Results 41 to 50 of about 14,055 (238)

Enforcing Secure Object Initialization in Java [PDF]

open access: yes, 2010
Sun and the CERT recommend for secure Java development to not allow partially initialized objects to be accessed. The CERT considers the severity of the risks taken by not following this recommendation as high.
Hubert, Laurent   +3 more
core   +4 more sources

Cost Analysis of Java Bytecode [PDF]

open access: yes, 2007
Cost analysis of Java bytecode is complicated by its unstructured control flow, the use of an operand stack and its object-oriented programming features (like dynamic dispatching). This paper addresses these problems and develops a generic framework for the automatic cost analysis of sequential Java bytecode.
Elvira Albert   +4 more
openaire   +1 more source

Coverage-Based Debloating for Java Bytecode

open access: yesACM Transactions on Software Engineering and Methodology, 2023
Software bloat is code that is packaged in an application but is actually not necessary to run the application. The presence of software bloat is an issue for security, performance, and for maintenance. In this article, we introduce a novel technique for debloating, which we call coverage-based debloating.
César Soto-Valero   +3 more
openaire   +3 more sources

Java Bytecode Verification: An Overview [PDF]

open access: yes, 2001
Bytecode verification is a crucial security component for Java applets, on the Web and on embedded devices such as smart cards. This paper describes the main bytecode verification algorithms and surveys the variety of formal methods that have been applied to bytecode verification in order to establish its correctness.
openaire   +2 more sources

Termination Graphs for Java Bytecode [PDF]

open access: yes, 2010
To prove termination of Java Bytecode (JBC) automatically, we transform JBC to finite termination graphs which represent all possible runs of the program. Afterwards, the graph can be translated into "simple" formalisms like term rewriting and existing tools can be used to prove termination of the resulting term rewrite system (TRS).
Marc Brockschmidt   +3 more
openaire   +1 more source

Jumble Java Byte Code to Measure the Effectiveness of Unit Tests [PDF]

open access: yes, 2007
Jumble is a byte code level mutation testing tool for Java which inter-operates with JUnit. It has been designed to operate in an industrial setting with large projects.
Cleary, John G.   +5 more
core   +2 more sources

Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android [PDF]

open access: yes, 2014
A common security architecture is based on the protection of certain resources by permission checks (used e.g., in Android and Blackberry). It has some limitations, for instance, when applications are granted more permissions than they actually need ...
Bartel, Alexandre   +3 more
core   +5 more sources

Interprocedural taint analysis for LLVM-bitcode

open access: yesТруды Института системного программирования РАН, 2018
Today the development cycle of many application classes requires a security analysis stage. Taint analysis is widely used to check programs for different security vulnerabilities.
V. K. Koshelev   +2 more
doaj   +1 more source

A Compiler and Runtime Infrastructure for Automatic Program Distribution [PDF]

open access: yes, 2005
This paper presents the design and the implementation of a compiler and runtime infrastructure for automatic program distribution. We are building a research infrastructure that enables experimentation with various program partitioning and mapping ...
Chu, Matt   +3 more
core   +1 more source

Automatic application object migration in sensor networks [PDF]

open access: yes, 2010
Object migration in wireless sensor networks has the potential to reduce energy consumption for a wireless sensor network mesh. Automated migration reduces the need for the programmer to perform manual static analysis to find an efficient layout solution.
Hunkin, Paul, McGregor, Anthony James
core   +2 more sources

Home - About - Disclaimer - Privacy