Results 71 to 80 of about 14,055 (238)

Dynamic Information Flow Analysis in Ruby [PDF]

open access: yes, 2017
With the rapid increase in usage of the internet and online applications, there is a huge demand for applications to handle data privacy and integrity.
Chandrasekaran, Vigneshwari
core   +1 more source

TL‐GNN: Android Malware Detection Using Transfer Learning

open access: yesApplied AI Letters, Volume 5, Issue 3, September 2024.
APK to graph conversion process. ABSTRACT Malware growth has accelerated due to the widespread use of Android applications. Android smartphone attacks have increased due to the widespread use of these devices. While deep learning models offer high efficiency and accuracy, training them on large and complex datasets is computationally expensive.
Ali Raza   +5 more
wiley   +1 more source

Provably Correct Control-Flow Graphs from Java Programs with Exceptions [PDF]

open access: yes, 2011
We present an algorithm to extract flow graphs from Java bytecode, focusing on exceptional control flows. We prove its correctness, meaning that the behaviour of the extracted control-flow graph is an over-approximation of the behaviour of the original ...
Amighi, Afshin   +2 more
core   +1 more source

JBMC: A Bounded Model Checking Tool for Java Bytecode [PDF]

open access: green, 2023
Romain Brenguier   +3 more
openalex   +1 more source

Gas‐centered mutation testing of Ethereum Smart Contracts

open access: yesJournal of Software: Evolution and Process, Volume 36, Issue 9, September 2024.
This paper proposes a gas‐centered mutation testing approach for taking care of the gas consumed by Ethereum Smart Contracts (ESC). We define several mutation operators specifically designed to perturb gas consumption of ESC written in Solidity while preserving contract semantics in general.
Pedro Delgado‐Pérez   +2 more
wiley   +1 more source

Modeling the Java Bytecode Verifier

open access: yesScience of Computer Programming, 2013
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly in the Bytecode Verifier, a critical component used to verify class semantics before loading is complete.
openaire   +1 more source

Functional suitability assessment of smart contracts: A survey and first proposal

open access: yesJournal of Software: Evolution and Process, Volume 36, Issue 7, July 2024.
In this paper, we present the results of a survey on the practices, processes, standards, approaches, and tools adopted by real‐world blockchain developers during the various phases of smart contract development. Moreover, we propose procedures to properly measure the functional completeness and correctness sub‐characteristics of the ISO/IEC 25010 ...
Anna Vacca   +4 more
wiley   +1 more source

ADVANCED AND RAPID DEVELOPMENT OF DYNAMIC ANALYSIS TOOLS FOR JAVA

open access: yesInvestigación & Desarrollo, 2012
Low-level bytecode instrumentation techniques are widely used in many software-engineering tools for the Java Virtual Machine (JVM), that perform some form of dynamic program analysis, such as profilers or debuggers.
Alex Villazón   +2 more
doaj  

GUI testing of Android applications: Investigating the impact of the number of testers on different exploratory testing strategies

open access: yesJournal of Software: Evolution and Process, Volume 36, Issue 7, July 2024.
How many testers should be recruited for exploratory GUI testing of Android apps using capture and replay tools? This work aims to support project managers in this decision, providing insights on the effectiveness of the test suites generated by different‐sized groups of testers using different exploratory strategies. Abstract Graphical user interface (
Sergio Di Martino   +3 more
wiley   +1 more source

Understanding the quality and evolution of Android app build systems

open access: yesJournal of Software: Evolution and Process, Volume 36, Issue 5, May 2024.
Build systems are used to transform static source code into executable software. They play a crucial role in modern software development and maintenance. In this paper, we present an exploratory empirical study of the build systems of 5222 Android projects to better understand their quality and evolution.
Pei Liu   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy