Results 31 to 40 of about 18,338 (256)
Research on Malicious JavaScript Detection Technology Based on LSTM
The attacker injects malicious JavaScript into web pages to achieve the purpose of implanting Trojan horses, spreading viruses, phishing, and obtaining secret information.
Yong Fang +3 more
doaj +1 more source
A Model-Derivation Framework for Software Analysis [PDF]
Model-based verification allows to express behavioral correctness conditions like the validity of execution states, boundaries of variables or timing at a high level of abstraction and affirm that they are satisfied by a software system.
Aksit, Mehmet +3 more
core +3 more sources
Accidental Choices—How JVM Choice and Associated Build Tools Affect Interpreter Performance
Considering the large number of optimisation techniques that have been integrated into the design of the Java Virtual Machine (JVM) over the last three decades, the Java interpreter continues to persist as a significant bottleneck in the performance of ...
Jonathan Lambert +2 more
doaj +1 more source
Practical Validation of Bytecode to Bytecode JIT Compiler Dynamic Deoptimization. [PDF]
Speculative inlining in just-in-time compilers enables many performance optimizations. However, it also introduces significant complexity. The compiler optimizations themselves, as well as the deoptimization mechanism are complex and error prone. To stabilize our bytecode to bytecode just-in-time compiler, we designed a new approach to validate the ...
Bera, Clément +3 more
openaire +1 more source
Experience with statically-generated proxies for facilitating Java runtime specialisation [PDF]
Issues pertaining to mechanisms which can be used to change the behaviour of Java classes at runtime are discussed. The proxy mechanism is compared to, and contrasted with other standard approaches to this problem.
Chiba +15 more
core +1 more source
The Glasgow Parallel Reduction Machine: Programming Shared-memory Many-core Systems using Parallel Task Composition [PDF]
We present the Glasgow Parallel Reduction Machine (GPRM), a novel, flexible framework for parallel task-composition based many-core programming. We allow the programmer to structure programs into task code, written as C++ classes, and communication code,
Tousimojarad, Ashkan +1 more
core +3 more sources
AbstractIn the Mobile Resource Guarantees project's Proof Carrying Code implementation, .class files are associated with Isabelle [Tobias Nipkow, Lawrence C. Paulson, Markus Wenzel, Isabelle/HOL: A Proof Assistant for Higher-Order Logic, volume 2283 of LNCS. Springer-Verlag, 2002] proof scripts containing proofs of bounds on their resource consumption.
Gilmore, Stephen; id_orcid 0000-0001-7135-5616 +1 more
openaire +2 more sources
Description and Optimization of Abstract Machines in a Dialect of Prolog [PDF]
In order to achieve competitive performance, abstract machines for Prolog and related languages end up being large and intricate, and incorporate sophisticated optimizations, both at the design and at the implementation levels.
Carro, Manuel +2 more
core +2 more sources
Enhanced method based on virtual registers rotation
Sematic attacks based on the data flow analysis bring big challenges to the code obfuscation.Concerning the data flow of virtual machine based (VM-based) code protection,the method transfers the mapping relation between the virtual registers and the op ...
Yan PAN,Wei LIN
doaj +3 more sources
ScanAT: Identification of Bytecode-Only Smart Contracts With Multiple Attribute Tags
Smart contracts on blockchain systems implement business logic and directly handle important assets. Although smart contracts play these critical roles, it is hard for users interacting with the system to understand the real behavior of the deployed ...
Yuntae Kim, Dohyun Pak, Jonghyup Lee
doaj +1 more source

