Results 11 to 20 of about 18,338 (256)
This article discusses the problem of automatic generation of peephole-optimization of the static bytecode optimizer of a virtual machine (VM) concerning the task of improving the instruction set architecture (ISA) of the VM.
Anna Antipina
doaj +1 more source
Python Program Anti-reversal Algorithm Based on Opcode Merging [PDF]
The program written by Python programming language is compiled and generated bytecode,which is a specific structure for Python virtual machine.The file is easily decompressed by reverse tools,thereby damaging the economic interests and personal privacy ...
WANG Xiaoqiang,GU Naijie
doaj +1 more source
Polymorphic bytecode instrumentation [PDF]
Bytecode instrumentation is a widely used technique to implement aspect weaving and dynamic analyses in virtual machines such as the Java Virtual Machine. Aspect weavers and other instrumentations are usually developed independently and combining them often requires significant engineering effort, if at all possible.
Philippe Moret +2 more
openaire +1 more source
SJBCD: A Java Code Clone Detection Method Based on Bytecode Using Siamese Neural Network
Code clone detection is an important research topic in the field of software engineering. It is significant in developing software and solving software infringement disputes to discover code clone phenomenon effectively in and between software systems ...
Bangrui Wan +3 more
doaj +1 more source
Speculatively vectorized bytecode [PDF]
Diversity is a confirmed trend of computing systems, which present a complex and moving target to software developers. Virtual machines and just-in-time compilers have been proposed to mitigate the complexity of these systems. They do so by offering a single and stable abstract machine model thereby hiding architectural details from programmers.
Rohou, Erven +6 more
openaire +2 more sources
An Android malware family classification method based on the image of bytecode was proposed accord-ing to the exponential growth of Android malware.A bytecode file of Android malware was converted to a 256-level grayscale image and texture features was ...
Yi-min YANG, Tie-ming CHEN
doaj +3 more sources
Information Flow Control in WebKit's JavaScript Bytecode [PDF]
Websites today routinely combine JavaScript from multiple sources, both trusted and untrusted. Hence, JavaScript security is of paramount importance. A specific interesting problem is information flow control (IFC) for JavaScript.
Bichhawat, Abhishek +3 more
core +2 more sources
Today, when Java is entering the embedded market it needs performance en-hancements more than ever. Large-scale enter-prise applications would also benefit from better code optimization techniques. In this paper we present the results of opti-mization with an optimizing framework we have developed.
Babić, Domagoj, Rakamarić, Zvonimir
openaire +2 more sources
Android application privacy protection mechanism based on virtual machine bytecode injection
To solve the abuse of the Android application permission mechanism, a method of Android application access control based on virtual machine bytecode injection technology was proposed.The security policy in the form of virtual machine bytecode was ...
Yubo SONG, Qi CHEN, Rui SONG, Aiqun HU
doaj +2 more sources
Detecting Java Code Clones Based on Bytecode Sequence Alignment
When the source code is copied and pasted or modified, there will be a lot of identical or similar code snippets in the software system, which are called code clones.
Dongjin Yu +3 more
doaj +1 more source

