Results 41 to 50 of about 18,338 (256)

Termination and Cost Analysis with COSTA and its User Interfaces [PDF]

open access: yes, 2009
COSTA is a static analyzer for Java bytecode which is able to infer cost and termination information for large classes of programs. The analyzer takes as input a program and a resource of interest, in the form of a cost model, and aims at obtaining an ...
Albert Albiol, Elvira   +7 more
core   +2 more sources

Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity

open access: yesIEEE Access, 2019
To protect programs from unauthorized analysis, virtualize the code based on Virtual Machine (VM) technologies is emerging as a feasible method for accomplishing code obfuscation.
Wei Wang   +9 more
doaj   +1 more source

Asserting Bytecode Safety [PDF]

open access: yes, 2005
We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized variant of Java bytecode featuring objects, inheritance, method calls and exceptions. Bytecode annotated in a first order expression language can be certified not to produce arithmetic overflows.
Martin Wildmoser, Tobias Nipkow
openaire   +1 more source

Smart Contract Bytecode Vulnerability Detection Method Based on Heterogeneous Graphs and Instruction Sequences [PDF]

open access: yesJisuanji kexue
In recent years,the security issues of smart contracts have become increasingly prominent,and vulnerability detection has become a key challenge.In scenarios where source code is not publicly available,bytecode-based detection methods have attracted ...
SONG Jianhua, CAO Kai, ZHANG Yan
doaj   +1 more source

Lightweight Bytecode Verification

open access: yesJournal of Automated Reasoning, 2003
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +3 more sources

Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android [PDF]

open access: yes, 2014
A common security architecture is based on the protection of certain resources by permission checks (used e.g., in Android and Blackberry). It has some limitations, for instance, when applications are granted more permissions than they actually need ...
Bartel, Alexandre   +3 more
core   +5 more sources

Image-Based Scam Detection Method Using an Attention Capsule Network

open access: yesIEEE Access, 2021
In recent years, the rapid development of blockchain technology has attracted much attention from people around the world. Scammers take advantage of the pseudo-anonymity of blockchain to implement financial fraud.
Lingyu Bian   +4 more
doaj   +1 more source

Verification of Java Bytecode using Analysis and Transformation of Logic Programs

open access: yes, 2006
State of the art analyzers in the Logic Programming (LP) paradigm are nowadays mature and sophisticated. They allow inferring a wide variety of global properties including termination, bounds on resource consumption, etc.
C. Vaucheret   +9 more
core   +1 more source

Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem   +4 more
wiley   +1 more source

Multithreaded Debugging Tool Based on Bytecode Instrumentation [PDF]

open access: yesJisuanji gongcheng, 2016
During the evolution of software,the debugging of programs is an important and necessary process.For multithreaded programs,the interleaving and scheduling are non-deterministic.Different scheduling can give different results,so it is difficult for ...
ZHOU Yilei,YU Haibo,ZHONG Hao
doaj   +1 more source

Home - About - Disclaimer - Privacy