Results 11 to 20 of about 18,338 (256)

The Task of Automatic Generation of Peephole-Optimizations: Approaches Overview, Solution of the Optimal Expansion of Managed Instructions Set Architecture

open access: yesСовременные информационные технологии и IT-образование, 2021
This article discusses the problem of automatic generation of peephole-optimization of the static bytecode optimizer of a virtual machine (VM) concerning the task of improving the instruction set architecture (ISA) of the VM.
Anna Antipina
doaj   +1 more source

Python Program Anti-reversal Algorithm Based on Opcode Merging [PDF]

open access: yesJisuanji gongcheng, 2018
The program written by Python programming language is compiled and generated bytecode,which is a specific structure for Python virtual machine.The file is easily decompressed by reverse tools,thereby damaging the economic interests and personal privacy ...
WANG Xiaoqiang,GU Naijie
doaj   +1 more source

Polymorphic bytecode instrumentation [PDF]

open access: yesProceedings of the tenth international conference on Aspect-oriented software development, 2011
Bytecode instrumentation is a widely used technique to implement aspect weaving and dynamic analyses in virtual machines such as the Java Virtual Machine. Aspect weavers and other instrumentations are usually developed independently and combining them often requires significant engineering effort, if at all possible.
Philippe Moret   +2 more
openaire   +1 more source

SJBCD: A Java Code Clone Detection Method Based on Bytecode Using Siamese Neural Network

open access: yesApplied Sciences, 2023
Code clone detection is an important research topic in the field of software engineering. It is significant in developing software and solving software infringement disputes to discover code clone phenomenon effectively in and between software systems ...
Bangrui Wan   +3 more
doaj   +1 more source

Speculatively vectorized bytecode [PDF]

open access: yesProceedings of the 6th International Conference on High Performance and Embedded Architectures and Compilers, 2011
Diversity is a confirmed trend of computing systems, which present a complex and moving target to software developers. Virtual machines and just-in-time compilers have been proposed to mitigate the complexity of these systems. They do so by offering a single and stable abstract machine model thereby hiding architectural details from programmers.
Rohou, Erven   +6 more
openaire   +2 more sources

Android malware family classification method based on the image of bytecodeConstruction of MDS matrices

open access: yes网络与信息安全学报, 2016
An Android malware family classification method based on the image of bytecode was proposed accord-ing to the exponential growth of Android malware.A bytecode file of Android malware was converted to a 256-level grayscale image and texture features was ...
Yi-min YANG, Tie-ming CHEN
doaj   +3 more sources

Information Flow Control in WebKit's JavaScript Bytecode [PDF]

open access: yes, 2014
Websites today routinely combine JavaScript from multiple sources, both trusted and untrusted. Hence, JavaScript security is of paramount importance. A specific interesting problem is information flow control (IFC) for JavaScript.
Bichhawat, Abhishek   +3 more
core   +2 more sources

Bytecode optimization

open access: yesITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534), 2003
Today, when Java is entering the embedded market it needs performance en-hancements more than ever. Large-scale enter-prise applications would also benefit from better code optimization techniques. In this paper we present the results of opti-mization with an optimizing framework we have developed.
Babić, Domagoj, Rakamarić, Zvonimir
openaire   +2 more sources

Android application privacy protection mechanism based on virtual machine bytecode injection

open access: yesTongxin xuebao, 2021
To solve the abuse of the Android application permission mechanism, a method of Android application access control based on virtual machine bytecode injection technology was proposed.The security policy in the form of virtual machine bytecode was ...
Yubo SONG, Qi CHEN, Rui SONG, Aiqun HU
doaj   +2 more sources

Detecting Java Code Clones Based on Bytecode Sequence Alignment

open access: yesIEEE Access, 2019
When the source code is copied and pasted or modified, there will be a lot of identical or similar code snippets in the software system, which are called code clones.
Dongjin Yu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy