Results 201 to 210 of about 14,055 (238)

Bytecode verification on Java smart cards [PDF]

open access: yesSoftware - Practice and Experience, 2002
AbstractThis article presents a novel approach to the problem of bytecode verification for Java Card applets. By relying on prior off‐card bytecode transformations, we simplify the bytecode verifier and reduce its memory requirements to the point where it can be embedded on a smart card, thus increasing significantly the security of post‐issuance ...
Xavier LeRoy
exaly   +4 more sources

On object initialization in the Java bytecode

Computer Communications, 2000
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs can be statically analyzed and validated. The program's behavior is then monitored to prevent potentially malicious operations. Static analysis of untrusted classes is carried
Stephane Doyon, Mourad Debbabi
openaire   +1 more source

JaBÁ: A Java Bytecoder Analyser

Anais do XVI Simpósio Brasileiro de Engenharia de Software (SBES 2002), 2002
Many existing control-flow and data-flow based techniques for software testing and program analysis require source code instrumentation. However, this approach may not be feasible for component-based software as some of its components can be commercial off-the-shelf products or developed by a third party, and therefore the corresponding source code is ...
Auri M. R. Vincenzi   +4 more
openaire   +1 more source

An evaluation of secialized Java bytecodes

Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications, 2006
Specialized Java bytecodes provide functionality that is easily replicated using other Java bytecodes. This study uses profiling to explore how the set of specialized bytecodes currently implemented by the Java Virtual Machine is utilized by comparing it to the other specialized bytecodes which could have been implemented.
Ben Stephenson, Wade Holst
openaire   +1 more source

Java bytecode optimizations

Proceedings IEEE COMPCON 97. Digest of Papers, 2002
We present our results obtained from applying well known optimizations to Java bytecodes. We survey the optimizations implemented thus far, which include peephole optimizations, jump redundancy eliminations, and common subexpression elimination. The transformations are each analyzed according to several criteria.
openaire   +1 more source

Advanced Java bytecode instrumentation

Proceedings of the 5th international symposium on Principles and practice of programming in Java - PPPJ '07, 2007
Bytecode instrumentation is a valuable technique for transparently enhancing virtual execution environments for purposes such as monitoring or profiling. Current approaches to bytecode instrumentation either exclude some methods from instrumentation, severely restrict the ways certain methods may be instrumented, or require the use of native code.
Walter Binder   +2 more
openaire   +1 more source

A Java Bytecode Formalisation

2018
This paper presents the first Coq formalisation of the full Java bytecode instruction set and its semantics. The set of instructions is organised in a hierarchy depending on how the instructions deal with the runtime structures of the Java Virtual Machine such as threads, stacks, heap etc.
Patryk Czarnik   +2 more
openaire   +1 more source

Java bytecode specification and verification

Proceedings of the 2006 ACM symposium on Applied computing, 2006
We propose a framework for establishing the correctness of untrusted Java bytecode components w.r.t. to complex functional and/or security policies. To this end, we define a bytecode specification language (BCSL) and a weakest precondition calculus for sequential Java bytecode.
Lilian Burdy, Mariela Pavlova
openaire   +1 more source

Local model checking of Java bytecode

Proceedings of the 14th international conference on Software engineering and knowledge engineering - SEKE '02, 2002
We present a model checking procedure to verify a subset of the Java Virtual Machine Language. The procedure works on a finite tractable state representation of the program: in fact, abstraction techniques are employed, driven by the temporal logic formula representing the property to be checked.
SANTONE, Antonella, Vaglini G.
openaire   +3 more sources

Verified Java Bytecode Verification (Verified Java Bytecode Verification)

it - Information Technology, 2005
Zusammenfassung Der Bytecode Verifier ist ein essenzieller Bestandteil der Sicherheitsarchitektur der Programmierplattform Java. Die vorliegende Dissertation stellt eine formale, ausführbare Spezifikation des Bytecode Verifiers vor sowie den Beweis, dass diese korrekt ist.
openaire   +2 more sources

Home - About - Disclaimer - Privacy