Results 231 to 240 of about 18,338 (256)
Some of the next articles are maybe not open access.

On object initialization in the Java bytecode

Computer Communications, 2000
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs can be statically analyzed and validated. The program's behavior is then monitored to prevent potentially malicious operations. Static analysis of untrusted classes is carried
Stephane Doyon, Mourad Debbabi
openaire   +1 more source

Characterizing WebAssembly Bytecode

Proceedings of the 19th International Conference on Managed Programming Languages and Runtimes, 2022
Yuxin Qin, Dejice Jacob, Jeremy Singer
openaire   +1 more source

JaBÁ: A Java Bytecoder Analyser

Anais do XVI Simpósio Brasileiro de Engenharia de Software (SBES 2002), 2002
Many existing control-flow and data-flow based techniques for software testing and program analysis require source code instrumentation. However, this approach may not be feasible for component-based software as some of its components can be commercial off-the-shelf products or developed by a third party, and therefore the corresponding source code is ...
Auri M. R. Vincenzi   +4 more
openaire   +1 more source

On the Naturalness of Bytecode Instructions

Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Yoon-Ho Choi, Jaechang Nam
openaire   +1 more source

Bytecode Generation for XQuery Compiler

2009 First International Workshop on Database Technology and Applications, 2009
This paper represents a compiler for XQuery that obtains a more efficient performance by translating its programs to Java bytecode. It gives an overview of the system design with multi-phase translation structure, and describes the translation algorithm in detail.
Yue Chen, Fei Yuan, Husheng Liao
openaire   +1 more source

Are Bytecodes an Atavism?

2008
The notion of bytecodes can be traced back to the 60's with BCPL O-codes. These were essentially used to pursue platform independence. Later, with Pascal p-codes and Smalltalk bytecodes the objective shifted to the concept of virtual machines as precursors to dedicated hardware implementations, culminating in Lilith and SOAR.
openaire   +1 more source

Verified Bytecode Model Checkers

2002
We have used Isabelle/HOL to formalize and prove correct an approach to bytecode verification based on model checking that we have developed for the Java Virtual Machine. Our work builds on, and extends, the formalization of the Java Virtual Machine and data flow analysis framework of Pusch and Nipkow. By building on their framework, we can reuse their
David A. Basin   +2 more
openaire   +1 more source

BCGen: a comment generation method for bytecode

Automated Software Engineering, 2022
Xiangping Chen, Xiaocong Zhou
exaly  

Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching

IEEE Transactions on Information Forensics and Security, 2021
Jianjun Huang, Wei You, Wenchang Shi
exaly  

Java Bytecode Verification

Journal of Automated Reasoning, 2003
openaire   +1 more source

Home - About - Disclaimer - Privacy