Results 61 to 70 of about 18,338 (256)
Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android [PDF]
A common security architecture, called the permission-based security model (used e.g. in Android and Blackberry), entails intrinsic risks. For instance, applications can be granted more permissions than they actually need, what we call a "permission gap".
Bartel, Alexandre +3 more
core +8 more sources
This work proposes a model for defining Convention over Configuration (CoC) for annotations. With this model, if a convention is present, the framework will consider that the element is configured by a specific annotation. The model was evaluated in an experiment where participants implemented CoC pattern using our approach and Java Reflection API. Our
Everaldo Gomes +3 more
wiley +1 more source
JooFlux: Hijacking Java 7 InvokeDynamic To Support Live Code Modifications [PDF]
Changing functional and non-functional software implementation at runtime is useful and even sometimes critical both in development and production environments. JooFlux is a JVM agent that allows both the dynamic replacement of method implementations and
Mouël, Frédéric Le, Ponge, Julien
core +3 more sources
An Empirical Study of Speculative Concurrency in Ethereum Smart Contracts [PDF]
We use historical data to estimate the potential benefit of speculative techniques for executing Ethereum smart contracts in parallel. We replay transaction traces of sampled blocks from the Ethereum blockchain over time, using a simple speculative ...
Herlihy, Maurice, Saraph, Vikram
core +2 more sources
Computational Soundness for Dalvik Bytecode [PDF]
Automatically analyzing information flow within Android applications that rely on cryptographic operations with their computational security guarantees imposes formidable challenges that existing approaches for understanding an app's behavior struggle to meet. These approaches do not distinguish cryptographic and non-cryptographic operations, and hence
Backes, M. +2 more
openaire +4 more sources
How Software Design Affects Energy Performance: A Systematic Literature Review
This SLR provides insight into the state of the art of the field investigating how software transformation impacts energy performance. While a wide array of design patterns, refactorings, and code smells have been examined from this perspective, there remains much to explore in future work.
Déaglán Connolly Bree +1 more
wiley +1 more source
Climbing the Hill to Understand the Code
Software maintenance takes up a disproportionately large amount of time in the modern software life cycle. One of the common problems is understanding the original code that is being restructured and improved and this is especially true with low-level ...
Doni Pracner +3 more
doaj +1 more source
Dynamic Information Flow Analysis in Ruby [PDF]
With the rapid increase in usage of the internet and online applications, there is a huge demand for applications to handle data privacy and integrity.
Chandrasekaran, Vigneshwari
core +1 more source
Automatic application object migration in sensor networks [PDF]
Object migration in wireless sensor networks has the potential to reduce energy consumption for a wireless sensor network mesh. Automated migration reduces the need for the programmer to perform manual static analysis to find an efficient layout solution.
Hunkin, Paul, McGregor, Anthony James
core +2 more sources
Integrated Java Bytecode Verification [PDF]
AbstractExisting Java verifiers perform an iterative data-flow analysis to discover the unambiguous type of values stored on the stack or in registers. Our novel verification algorithm uses abstract interpretation to obtain definition/use information for each register and stack location in the program, which in turn is used to transform the program ...
Andreas Gal +2 more
openaire +1 more source

