Results 101 to 110 of about 14,055 (238)
A Verifier for Region-Annotated Java Bytecodes
AbstractThis paper presents a verifier for the memory-safe execution of extended Java bytecodes that support region-based memory management and explicit deallocation primitives. The verifier reads in region-annotated bytecodes that augment the standard Java bytecodes with instructions for creating and removing memory regions, allocating objects in ...
Sigmund Cherem, Radu Rugina
openaire +1 more source
BejaGNN: behavior-based Java malware detection via graph neural network. [PDF]
Feng P, Yang L, Lu D, Xi N, Ma J.
europepmc +1 more source
Test Data Generation of Bytecode by CLP Partial Evaluation
We employ existing partial evaluation (PE) techniques developed for Constraint Logic Programming (CLP) in order to automatically generate test-case generators for glass-box testing of bytecode. Our approach consists of two independent CLP PE phases.
Albert Albiol, Elvira +2 more
core
Test Case Generation for Object-Oriented Imperative Languages in CLP
Testing is a vital part of the software development process. Test Case Generation (TCG) is the process of automatically generating a collection of test cases which are applied to a system under test.
Albert +7 more
core +1 more source
Applying dynamic analysis for defect detection in Java-applications
This paper provides an overview of program analysis techniques and describes practical implementation of these techniques for automatic software defect detection. The paper focuses on program dynamic analysis technique based on tainted data flow tracing,
Sergey Vartanov, Alexander Gerasimov
doaj
Verified Java bytecode verification. [PDF]
The bytecode verifier is an important part of Java's security architecture. This thesis presents a fully formal, executable, and machine checked specification of a representative subset of the Java Virtual Machine and its bytecode verifier together with a proof that the bytecode verifier is safe.
openaire +1 more source
Smart contracts software metrics: A first study. [PDF]
Tonelli R +3 more
europepmc +1 more source
Class Hierarchy Complementation: Soundly Completing a Partial Type Graph [PDF]
We present the problem of class hierarchy complementa- tion: given a partially known hierarchy of classes together with subtyping constraints (“A has to be a transitive sub- type of B”) complete the hierarchy so that it satisfies all con- straints.
Balatsouras, George, Smaragdakis, Yannis
core
Generating Verification Conditions from BIRS Code using Basic Paths for Java Bytecode Verification [PDF]
Jemin Kim +3 more
openalex +1 more source
12th International Workshop on Termination (WST 2012) : WST 2012, February 19–23, 2012, Obergurgl, Austria / ed. by Georg Moser [PDF]
This volume contains the proceedings of the 12th International Workshop on Termination (WST 2012), to be held February 19–23, 2012 in Obergurgl, Austria.
Moser, Georg
core

