Results 1 to 10 of about 14,055 (238)

JAVA BYTECODE INSTRUCTION USAGE COUNTING WITH ALGATOR [PDF]

open access: diamondActa Electrotechnica et Informatica, 2019
Development of algorithms for solving various kinds of computer related problems consists of several consecutive and possibly repetitive phases. The final and very important step in this process is to implement the developed algorithm in a selected ...
Tomaž DOBRAVEC
doaj   +2 more sources

A Model-Derivation Framework for Software Analysis [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2017
Model-based verification allows to express behavioral correctness conditions like the validity of execution states, boundaries of variables or timing at a high level of abstraction and affirm that they are satisfied by a software system.
Bugra M. Yildiz   +3 more
doaj   +6 more sources

JDroid: Android malware detection using hybrid opcode feature vector [PDF]

open access: yesPeerJ Computer Science
The rapid proliferation of devices using the Android operating system makes these devices the primary target for malware developers. Researchers are investigating different techniques to protect end users from these attackers.
Recep Sinan Arslan
doaj   +3 more sources

Verification of Java Bytecode using Analysis and Transformation of Logic Programs [PDF]

open access: green, 2006
State of the art analyzers in the Logic Programming (LP) paradigm are nowadays mature and sophisticated. They allow inferring a wide variety of global properties including termination, bounds on resource consumption, etc.
C. Vaucheret   +9 more
core   +2 more sources

From CIL to Java bytecode: Semantics-based translation for static analysis leveraging

open access: hybridScience of Computer Programming, 2020
Pietro Ferrara   +2 more
exaly   +2 more sources

JBMC: A Bounded Model Checking Tool for Verifying Java Bytecode [PDF]

open access: hybridLecture Notes in Computer Science, 2018
Lucas C Cordeiro   +2 more
exaly   +2 more sources

A type system for object initialization in the Java bytecode language [PDF]

open access: bronzeACM Transactions on Programming Languages and Systems, 1999
John C Mitchell
exaly   +2 more sources

Accidental Choices—How JVM Choice and Associated Build Tools Affect Interpreter Performance

open access: yesComputers, 2022
Considering the large number of optimisation techniques that have been integrated into the design of the Java Virtual Machine (JVM) over the last three decades, the Java interpreter continues to persist as a significant bottleneck in the performance of ...
Jonathan Lambert   +2 more
doaj   +1 more source

Java Deserialization Vulnerability Detection Method Based on Hybrid Analysis [PDF]

open access: yesJisuanji gongcheng, 2023
Java deserialization vulnerabilities exploit chains that attackers usually combine with arbitrary command vulnerabilities to control the servers. Manual detection of the deserialization chain requires considerable effort and depends on the expertise of ...
Peng ZHENG, Letian SHA
doaj   +1 more source

SJBCD: A Java Code Clone Detection Method Based on Bytecode Using Siamese Neural Network

open access: yesApplied Sciences, 2023
Code clone detection is an important research topic in the field of software engineering. It is significant in developing software and solving software infringement disputes to discover code clone phenomenon effectively in and between software systems ...
Bangrui Wan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy