Results 211 to 220 of about 14,055 (238)
Some of the next articles are maybe not open access.

Dependence analysis of Java bytecode

Proceedings 24th Annual International Computer Software and Applications Conference. COMPSAC2000, 2002
Understanding program dependencies in a computer program is essential for many software engineering tasks such as program understanding, testing, debugging, reverse engineering, and maintenance. The article presents an approach to dependence analysis of Java bytecode, and discusses some applications of the technique, which include Java bytecode slicing,
openaire   +1 more source

Dynamic semantics of Java bytecode

Future Generation Computer Systems, 2000
Abstract We give a formal specification of the dynamic semantics of Java bytecode, in the form of an operational semantics for the Java Virtual Machine (JVM). For each JVM instruction we give a rule describing the instruction’s effect on the machine state and the conditions under which the instruction will execute without error.
openaire   +1 more source

The Vulnerability Analysis Framework for Java Bytecode

2009 15th International Conference on Parallel and Distributed Systems, 2009
Since Java web applications are used widely in Internet today, the security of it becomes an outstanding problem. The attacks, including SQL injection attack, XSS attack, and etc, are great challenges for the Java application. This paper presents the vulnerability analysis framework to detect the security hole in the Java web applications.
Hong Tang   +4 more
openaire   +1 more source

Bytecode fault injection for Java software

Journal of Systems and Software, 2008
Developers using third party software components need to test them to satisfy quality requirements. In the past, researchers have proposed fault injection testing approaches in which the component state is perturbed and the resulting effects on the rest of the system are observed.
Sudipto Ghosh 0001, John L. Kelly
openaire   +1 more source

Information Flow Analysis for Java Bytecode

2005
We present a flow and context sensitive compositional information flow analysis for full (mono-threaded) Java bytecode. We base our analysis on the transformation of the Java bytecode into a control-flow graph of basic blocks of code which makes explicit the complex features of the Java bytecode. We represent information flows through Boolean functions
Samir Genaim, Fausto Spoto
openaire   +1 more source

Java intermediate bytecodes

Papers from the 1995 ACM SIGPLAN workshop on Intermediate representations, 1995
Java is a programming language loosely related to C++. Java originated in a project to produce a software development environment for small distributed embedded systems. Programs needed to be small, fast, “safe” and portable. These needs led to a design that is rather different from standard practice.
openaire   +1 more source

Compiling C++ Programs to Java Bytecode

Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN'05), 2005
It is very desirable to run programs on a variety of platforms. The only programs today that can run on different platforms are those written in Java. Although methods have been developed to allow cross-language applications, these applications are still mostly be hardware and/or operating system platform dependent.
Gongzhu Hu, Avinashkumar Gadapa
openaire   +1 more source

Aucsmith-Like Obfuscation of Java Bytecode

2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation, 2012
This paper describes a functional dynamic Java byte code obfuscator based on the general ideas introduced by Aucsmith's algorithm. This tool provides a very high level of security for the obfuscated code due to the fact that the code that gets executed is not visible at all in the initial jar file, but at the cost of an extreme performance overhead ...
openaire   +1 more source

An empirical study of Java bytecode programs

Software: Practice and Experience, 2006
AbstractWe present a study of the static structure of real Java bytecode programs. A total of 1132 Java jar‐files were collected from the Internet and analyzed. In addition to simple counts (number of methods per class, number of bytecode instructions per method, etc.), structural metrics such as the complexity of control‐flow and inheritance graphs ...
Christian S. Collberg   +2 more
openaire   +1 more source

Dynamic Slicing of Java Bytecode Programs

Fifth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM'05), 2006
A forward global method for obtaining backward dynamic slices of Java bytecode programs is presented. In contrast with existing published techniques that require either a customized Java compiler (which also implies access to the source code) or bytecode instrumentation and eventual manual dependency specifications, our approach was to produce an ...
Attila Szegedi, Tibor Gyimóthy
openaire   +1 more source

Home - About - Disclaimer - Privacy