Results 91 to 100 of about 14,055 (238)

Java Bytecode Verification for @NonNull Types [PDF]

open access: yes, 2008
Java's annotation mechanism allows us to extend its type system with non-null types. However, checking such types cannot be done using the existing bytecode verification algorithm. We extend this algorithm to verify nonnull types using a novel technique that identifies aliasing relationships between local variables and stack locations in the JVM.
Chris Male   +3 more
openaire   +2 more sources

On-Card Bytecode Verification for Java Card [PDF]

open access: yes, 2001
This paper presents a novel approach to the problem of bytecode verification for Java Card applets. Owing to its low memory requirements, our verification algorithm is the first that can be embedded on a smart card, thus increasing tremendously the security of post-issuance downloading of applets on Java Cards.
openaire   +2 more sources

Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques

open access: yesJournal of Computer Science and Technology, 2008
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj  

Comparing Android Applications to Find Copying

open access: yesJournal of Digital Forensics, Security and Law, 2012
The Android smartphone operating system includes a Java mobile development platform that provides for rapid development and deployment of a wide variety of applications.
Larry Melling, Bob Zeidman
doaj  

DALEQ - Explainable Equivalence for Java Bytecode

open access: yes2025 40th IEEE/ACM International Conference on Automated Software Engineering (ASE)
The security of software builds has attracted increased attention in recent years in response to incidents like solarwinds and xz. Now, several companies including Oracle and Google rebuild open source projects in a secure environment and publish the resulting binaries through dedicated repositories.
Jens Dietrich 0001, Behnaz Hassanshahi
openaire   +2 more sources

MetaFFI-Multilingual Indirect Interoperability System

open access: yesSoftware
The development of software applications using multiple programming languages has increased in recent years, as it allows the selection of the most suitable language and runtime for each component of the system and the integration of third-party ...
Tsvi Cherny-Shahar, Amiram Yehudai
doaj   +1 more source

In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments [PDF]

open access: yes, 2012
In this paper we claim that an efficient and readily applicable means to improve privacy of Android applications is: 1) to perform runtime monitoring by instrumenting the application bytecode and 2) in-vivo, i.e. directly on the smartphone.
Allix, Kevin   +4 more
core   +4 more sources

A Systematic Evaluation of Static API-Misuse Detectors

open access: yes, 2018
Application Programming Interfaces (APIs) often have usage constraints, such as restrictions on call order or call conditions. API misuses, i.e., violations of these constraints, may lead to software crashes, bugs, and vulnerabilities. Though researchers
Amann, Sven   +4 more
core   +1 more source

Developing a Generic Debugger for Advanced-Dispatching Languages [PDF]

open access: yes, 2010
Programming-language research has introduced a considerable number of advanced-dispatching mechanisms in order to improve modularity. Advanced-dispatching mechanisms allow changing the behavior of a function without modifying their call sites and thus ...
Bockisch, Christoph, Yin, Haihan
core   +1 more source

Home - About - Disclaimer - Privacy