Results 231 to 240 of about 18,338 (256)
Some of the next articles are maybe not open access.
On object initialization in the Java bytecode
Computer Communications, 2000Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs can be statically analyzed and validated. The program's behavior is then monitored to prevent potentially malicious operations. Static analysis of untrusted classes is carried
Stephane Doyon, Mourad Debbabi
openaire +1 more source
Characterizing WebAssembly Bytecode
Proceedings of the 19th International Conference on Managed Programming Languages and Runtimes, 2022Yuxin Qin, Dejice Jacob, Jeremy Singer
openaire +1 more source
JaBÁ: A Java Bytecoder Analyser
Anais do XVI Simpósio Brasileiro de Engenharia de Software (SBES 2002), 2002Many existing control-flow and data-flow based techniques for software testing and program analysis require source code instrumentation. However, this approach may not be feasible for component-based software as some of its components can be commercial off-the-shelf products or developed by a third party, and therefore the corresponding source code is ...
Auri M. R. Vincenzi +4 more
openaire +1 more source
On the Naturalness of Bytecode Instructions
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022Yoon-Ho Choi, Jaechang Nam
openaire +1 more source
Bytecode Generation for XQuery Compiler
2009 First International Workshop on Database Technology and Applications, 2009This paper represents a compiler for XQuery that obtains a more efficient performance by translating its programs to Java bytecode. It gives an overview of the system design with multi-phase translation structure, and describes the translation algorithm in detail.
Yue Chen, Fei Yuan, Husheng Liao
openaire +1 more source
2008
The notion of bytecodes can be traced back to the 60's with BCPL O-codes. These were essentially used to pursue platform independence. Later, with Pascal p-codes and Smalltalk bytecodes the objective shifted to the concept of virtual machines as precursors to dedicated hardware implementations, culminating in Lilith and SOAR.
openaire +1 more source
The notion of bytecodes can be traced back to the 60's with BCPL O-codes. These were essentially used to pursue platform independence. Later, with Pascal p-codes and Smalltalk bytecodes the objective shifted to the concept of virtual machines as precursors to dedicated hardware implementations, culminating in Lilith and SOAR.
openaire +1 more source
Verified Bytecode Model Checkers
2002We have used Isabelle/HOL to formalize and prove correct an approach to bytecode verification based on model checking that we have developed for the Java Virtual Machine. Our work builds on, and extends, the formalization of the Java Virtual Machine and data flow analysis framework of Pusch and Nipkow. By building on their framework, we can reuse their
David A. Basin +2 more
openaire +1 more source
BCGen: a comment generation method for bytecode
Automated Software Engineering, 2022Xiangping Chen, Xiaocong Zhou
exaly
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching
IEEE Transactions on Information Forensics and Security, 2021Jianjun Huang, Wei You, Wenchang Shi
exaly

