Termination and Cost Analysis with COSTA and its User Interfaces [PDF]
COSTA is a static analyzer for Java bytecode which is able to infer cost and termination information for large classes of programs. The analyzer takes as input a program and a resource of interest, in the form of a cost model, and aims at obtaining an ...
Albert Albiol, Elvira +7 more
core +2 more sources
Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity
To protect programs from unauthorized analysis, virtualize the code based on Virtual Machine (VM) technologies is emerging as a feasible method for accomplishing code obfuscation.
Wei Wang +9 more
doaj +1 more source
Asserting Bytecode Safety [PDF]
We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized variant of Java bytecode featuring objects, inheritance, method calls and exceptions. Bytecode annotated in a first order expression language can be certified not to produce arithmetic overflows.
Martin Wildmoser, Tobias Nipkow
openaire +1 more source
Smart Contract Bytecode Vulnerability Detection Method Based on Heterogeneous Graphs and Instruction Sequences [PDF]
In recent years,the security issues of smart contracts have become increasingly prominent,and vulnerability detection has become a key challenge.In scenarios where source code is not publicly available,bytecode-based detection methods have attracted ...
SONG Jianhua, CAO Kai, ZHANG Yan
doaj +1 more source
Lightweight Bytecode Verification
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +3 more sources
Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android [PDF]
A common security architecture is based on the protection of certain resources by permission checks (used e.g., in Android and Blackberry). It has some limitations, for instance, when applications are granted more permissions than they actually need ...
Bartel, Alexandre +3 more
core +5 more sources
Image-Based Scam Detection Method Using an Attention Capsule Network
In recent years, the rapid development of blockchain technology has attracted much attention from people around the world. Scammers take advantage of the pseudo-anonymity of blockchain to implement financial fraud.
Lingyu Bian +4 more
doaj +1 more source
Verification of Java Bytecode using Analysis and Transformation of Logic Programs
State of the art analyzers in the Logic Programming (LP) paradigm are nowadays mature and sophisticated. They allow inferring a wide variety of global properties including termination, bounds on resource consumption, etc.
C. Vaucheret +9 more
core +1 more source
Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem +4 more
wiley +1 more source
Multithreaded Debugging Tool Based on Bytecode Instrumentation [PDF]
During the evolution of software,the debugging of programs is an important and necessary process.For multithreaded programs,the interleaving and scheduling are non-deterministic.Different scheduling can give different results,so it is difficult for ...
ZHOU Yilei,YU Haibo,ZHONG Hao
doaj +1 more source

