Search Results - Java Bytecode Analysis*

Refine Results
  1. 1

    Efficient Java Bytecode Analysis and Sequence Identification for Embedded Systems by Iqbal, Adeel, Khan, Minhaj Ahmad

    ISSN: 2411-6335, 2308-8168
    Published: 31.12.2025
    Published in VAWKUM transaction on computer sciences (31.12.2025)
    “…Conventional tools and techniques of bytecode profiling require a lot of resources to generate bytecode sequences…”
    Get full text
    Journal Article
  2. 2

    Symbolic PathFinder: integrating symbolic execution with model checking for Java bytecode analysis by Păsăreanu, Corina S., Visser, Willem, Bushnell, David, Geldenhuys, Jaco, Mehlitz, Peter, Rungta, Neha

    ISSN: 0928-8910, 1573-7535
    Published: Boston Springer US 01.09.2013
    Published in Automated software engineering (01.09.2013)
    “…Symbolic PathFinder (SPF) is a software analysis tool that combines symbolic execution with model checking for automated test case generation and error detection in Java bytecode programs…”
    Get full text
    Journal Article
  3. 3

    Formal Model of Conformity Analysis Method of Java Bytecode Programs annotated with BML Specifications by Achour, Safaa, Benattou, Mohammed, Lanet, Jean-Louis

    ISSN: 1819-656X, 1819-9224
    Published: Hong Kong International Association of Engineers 17.05.2021
    “…This paper presents an analysis method of detecting the inconsistencies between a Java Bytecode program and its formal specification expressed at the Bytecode level, using the Bytecode Modeling Language (BML…”
    Get full text
    Journal Article
  4. 4

    SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java Bytecode by Geraldo, Eduardo, Costa Seco, João

    ISSN: 2075-2180, 2075-2180
    Published: Open Publishing Association 27.08.2019
    “… In this paper, we tackle the challenge of dynamically tracking information flow in third-party Java-based applications using dependent information flow control…”
    Get full text
    Journal Article
  5. 5

    Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs by Achour, Safaa, Benattou, Mohammed

    ISSN: 2472-7652
    Published: IEEE 01.05.2018
    “… Thus, we propose in this paper a constraint-based analysis technique to detect vulnerabilities in Java applications at the executable level…”
    Get full text
    Conference Proceeding
  6. 6

    CIL to Java-Bytecode Translation for Static Analysis Leveraging by Ferrara, Pietro, Cortesi, Agostino, Spoto, Fausto

    ISSN: 2575-5099
    Published: ACM 01.05.2018
    “…A formal translation of CIL (i.e., .Net) bytecode into Java bytecode is introduced and proved sound with respect to the language semantics…”
    Get full text
    Conference Proceeding
  7. 7

    A method for detecting the theft of Java programs through analysis of the control flow information by Lim, Hyun-il, Park, Heewan, Choi, Seokwoo, Han, Taisook

    ISSN: 0950-5849, 1873-6025
    Published: Amsterdam Elsevier B.V 01.09.2009
    Published in Information and software technology (01.09.2009)
    “… In this paper, a method for detecting the theft of Java programs through a static software birthmark is proposed that is based on the control flow information…”
    Get full text
    Journal Article
  8. 8

    A Java bytecode optimizer using side-effect analysis by Clausen, Lars R.

    ISSN: 1040-3108, 1096-9128
    Published: Chichester John Wiley & Sons, Ltd 01.11.1997
    Published in Concurrency (Chichester, England.) (01.11.1997)
    “…This paper describes Cream, an optimizer for Java bytecode using side‐effect analysis to improve the optimizations. Dead…”
    Get full text
    Journal Article
  9. 9

    Two Approaches to Fast Bytecode Frontend for Static Analysis by Li, Chenxi, Lin, Haoran, Tan, Tian, Li, Yue

    ISSN: 2475-1421, 2475-1421
    Published: New York, NY, USA ACM 09.10.2025
    “…In static analysis frameworks for Java, the bytecode frontend serves as a critical component, transforming complex, stack-based Java bytecode into a more analyzable register-based, typed 3-address code representation…”
    Get full text
    Journal Article
  10. 10

    JasFree: Grammar-free Program Analysis for JavaScript Bytecode by Jiang, Hao, Lai, Haiwei, Wu, Si, Hua, Baojian

