JAVA BYTECODE INSTRUCTION USAGE COUNTING WITH ALGATOR [PDF]
Development of algorithms for solving various kinds of computer related problems consists of several consecutive and possibly repetitive phases. The final and very important step in this process is to implement the developed algorithm in a selected ...
Tomaž DOBRAVEC
doaj +2 more sources
A Model-Derivation Framework for Software Analysis [PDF]
Model-based verification allows to express behavioral correctness conditions like the validity of execution states, boundaries of variables or timing at a high level of abstraction and affirm that they are satisfied by a software system.
Bugra M. Yildiz +3 more
doaj +6 more sources
JDroid: Android malware detection using hybrid opcode feature vector [PDF]
The rapid proliferation of devices using the Android operating system makes these devices the primary target for malware developers. Researchers are investigating different techniques to protect end users from these attackers.
Recep Sinan Arslan
doaj +3 more sources
Verification of Java Bytecode using Analysis and Transformation of Logic Programs [PDF]
State of the art analyzers in the Logic Programming (LP) paradigm are nowadays mature and sophisticated. They allow inferring a wide variety of global properties including termination, bounds on resource consumption, etc.
C. Vaucheret +9 more
core +2 more sources
From CIL to Java bytecode: Semantics-based translation for static analysis leveraging
Pietro Ferrara +2 more
exaly +2 more sources
JBMC: A Bounded Model Checking Tool for Verifying Java Bytecode [PDF]
Lucas C Cordeiro +2 more
exaly +2 more sources
A type system for object initialization in the Java bytecode language [PDF]
John C Mitchell
exaly +2 more sources
Accidental Choices—How JVM Choice and Associated Build Tools Affect Interpreter Performance
Considering the large number of optimisation techniques that have been integrated into the design of the Java Virtual Machine (JVM) over the last three decades, the Java interpreter continues to persist as a significant bottleneck in the performance of ...
Jonathan Lambert +2 more
doaj +1 more source
Java Deserialization Vulnerability Detection Method Based on Hybrid Analysis [PDF]
Java deserialization vulnerabilities exploit chains that attackers usually combine with arbitrary command vulnerabilities to control the servers. Manual detection of the deserialization chain requires considerable effort and depends on the expertise of ...
Peng ZHENG, Letian SHA
doaj +1 more source
SJBCD: A Java Code Clone Detection Method Based on Bytecode Using Siamese Neural Network
Code clone detection is an important research topic in the field of software engineering. It is significant in developing software and solving software infringement disputes to discover code clone phenomenon effectively in and between software systems ...
Bangrui Wan +3 more
doaj +1 more source

