Search Results - "Java byte codes"

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Security monitor inlining and certification for multithreaded Java by DAM, MADS, JACOBS, BART, LUNDBLAD, ANDREAS, PIESSENS, FRANK

    ISSN: 0960-1295, 1469-8072, 1469-8072
    Published: Cambridge, UK Cambridge University Press 01.03.2015
    “…Security monitor inlining is a technique for security policy enforcement whereby monitor functionality is injected into application code in the style of…”
    Get full text
    Journal Article
  2. 2

    The Strengths and Behavioral Quirks of Java Bytecode Decompilers by Harrand, Nicolas, Soto-Valero, Cesar, Monperrus, Martin, Baudry, Benoit

    ISSN: 2470-6892
    Published: IEEE 01.09.2019
    “…During compilation from Java source code to bytecode, some information is irreversibly lost. In other words, compilation and decompilation of Java code is not…”
    Get full text
    Conference Proceeding
  3. 3

    Proof-carrying code from certified abstract interpretation and fixpoint compression by Besson, Frédéric, Jensen, Thomas, Pichardie, David

    ISSN: 0304-3975, 1879-2294
    Published: Amsterdam Elsevier B.V 08.11.2006
    Published in Theoretical computer science (08.11.2006)
    “…Proof-carrying code (PCC) is a technique for downloading mobile code on a host machine while ensuring that the code adheres to the host's safety policy. We…”
    Get full text
    Journal Article Conference Proceeding
  4. 4

    Deadlock-Detection in Java-Library Using Static-Analysis by Shanbhag, V.K.

    ISBN: 0769534465, 9780769534466
    ISSN: 1530-1362
    Published: IEEE 01.12.2008
    “…Well-written Java programs that conform to the Language and the J2SE-API Specifications can surprisingly deadlock their hosting JVM. Some of these deadlocks…”
    Get full text
    Conference Proceeding
  5. 5

    Guaranteeing Correctness Properties of a Java Card Applet by Fredlund, Lars-Åke

    ISSN: 1571-0661, 1571-0661
    Published: Elsevier B.V 03.01.2005
    “…The paper describes an experiment in which a framework for model checking Java byte code, combined with the application of runtime monitoring techniques…”
    Get full text
    Journal Article