    ISSN: 2324-9013
    Published: IEEE 17.12.2024
    “… Ensuring the security of JavaScript binaries in these domains necessitates comprehensive binary code analysis…”
    Get full text
    Conference Proceeding
  11. 11

    Reverse-engineering 1-n associations from Java bytecode using alias analysis by Kang, Yoohoon, Park, Chanjin, Wu, Chisu

    ISSN: 0950-5849, 1873-6025
    Published: Amsterdam Elsevier B.V 01.02.2007
    Published in Information and software technology (01.02.2007)
    “… This paper presents a new approach to reverse-engineering 1-n associations from Java bytecode based on alias analysis…”
    Get full text
    Journal Article
  12. 12

    The Vulnerability Analysis Framework for Java Bytecode by Tang Hong, Chen Hua, Zhao Gang, Liu Qiang, Zhao Jinjin

    ISBN: 9781424457885, 1424457882
    ISSN: 1521-9097
    Published: IEEE 01.12.2009
    “… This paper presents the vulnerability analysis framework to detect the security hole in the Java web applications…”
    Get full text
    Conference Proceeding
  13. 13

    Applying Java bytecode static instrumentation for software dynamic analysis by Vartanov, S.P., Ermakov, M.K.

    ISSN: 2079-8156, 2220-6426
    Published: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018
    “…: analysis tool may not have access to target program source code, and the program may be interpreted by a non-standard virtual machine with bytecode format different from Java Virtual Machine specifications…”
    Get full text
    Journal Article
  14. 14

    Instruction-Words Based Software Birthmark by Lianhong Ma, Yong Wang, Fenlin Liu, Lin Chen

    ISBN: 9781467330930, 1467330930
    ISSN: 2162-8998
    Published: IEEE 01.11.2012
    “…An instruction-words based software birthmark is proposed by applying the idea of document copy detection technology based on word frequency. The birthmark…”
    Get full text
    Conference Proceeding
  15. 15

    Static analysis of Java bytecode by Zhao, Jian-jun

    ISSN: 1007-1202, 1993-4998
    Published: Department of Computer and Engineering,Fukuoka Institute of Technology 01.03.2001
    “… In this paper ,we present a control flow analysis technique to analyze the control flow in Java bytecode…”
    Get full text
    Journal Article
  16. 16

    User-Definable Resource Usage Bounds Analysis for Java Bytecode by Navas, Jorge, Méndez-Lojo, Mario, Hermenegildo, Manuel V.

    ISSN: 1571-0661, 1571-0661
    Published: Elsevier B.V 01.12.2009
    “… We present a fully automated analysis for inferring upper bounds on the usage that a Java bytecode program makes of a set of application…”
    Get full text
    Journal Article
  17. 17

    SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java Bytecode by Geraldo, Eduardo, João Costa Seco

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 27.08.2019
    Published in arXiv.org (27.08.2019)
    “… In this paper, we tackle the challenge of dynamically tracking information flow in third-party Java-based applications using dependent information flow control…”
    Get full text
    Paper
  18. 18

    Experiments in Cost Analysis of Java Bytecode by Albert, E., Arenas, P., Genaim, S., Puebla, G., Zanardini, D.

    ISSN: 1571-0661, 1571-0661
    Published: Elsevier B.V 31.07.2007
    “…Recently, we proposed a general framework for the cost analysis of Java bytecode which can be used for measuring resource usage…”
    Get full text
    Journal Article
  19. 19

    Experiments with Non-Termination Analysis for Java Bytecode by Payet, Étienne, Spoto, Fausto

    ISSN: 1571-0661, 1571-0661
    Published: Elsevier B.V 01.12.2009
    “…Non-termination analysis proves that programs, or parts of a program, do not terminate…”
    Get full text
    Journal Article
  20. 20

    Static Resource Analysis for Java Bytecode Using Amortisation and Separation Logic by Fenacci, Damon, MacKenzie, Kenneth

    ISSN: 1571-0661, 1571-0661
    Published: Elsevier B.V 02.12.2011
    “…In this paper we describe a static analyser for Java bytecode which uses a combination of amortised analysis and Separation Logic due to Robert Atkey…”
    Get full text
    Journal Article