Search Results - "Java byte codes"
-
1
Security monitor inlining and certification for multithreaded Java
ISSN: 0960-1295, 1469-8072, 1469-8072Published: Cambridge, UK Cambridge University Press 01.03.2015Published in Mathematical structures in computer science (01.03.2015)“…Security monitor inlining is a technique for security policy enforcement whereby monitor functionality is injected into application code in the style of…”
Get full text
Journal Article -
2
The Strengths and Behavioral Quirks of Java Bytecode Decompilers
ISSN: 2470-6892Published: IEEE 01.09.2019Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (01.09.2019)“…During compilation from Java source code to bytecode, some information is irreversibly lost. In other words, compilation and decompilation of Java code is not…”
Get full text
Conference Proceeding -
3
Proof-carrying code from certified abstract interpretation and fixpoint compression
ISSN: 0304-3975, 1879-2294Published: Amsterdam Elsevier B.V 08.11.2006Published in Theoretical computer science (08.11.2006)“…Proof-carrying code (PCC) is a technique for downloading mobile code on a host machine while ensuring that the code adheres to the host's safety policy. We…”
Get full text
Journal Article Conference Proceeding -
4
Deadlock-Detection in Java-Library Using Static-Analysis
ISBN: 0769534465, 9780769534466ISSN: 1530-1362Published: IEEE 01.12.2008Published in 2008 15th Asia-Pacific Software Engineering Conference (01.12.2008)“…Well-written Java programs that conform to the Language and the J2SE-API Specifications can surprisingly deadlock their hosting JVM. Some of these deadlocks…”
Get full text
Conference Proceeding -
5
Guaranteeing Correctness Properties of a Java Card Applet
ISSN: 1571-0661, 1571-0661Published: Elsevier B.V 03.01.2005Published in Electronic notes in theoretical computer science (03.01.2005)“…The paper describes an experiment in which a framework for model checking Java byte code, combined with the application of runtime monitoring techniques…”
Get full text
Journal Article

