Search Results - "Java bytecodes"
-
1
Java runtime systems: characterization and architectural implications
ISSN: 0018-9340, 1557-9956Published: New York IEEE 01.02.2001Published in IEEE transactions on computers (01.02.2001)“…The Java Virtual Machine (JVM) is the cornerstone of Java technology and its efficiency in executing the portable Java bytecodes is crucial for the success of…”
Get full text
Journal Article -
2
Debloating Software Through Enhanced Static Analysis and Constraint Rules
ISSN: 0038-0644, 1097-024XPublished: Bognor Regis Wiley Subscription Services, Inc 01.10.2025Published in Software, practice & experience (01.10.2025)“…Introduction Java applications often bloat, consuming more resources than necessary. Existing bytecode debloating techniques have several limitations, such as…”
Get full text
Journal Article -
3
JAVA BYTECODE INSTRUCTION USAGE COUNTING WITH ALGATOR
ISSN: 1335-8243, 1338-3957Published: Sciendo 01.01.2019Published in Acta electrotechnica et informatica (01.01.2019)“…Development of algorithms for solving various kinds of computer related problems consists of several consecutive and possibly repetitive phases. The final and…”
Get full text
Journal Article -
4
Java decompiler diversity and its application to meta-decompilation
ISSN: 0164-1212, 1873-1228Published: Elsevier Inc 01.10.2020Published in The Journal of systems and software (01.10.2020)“…During compilation from Java source code to bytecode, some information is irreversibly lost. In other words, compilation and decompilation of Java code is not…”
Get full text
Journal Article -
5
LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.09.2022Published in IEEE transactions on dependable and secure computing (01.09.2022)“…Android application (or app) developers increasingly integrate third-party libraries to enrich the functionality of their apps. However, current permission…”
Get full text
Journal Article -
6
SeByte: Scalable clone and similarity search for bytecode
ISSN: 0167-6423, 1872-7964Published: Elsevier B.V 01.12.2014Published in Science of computer programming (01.12.2014)“…While source code clone detection is a well-established research area, finding similar code fragments in binary and other intermediate code representations has…”
Get full text
Journal Article -
7
Code coverage differences of Java bytecode and source code instrumentation tools
ISSN: 0963-9314, 1573-1367Published: New York Springer US 01.03.2019Published in Software quality journal (01.03.2019)“…Many software testing fields, like white-box testing, test case generation, test prioritization, and fault localization, depend on code coverage measurement…”
Get full text
Journal Article -
8
Flight of the FINCH Through the Java Wilderness
ISSN: 1089-778X, 1941-0026Published: New York, NY IEEE 01.04.2011Published in IEEE transactions on evolutionary computation (01.04.2011)“…We describe Fertile Darwinian Bytecode Harvester (FINCH), a methodology for evolving Java bytecode, enabling the evolution of extant, unrestricted Java…”
Get full text
Journal Article -
9
Detecting Java Code Clones Based on Bytecode Sequence Alignment
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2019Published in IEEE access (2019)“…When the source code is copied and pasted or modified, there will be a lot of identical or similar code snippets in the software system, which are called code…”
Get full text
Journal Article -
10
RIM4J: An Architecture for Language-Supported Runtime Measurement against Malicious Bytecode in Cloud Computing
ISSN: 2073-8994, 2073-8994Published: 01.07.2018Published in Symmetry (Basel) (01.07.2018)“…While cloud customers can benefit from migrating applications to the cloud, they are concerned about the security of the hosted applications. This is…”
Get full text
Journal Article -
11
Design, implementation, and application of GPU-based Java bytecode interpreters
ISSN: 2475-1421, 2475-1421Published: 01.10.2019Published in Proceedings of ACM on programming languages (01.10.2019)“…We present the design and implementation of GVM, the first system for executing Java bytecode entirely on GPUs. GVM is ideal for applications that execute a…”
Get full text
Journal Article -
12
Conditional termination of loops over heap-allocated data
ISSN: 0167-6423, 1872-7964Published: Elsevier B.V 15.10.2014Published in Science of computer programming (15.10.2014)“…Static analysis which takes into account the values of data stored in the heap is considered complex and computationally intractable in practice. Thus, most…”
Get full text
Journal Article -
13
Verifying pointer programs using graph grammars
ISSN: 0167-6423, 1872-7964Published: Elsevier B.V 01.01.2015Published in Science of computer programming (01.01.2015)“…This paper argues that graph grammars naturally model dynamic data structures such as lists, trees and combinations thereof. These grammars can be exploited to…”
Get full text
Journal Article -
14
Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs
ISSN: 2472-7652Published: IEEE 01.05.2018Published in Proceedings of the International Conference on Multimedia Computing and Systems (01.05.2018)“…The verification process of software is of growing importance as it helps to assure that an application is correctly built. However, an efficient verification…”
Get full text
Conference Proceeding -
15
Java-MaC: A Run-Time Assurance Approach for Java Programs
ISSN: 0925-9856, 1572-8102Published: 01.03.2004Published in Formal methods in system design (01.03.2004)“…We describe Java-MaC, a prototype implementation of the Monitoring and Checking (MaC) architecture for Java programs. The MaC architecture provides assurance…”
Get full text
Journal Article -
16
Arden2ByteCode: A one-pass Arden Syntax compiler for service-oriented decision support systems based on the OSGi platform
ISSN: 0169-2607, 1872-7565, 1872-7565Published: Ireland Elsevier Ireland Ltd 01.05.2012Published in Computer methods and programs in biomedicine (01.05.2012)“…► We present Arden2ByteCode a newly developed open source compiler for the Arden Syntax. ► Direct one-pass translation to Java Bytecode provides fast…”
Get full text
Journal Article -
17
Heap space analysis for garbage collected languages
ISSN: 0167-6423, 1872-7964Published: Elsevier B.V 01.09.2013Published in Science of computer programming (01.09.2013)“…Accurately predicting the dynamic memory consumption (or heap space) of programs can be critical during software development. It is well-known that garbage…”
Get full text
Journal Article -
18
Applying dynamic analysis for defect detection in Java-applications
ISSN: 2079-8156, 2220-6426Published: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018Published in Trudy Instituta sistemnogo programmirovaniâ (01.10.2018)“…This paper provides an overview of program analysis techniques and describes practical implementation of these techniques for automatic software defect…”
Get full text
Journal Article -
19
A method for detecting the theft of Java programs through analysis of the control flow information
ISSN: 0950-5849, 1873-6025Published: Amsterdam Elsevier B.V 01.09.2009Published in Information and software technology (01.09.2009)“…A software birthmark refers to the inherent characteristics of a program that can be used to identify the program. In this paper, a method for detecting the…”
Get full text
Journal Article -
20
Pushing Java Type Obfuscation to the Limit
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.11.2014Published in IEEE transactions on dependable and secure computing (01.11.2014)“…Bytecoded .Net and Java programs reveal type information through encoded type hierarchies, casts, field declarations and method signatures. This facilitates…”
Get full text
Journal Article