Results 61 to 70 of about 14,055 (238)
Uno strumento per la verifica delle subroutine nel bytecode Java per sistemi con risorse limitate [PDF]
Java è un linguaggio di programmazione interpretato: i sorgenti vengono compilati in file binari che contengono istruzioni codificate in un formato binario indipendente, il bytecode, ed interpretate dalla Java Virtual Machine.
Casamassima, Gianfranco
core
An Evaluation of Current Java Bytecode Decompilers [PDF]
Decompilation of Java bytecode is the act of transforming Java bytecode to Java source code. Although easier than that of decompilation of machine code, problems still arise in Java bytecode decompilation. These include type inference of local variables and exception-handling.
James Alexander George Hamilton +1 more
openaire +1 more source
A Systematic Mapping Study of the Metrics, Uses and Subjects of Diversity‐Based Testing Techniques
This paper is a systematic mapping study of diversity‐based testing (DBT) techniques that summarizes the key aspects and trends of 167 papers. The study reports the use of 79 similarity metrics with 22 types of software artefacts, which researchers have used to tackle 11 types of software testing problems.
Islam T. Elgendy +2 more
wiley +1 more source
Exploring Online Synthesis for CGRAs with Specialized Operator Sets
The design of energy-efficient systems has become a major challenge for engineers over the last decade. One way to save energy is to spread out computations in space rather than in time (as traditional processors do).
Stefan Döbrich, Christian Hochberger
doaj +1 more source
Partial Evaluation of String Obfuscations for Java Malware Detection [PDF]
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Javaexploits and to circumvent detection by Anti Virus (
Chawdhary, Aziem +2 more
core +1 more source
Refactoring to Standard C++20 Modules
This paper investigates a semi‐automatic modularization method to refactor existing C++ projects. Our approach uses dependency analysis and clustering to organize elements of projects into modules, without domain‐specific information. To fully facilitate the use of Modules, it is likely that both project‐internal and user‐facing interfaces must be ...
Richárd Szalay, Zoltán Porkoláb
wiley +1 more source
JVM-hosted languages: They talk the talk, but do they walk the walk? [PDF]
The rapid adoption of non-Java JVM languages is impressive: major international corporations are staking critical parts of their software infrastructure on components built from languages such as Scala and Clojure. However with the possible exception of
Li, W.H., Singer, J., White, D.R.
core +1 more source
AEDroid: Adaptive Enhanced Android Malware Detection‐Based on Interpretability of Deep Learning
As the most widely used operating system in the world, Android has naturally become the main target of malicious hackers. The current research on Android malware detection relies on manually defined sensitive API feature sets. With the continuous innovation and change of malicious behavior, new threats and attack methods have emerged.
Pengfei Liu +5 more
wiley +1 more source
Sound and Precise Malware Analysis for Android via Pushdown Reachability and Entry-Point Saturation [PDF]
We present Anadroid, a static malware analysis framework for Android apps. Anadroid exploits two techniques to soundly raise precision: (1) it uses a pushdown system to precisely model dynamically dispatched interprocedural and exception-driven control ...
Aldous, Petey +6 more
core +2 more sources
The rapid growth and diversification of malware variants, driven by advanced code obfuscation, evasion, and antianalysis techniques, present a significant threat to cybersecurity. The inadequacy of traditional methods in accurately classifying these evolving threats highlights the need for effective and robust malware classification techniques.
K. Sundara Krishnan +2 more
wiley +1 more source

