rapid growth and diversification of malware variants, driven by advanced code obfuscation, evasion, and antianalysis techniques, present a significant threat to cybersecurity. The inadequacy of traditional methods in accurately classifying these evolving threats highlights the need for effective and robust malware classification techniques.
K. Sundara Krishnan   +2 more
wiley   +1 more source

Verified Bytecode Verifiers [PDF]

open access: yes, 2001
Using the theorem prover Isabelle/HOL we have formalized and proved correct an executable bytecode verifier in the style of Kildall's algorithm for a significant subset of the Java Virtual Machine. First an abstract framework for proving correctness of data flow based type inference algorithms for assembly languages is formalized.
openaire   +1 more source

MMF: A Lightweight Approach of Multimodel Fusion for Malware Detection

open access: yesIET Software, Volume 2025, Issue 1, 2025.
Nowadays, the Android system is widely used in mobile devices. The existence of malware in the Android system has posed serious security risks. Therefore, detecting malware has become a main research focus for Android devices. The existing malware detection methods include those based on static analysis, dynamic analysis, and hybrid analysis.
Bo Yang   +4 more
wiley   +1 more source

Test Data Generation of Bytecode by CLP Partial Evaluation

open access: yes, 2008
We employ existing partial evaluation (PE) techniques developed for Constraint Logic Programming (CLP) in order to automatically generate test-case generators for glass-box testing of bytecode. Our approach consists of two independent CLP PE phases.
Albert Albiol, Elvira   +2 more
core  

A Complexity Preserving Transformation from Jinja Bytecode to Rewrite Systems [PDF]

open access: yes, 2014
We revisit known transformations from Jinja bytecode to rewrite systems from the viewpoint of runtime complexity. Suitably generalising the constructions proposed in the literature, we define an alternative representation of Jinja bytecode (JBC ...
Moser, Georg, Schaper, Michael
core  

cphVB: A System for Automated Runtime Optimization and Parallelization of Vectorized Applications

open access: yes, 2012
Modern processor architectures, in addition to having still more cores, also require still more consideration to memory-layout in order to run at full capacity.
Blum, Troels   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy