Search Results - "Java bytecodes"

Refine Results
  1. 1

    Java runtime systems: characterization and architectural implications by Radhakrishnan, R., Vijaykrishnan, N., John, L.K., Sivasubramaniam, A., Rubio, J., Sabarinathan, J.

    ISSN: 0018-9340, 1557-9956
    Published: New York IEEE 01.02.2001
    Published in IEEE transactions on computers (01.02.2001)
    “…The Java Virtual Machine (JVM) is the cornerstone of Java technology and its efficiency in executing the portable Java bytecodes is crucial for the success of…”
    Get full text
    Journal Article
  2. 2

    Debloating Software Through Enhanced Static Analysis and Constraint Rules by Song, Xiaohu, Yu, Hai, Wang, Ying, Zhu, Zhiliang

    ISSN: 0038-0644, 1097-024X
    Published: Bognor Regis Wiley Subscription Services, Inc 01.10.2025
    Published in Software, practice & experience (01.10.2025)
    “…Introduction Java applications often bloat, consuming more resources than necessary. Existing bytecode debloating techniques have several limitations, such as…”
    Get full text
    Journal Article
  3. 3

    JAVA BYTECODE INSTRUCTION USAGE COUNTING WITH ALGATOR by Dobravec, Tomaž

    ISSN: 1335-8243, 1338-3957
    Published: Sciendo 01.01.2019
    Published in Acta electrotechnica et informatica (01.01.2019)
    “…Development of algorithms for solving various kinds of computer related problems consists of several consecutive and possibly repetitive phases. The final and…”
    Get full text
    Journal Article
  4. 4

    Java decompiler diversity and its application to meta-decompilation by Harrand, Nicolas, Soto-Valero, César, Monperrus, Martin, Baudry, Benoit

    ISSN: 0164-1212, 1873-1228
    Published: Elsevier Inc 01.10.2020
    Published in The Journal of systems and software (01.10.2020)
    “…During compilation from Java source code to bytecode, some information is irreversibly lost. In other words, compilation and decompilation of Java code is not…”
    Get full text
    Journal Article
  5. 5

    LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications by Qiu, Jun, Yang, Xuewu, Wu, Huamao, Zhou, Yajin, Li, Jinku, Ma, Jianfeng

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.09.2022
    “…Android application (or app) developers increasingly integrate third-party libraries to enrich the functionality of their apps. However, current permission…”
    Get full text
    Journal Article
  6. 6

    SeByte: Scalable clone and similarity search for bytecode by Keivanloo, Iman, Roy, Chanchal K., Rilling, Juergen

    ISSN: 0167-6423, 1872-7964
    Published: Elsevier B.V 01.12.2014
    Published in Science of computer programming (01.12.2014)
    “…While source code clone detection is a well-established research area, finding similar code fragments in binary and other intermediate code representations has…”
    Get full text
    Journal Article
  7. 7

    Code coverage differences of Java bytecode and source code instrumentation tools by Horváth, Ferenc, Gergely, Tamás, Beszédes, Árpád, Tengeri, Dávid, Balogh, Gergő, Gyimóthy, Tibor

    ISSN: 0963-9314, 1573-1367
    Published: New York Springer US 01.03.2019
    Published in Software quality journal (01.03.2019)
    “…Many software testing fields, like white-box testing, test case generation, test prioritization, and fault localization, depend on code coverage measurement…”
    Get full text
    Journal Article
  8. 8

    Flight of the FINCH Through the Java Wilderness by Orlov, M, Sipper, M

    ISSN: 1089-778X, 1941-0026
    Published: New York, NY IEEE 01.04.2011
    “…We describe Fertile Darwinian Bytecode Harvester (FINCH), a methodology for evolving Java bytecode, enabling the evolution of extant, unrestricted Java…”
    Get full text
    Journal Article
  9. 9

    Detecting Java Code Clones Based on Bytecode Sequence Alignment by Yu, Dongjin, Yang, Jiazha, Chen, Xin, Chen, Jie

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2019
    Published in IEEE access (2019)
    “…When the source code is copied and pasted or modified, there will be a lot of identical or similar code snippets in the software system, which are called code…”
    Get full text
    Journal Article
  10. 10

    RIM4J: An Architecture for Language-Supported Runtime Measurement against Malicious Bytecode in Cloud Computing by Ba, Haihe, Zhou, Huaizhe, Qiao, Huidong, Wang, Zhiying, Ren, Jiangchun

    ISSN: 2073-8994, 2073-8994
    Published: 01.07.2018
    Published in Symmetry (Basel) (01.07.2018)
    “…While cloud customers can benefit from migrating applications to the cloud, they are concerned about the security of the hosted applications. This is…”
    Get full text
    Journal Article
  11. 11

    Design, implementation, and application of GPU-based Java bytecode interpreters by Celik, Ahmet, Nie, Pengyu, Rossbach, Christopher J., Gligoric, Milos

    ISSN: 2475-1421, 2475-1421
    Published: 01.10.2019
    “…We present the design and implementation of GVM, the first system for executing Java bytecode entirely on GPUs. GVM is ideal for applications that execute a…”
    Get full text
    Journal Article
  12. 12

    Conditional termination of loops over heap-allocated data by Albert, Elvira, Arenas, Puri, Genaim, Samir, Puebla, Germán, Román-Díez, Guillermo

    ISSN: 0167-6423, 1872-7964
    Published: Elsevier B.V 15.10.2014
    Published in Science of computer programming (15.10.2014)
    “…Static analysis which takes into account the values of data stored in the heap is considered complex and computationally intractable in practice. Thus, most…”
    Get full text
    Journal Article
  13. 13

    Verifying pointer programs using graph grammars by Heinen, Jonathan, Jansen, Christina, Katoen, Joost-Pieter, Noll, Thomas

    ISSN: 0167-6423, 1872-7964
    Published: Elsevier B.V 01.01.2015
    Published in Science of computer programming (01.01.2015)
    “…This paper argues that graph grammars naturally model dynamic data structures such as lists, trees and combinations thereof. These grammars can be exploited to…”
    Get full text
    Journal Article
  14. 14

    Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs by Achour, Safaa, Benattou, Mohammed

    ISSN: 2472-7652
    Published: IEEE 01.05.2018
    “…The verification process of software is of growing importance as it helps to assure that an application is correctly built. However, an efficient verification…”
    Get full text
    Conference Proceeding
  15. 15

    Java-MaC: A Run-Time Assurance Approach for Java Programs by Kim, MoonZoo, Viswanathan, Mahesh, Kannan, Sampath, Lee, Insup, Sokolsky, Oleg

    ISSN: 0925-9856, 1572-8102
    Published: 01.03.2004
    Published in Formal methods in system design (01.03.2004)
    “…We describe Java-MaC, a prototype implementation of the Monitoring and Checking (MaC) architecture for Java programs. The MaC architecture provides assurance…”
    Get full text
    Journal Article
  16. 16

    Arden2ByteCode: A one-pass Arden Syntax compiler for service-oriented decision support systems based on the OSGi platform by Gietzelt, Matthias, Goltz, Ursula, Grunwald, Daniel, Lochau, Malte, Marschollek, Michael, Song, Bianying, Wolf, Klaus-Hendrik

    ISSN: 0169-2607, 1872-7565, 1872-7565
    Published: Ireland Elsevier Ireland Ltd 01.05.2012
    “…► We present Arden2ByteCode a newly developed open source compiler for the Arden Syntax. ► Direct one-pass translation to Java Bytecode provides fast…”
    Get full text
    Journal Article
  17. 17

    Heap space analysis for garbage collected languages by Albert, Elvira, Genaim, Samir, Gómez-Zamalloa, Miguel

    ISSN: 0167-6423, 1872-7964
    Published: Elsevier B.V 01.09.2013
    Published in Science of computer programming (01.09.2013)
    “…Accurately predicting the dynamic memory consumption (or heap space) of programs can be critical during software development. It is well-known that garbage…”
    Get full text
    Journal Article
  18. 18

    Applying dynamic analysis for defect detection in Java-applications by Sergey Vartanov, Alexander Gerasimov

    ISSN: 2079-8156, 2220-6426
    Published: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018
    “…This paper provides an overview of program analysis techniques and describes practical implementation of these techniques for automatic software defect…”
    Get full text
    Journal Article
  19. 19

    A method for detecting the theft of Java programs through analysis of the control flow information by Lim, Hyun-il, Park, Heewan, Choi, Seokwoo, Han, Taisook

    ISSN: 0950-5849, 1873-6025
    Published: Amsterdam Elsevier B.V 01.09.2009
    Published in Information and software technology (01.09.2009)
    “…A software birthmark refers to the inherent characteristics of a program that can be used to identify the program. In this paper, a method for detecting the…”
    Get full text
    Journal Article
  20. 20

    Pushing Java Type Obfuscation to the Limit by Foket, Christophe, De Sutter, Bjorn, De Bosschere, Koen

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.11.2014
    “…Bytecoded .Net and Java programs reveal type information through encoded type hierarchies, casts, field declarations and method signatures. This facilitates…”
    Get full text
    Journal Article