Search Results - Java Bytecode Analysis*
-
1
Efficient Java Bytecode Analysis and Sequence Identification for Embedded Systems
ISSN: 2411-6335, 2308-8168Published: 31.12.2025Published in VAWKUM transaction on computer sciences (31.12.2025)“…Conventional tools and techniques of bytecode profiling require a lot of resources to generate bytecode sequences…”
Get full text
Journal Article -
2
Symbolic PathFinder: integrating symbolic execution with model checking for Java bytecode analysis
ISSN: 0928-8910, 1573-7535Published: Boston Springer US 01.09.2013Published in Automated software engineering (01.09.2013)“…Symbolic PathFinder (SPF) is a software analysis tool that combines symbolic execution with model checking for automated test case generation and error detection in Java bytecode programs…”
Get full text
Journal Article -
3
Formal Model of Conformity Analysis Method of Java Bytecode Programs annotated with BML Specifications
ISSN: 1819-656X, 1819-9224Published: Hong Kong International Association of Engineers 17.05.2021Published in IAENG international journal of computer science (17.05.2021)“…This paper presents an analysis method of detecting the inconsistencies between a Java Bytecode program and its formal specification expressed at the Bytecode level, using the Bytecode Modeling Language (BML…”
Get full text
Journal Article -
4
SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java Bytecode
ISSN: 2075-2180, 2075-2180Published: Open Publishing Association 27.08.2019Published in Electronic proceedings in theoretical computer science (27.08.2019)“… In this paper, we tackle the challenge of dynamically tracking information flow in third-party Java-based applications using dependent information flow control…”
Get full text
Journal Article -
5
Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs
ISSN: 2472-7652Published: IEEE 01.05.2018Published in Proceedings of the International Conference on Multimedia Computing and Systems (01.05.2018)“… Thus, we propose in this paper a constraint-based analysis technique to detect vulnerabilities in Java applications at the executable level…”
Get full text
Conference Proceeding -
6
CIL to Java-Bytecode Translation for Static Analysis Leveraging
ISSN: 2575-5099Published: ACM 01.05.2018Published in 2018 IEEE/ACM 6th International FME Workshop on Formal Methods in Software Engineering (FormaliSE) (01.05.2018)“…A formal translation of CIL (i.e., .Net) bytecode into Java bytecode is introduced and proved sound with respect to the language semantics…”
Get full text
Conference Proceeding -
7
A method for detecting the theft of Java programs through analysis of the control flow information
ISSN: 0950-5849, 1873-6025Published: Amsterdam Elsevier B.V 01.09.2009Published in Information and software technology (01.09.2009)“… In this paper, a method for detecting the theft of Java programs through a static software birthmark is proposed that is based on the control flow information…”
Get full text
Journal Article -
8
A Java bytecode optimizer using side-effect analysis
ISSN: 1040-3108, 1096-9128Published: Chichester John Wiley & Sons, Ltd 01.11.1997Published in Concurrency (Chichester, England.) (01.11.1997)“…This paper describes Cream, an optimizer for Java bytecode using side‐effect analysis to improve the optimizations. Dead…”
Get full text
Journal Article -
9
Two Approaches to Fast Bytecode Frontend for Static Analysis
ISSN: 2475-1421, 2475-1421Published: New York, NY, USA ACM 09.10.2025Published in Proceedings of ACM on programming languages (09.10.2025)“…In static analysis frameworks for Java, the bytecode frontend serves as a critical component, transforming complex, stack-based Java bytecode into a more analyzable register-based, typed 3-address code representation…”
Get full text
Journal Article -
10
JasFree: Grammar-free Program Analysis for JavaScript Bytecode
ISSN: 2324-9013Published: IEEE 17.12.2024Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (17.12.2024)“… Ensuring the security of JavaScript binaries in these domains necessitates comprehensive binary code analysis…”
Get full text
Conference Proceeding -
11
Reverse-engineering 1-n associations from Java bytecode using alias analysis
ISSN: 0950-5849, 1873-6025Published: Amsterdam Elsevier B.V 01.02.2007Published in Information and software technology (01.02.2007)“… This paper presents a new approach to reverse-engineering 1-n associations from Java bytecode based on alias analysis…”
Get full text
Journal Article -
12
The Vulnerability Analysis Framework for Java Bytecode
ISBN: 9781424457885, 1424457882ISSN: 1521-9097Published: IEEE 01.12.2009Published in 2009 15th International Conference on Parallel and Distributed Systems (01.12.2009)“… This paper presents the vulnerability analysis framework to detect the security hole in the Java web applications…”
Get full text
Conference Proceeding -
13
Applying Java bytecode static instrumentation for software dynamic analysis
ISSN: 2079-8156, 2220-6426Published: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018Published in Trudy Instituta sistemnogo programmirovaniâ (01.10.2018)“…: analysis tool may not have access to target program source code, and the program may be interpreted by a non-standard virtual machine with bytecode format different from Java Virtual Machine specifications…”
Get full text
Journal Article -
14
Instruction-Words Based Software Birthmark
ISBN: 9781467330930, 1467330930ISSN: 2162-8998Published: IEEE 01.11.2012Published in 2012 Fourth International Conference on Multimedia Information Networking and Security (01.11.2012)“…An instruction-words based software birthmark is proposed by applying the idea of document copy detection technology based on word frequency. The birthmark…”
Get full text
Conference Proceeding -
15
Static analysis of Java bytecode
ISSN: 1007-1202, 1993-4998Published: Department of Computer and Engineering,Fukuoka Institute of Technology 01.03.2001Published in Wuhan University journal of natural sciences (01.03.2001)“… In this paper ,we present a control flow analysis technique to analyze the control flow in Java bytecode…”
Get full text
Journal Article -
16
User-Definable Resource Usage Bounds Analysis for Java Bytecode
ISSN: 1571-0661, 1571-0661Published: Elsevier B.V 01.12.2009Published in Electronic notes in theoretical computer science (01.12.2009)“… We present a fully automated analysis for inferring upper bounds on the usage that a Java bytecode program makes of a set of application…”
Get full text
Journal Article -
17
SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java Bytecode
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 27.08.2019Published in arXiv.org (27.08.2019)“… In this paper, we tackle the challenge of dynamically tracking information flow in third-party Java-based applications using dependent information flow control…”
Get full text
Paper -
18
Experiments in Cost Analysis of Java Bytecode
ISSN: 1571-0661, 1571-0661Published: Elsevier B.V 31.07.2007Published in Electronic notes in theoretical computer science (31.07.2007)“…Recently, we proposed a general framework for the cost analysis of Java bytecode which can be used for measuring resource usage…”
Get full text
Journal Article -
19
Experiments with Non-Termination Analysis for Java Bytecode
ISSN: 1571-0661, 1571-0661Published: Elsevier B.V 01.12.2009Published in Electronic notes in theoretical computer science (01.12.2009)“…Non-termination analysis proves that programs, or parts of a program, do not terminate…”
Get full text
Journal Article -
20
Static Resource Analysis for Java Bytecode Using Amortisation and Separation Logic
ISSN: 1571-0661, 1571-0661Published: Elsevier B.V 02.12.2011Published in Electronic notes in theoretical computer science (02.12.2011)“…In this paper we describe a static analyser for Java bytecode which uses a combination of amortised analysis and Separation Logic due to Robert Atkey…”
Get full text
Journal Article

