Results 71 to 80 of about 14,055 (238)
Dynamic Information Flow Analysis in Ruby [PDF]
With the rapid increase in usage of the internet and online applications, there is a huge demand for applications to handle data privacy and integrity.
Chandrasekaran, Vigneshwari
core +1 more source
TL‐GNN: Android Malware Detection Using Transfer Learning
APK to graph conversion process. ABSTRACT Malware growth has accelerated due to the widespread use of Android applications. Android smartphone attacks have increased due to the widespread use of these devices. While deep learning models offer high efficiency and accuracy, training them on large and complex datasets is computationally expensive.
Ali Raza +5 more
wiley +1 more source
Provably Correct Control-Flow Graphs from Java Programs with Exceptions [PDF]
We present an algorithm to extract flow graphs from Java bytecode, focusing on exceptional control flows. We prove its correctness, meaning that the behaviour of the extracted control-flow graph is an over-approximation of the behaviour of the original ...
Amighi, Afshin +2 more
core +1 more source
JBMC: A Bounded Model Checking Tool for Java Bytecode [PDF]
Romain Brenguier +3 more
openalex +1 more source
Gas‐centered mutation testing of Ethereum Smart Contracts
This paper proposes a gas‐centered mutation testing approach for taking care of the gas consumed by Ethereum Smart Contracts (ESC). We define several mutation operators specifically designed to perturb gas consumption of ESC written in Solidity while preserving contract semantics in general.
Pedro Delgado‐Pérez +2 more
wiley +1 more source
Modeling the Java Bytecode Verifier
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly in the Bytecode Verifier, a critical component used to verify class semantics before loading is complete.
openaire +1 more source
Functional suitability assessment of smart contracts: A survey and first proposal
In this paper, we present the results of a survey on the practices, processes, standards, approaches, and tools adopted by real‐world blockchain developers during the various phases of smart contract development. Moreover, we propose procedures to properly measure the functional completeness and correctness sub‐characteristics of the ISO/IEC 25010 ...
Anna Vacca +4 more
wiley +1 more source
ADVANCED AND RAPID DEVELOPMENT OF DYNAMIC ANALYSIS TOOLS FOR JAVA
Low-level bytecode instrumentation techniques are widely used in many software-engineering tools for the Java Virtual Machine (JVM), that perform some form of dynamic program analysis, such as profilers or debuggers.
Alex Villazón +2 more
doaj
How many testers should be recruited for exploratory GUI testing of Android apps using capture and replay tools? This work aims to support project managers in this decision, providing insights on the effectiveness of the test suites generated by different‐sized groups of testers using different exploratory strategies. Abstract Graphical user interface (
Sergio Di Martino +3 more
wiley +1 more source
Understanding the quality and evolution of Android app build systems
Build systems are used to transform static source code into executable software. They play a crucial role in modern software development and maintenance. In this paper, we present an exploratory empirical study of the build systems of 5222 Android projects to better understand their quality and evolution.
Pei Liu +4 more
wiley +1 more source

