Results 91 to 100 of about 14,055 (238)
Java Bytecode Verification for @NonNull Types [PDF]
Java's annotation mechanism allows us to extend its type system with non-null types. However, checking such types cannot be done using the existing bytecode verification algorithm. We extend this algorithm to verify nonnull types using a novel technique that identifies aliasing relationships between local variables and stack locations in the JVM.
Chris Male +3 more
openaire +2 more sources
On-Card Bytecode Verification for Java Card [PDF]
This paper presents a novel approach to the problem of bytecode verification for Java Card applets. Owing to its low memory requirements, our verification algorithm is the first that can be embedded on a smart card, thus increasing tremendously the security of post-issuance downloading of applets on Java Cards.
openaire +2 more sources
Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj
Comparing Android Applications to Find Copying
The Android smartphone operating system includes a Java mobile development platform that provides for rapid development and deployment of a wide variety of applications.
Larry Melling, Bob Zeidman
doaj
DALEQ - Explainable Equivalence for Java Bytecode
The security of software builds has attracted increased attention in recent years in response to incidents like solarwinds and xz. Now, several companies including Oracle and Google rebuild open source projects in a secure environment and publish the resulting binaries through dedicated repositories.
Jens Dietrich 0001, Behnaz Hassanshahi
openaire +2 more sources
MetaFFI-Multilingual Indirect Interoperability System
The development of software applications using multiple programming languages has increased in recent years, as it allows the selection of the most suitable language and runtime for each component of the system and the integration of third-party ...
Tsvi Cherny-Shahar, Amiram Yehudai
doaj +1 more source
In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments [PDF]
In this paper we claim that an efficient and readily applicable means to improve privacy of Android applications is: 1) to perform runtime monitoring by instrumenting the application bytecode and 2) in-vivo, i.e. directly on the smartphone.
Allix, Kevin +4 more
core +4 more sources
A Systematic Evaluation of Static API-Misuse Detectors
Application Programming Interfaces (APIs) often have usage constraints, such as restrictions on call order or call conditions. API misuses, i.e., violations of these constraints, may lead to software crashes, bugs, and vulnerabilities. Though researchers
Amann, Sven +4 more
core +1 more source
Developing a Generic Debugger for Advanced-Dispatching Languages [PDF]
Programming-language research has introduced a considerable number of advanced-dispatching mechanisms in order to improve modularity. Advanced-dispatching mechanisms allow changing the behavior of a function without modifying their call sites and thus ...
Bockisch, Christoph, Yin, Haihan
core +1 more source
Reasoning About Exceptional Behavior at the Level of Java Bytecode [PDF]
M. Paganoni, Carlo A. Furia
openalex +1 more source

