Results 121 to 130 of about 18,338 (256)
Copy-and-patch compilation: a fast compilation algorithm for high-level languages and bytecode [PDF]
Haoran Xu, Fredrik Kjølstad
openalex +1 more source
BejaGNN: behavior-based Java malware detection via graph neural network. [PDF]
Feng P, Yang L, Lu D, Xi N, Ma J.
europepmc +1 more source
STAN: Towards Describing Bytecodes of Smart Contract [PDF]
Xiaoqi Li +5 more
openalex +1 more source
To address the limitations of current deep learning-based methods in extracting contract bytecode features and representing vulnerability semantics, as well as the shortcomings of the traditional graph neural networks in learning temporal information ...
ZHUANG Yuan +4 more
doaj +2 more sources
Evaluation of 6LoWPAN Generic Header Compression in the Context of a RPL Network. [PDF]
Vandervelden T +5 more
europepmc +1 more source
Non-termination of Dalvik bytecode via compilation to CLP
We present a set of rules for compiling a Dalvik bytecode program into a logic program with array constraints. Non-termination of the resulting program entails that of the original one, hence the techniques we have presented before for proving non ...
Mesnard, Fred, Payet, Etienne
core
Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART [PDF]
Geonbae Na +3 more
openalex +1 more source
Verification System of Removable Key Carriers Software
Removable key carriers are most widespread devices for cryptographic key systems. The most popular platform for them is JavaCard. However, an on-card bytecode verifier is only optional on JavaCard smartcards, and indeed most cards do not include it. That’
Sergey Sergeevich Agafyin +1 more
doaj
A Low-Latency Optimization of a Rust-Based Secure Operating System for Embedded Devices. [PDF]
Culic I, Vochescu A, Radovici A.
europepmc +1 more source
Smart contracts software metrics: A first study. [PDF]
Tonelli R +3 more
europepmc +1 more source

