Results 31 to 40 of about 18,338 (256)

Research on Malicious JavaScript Detection Technology Based on LSTM

open access: yesIEEE Access, 2018
The attacker injects malicious JavaScript into web pages to achieve the purpose of implanting Trojan horses, spreading viruses, phishing, and obtaining secret information.
Yong Fang   +3 more
doaj   +1 more source

A Model-Derivation Framework for Software Analysis [PDF]

open access: yes, 2017
Model-based verification allows to express behavioral correctness conditions like the validity of execution states, boundaries of variables or timing at a high level of abstraction and affirm that they are satisfied by a software system.
Aksit, Mehmet   +3 more
core   +3 more sources

Accidental Choices—How JVM Choice and Associated Build Tools Affect Interpreter Performance

open access: yesComputers, 2022
Considering the large number of optimisation techniques that have been integrated into the design of the Java Virtual Machine (JVM) over the last three decades, the Java interpreter continues to persist as a significant bottleneck in the performance of ...
Jonathan Lambert   +2 more
doaj   +1 more source

Practical Validation of Bytecode to Bytecode JIT Compiler Dynamic Deoptimization. [PDF]

open access: yesThe Journal of Object Technology, 2016
Speculative inlining in just-in-time compilers enables many performance optimizations. However, it also introduces significant complexity. The compiler optimizations themselves, as well as the deoptimization mechanism are complex and error prone. To stabilize our bytecode to bytecode just-in-time compiler, we designed a new approach to validate the ...
Bera, Clément   +3 more
openaire   +1 more source

Experience with statically-generated proxies for facilitating Java runtime specialisation [PDF]

open access: yes, 2002
Issues pertaining to mechanisms which can be used to change the behaviour of Java classes at runtime are discussed. The proxy mechanism is compared to, and contrasted with other standard approaches to this problem.
Chiba   +15 more
core   +1 more source

The Glasgow Parallel Reduction Machine: Programming Shared-memory Many-core Systems using Parallel Task Composition [PDF]

open access: yes, 2013
We present the Glasgow Parallel Reduction Machine (GPRM), a novel, flexible framework for parallel task-composition based many-core programming. We allow the programmer to structure programs into task code, written as C++ classes, and communication code,
Tousimojarad, Ashkan   +1 more
core   +3 more sources

Proof-carrying Bytecode

open access: yesElectronic Notes in Theoretical Computer Science, 2005
AbstractIn the Mobile Resource Guarantees project's Proof Carrying Code implementation, .class files are associated with Isabelle [Tobias Nipkow, Lawrence C. Paulson, Markus Wenzel, Isabelle/HOL: A Proof Assistant for Higher-Order Logic, volume 2283 of LNCS. Springer-Verlag, 2002] proof scripts containing proofs of bounds on their resource consumption.
Gilmore, Stephen; id_orcid 0000-0001-7135-5616   +1 more
openaire   +2 more sources

Description and Optimization of Abstract Machines in a Dialect of Prolog [PDF]

open access: yes, 2014
In order to achieve competitive performance, abstract machines for Prolog and related languages end up being large and intricate, and incorporate sophisticated optimizations, both at the design and at the implementation levels.
Carro, Manuel   +2 more
core   +2 more sources

Enhanced method based on virtual registers rotation

open access: yes网络与信息安全学报, 2018
Sematic attacks based on the data flow analysis bring big challenges to the code obfuscation.Concerning the data flow of virtual machine based (VM-based) code protection,the method transfers the mapping relation between the virtual registers and the op ...
Yan PAN,Wei LIN
doaj   +3 more sources

ScanAT: Identification of Bytecode-Only Smart Contracts With Multiple Attribute Tags

open access: yesIEEE Access, 2019
Smart contracts on blockchain systems implement business logic and directly handle important assets. Although smart contracts play these critical roles, it is hard for users interacting with the system to understand the real behavior of the deployed ...
Yuntae Kim, Dohyun Pak, Jonghyup Lee
doaj   +1 more source

Home - About - Disclaimer - Privacy