Search Results - Java byte codes

Refine Results
  1. 1

    An Empirical Study of a Hybrid Code Clone Detection Approach on Java Byte Code by Ghosh, Aritra, Lee, Young

    ISSN: 2010-2283, 2251-3043
    Published: Singapore Global Science and Technology Forum 01.01.2017
    Published in GSTF International journal on computing (01.01.2017)
    “… We conduct a case study on two open source code Java projects such as Eclipse-ant and Eclipse-JDT core to show the effectiveness of our tool…”
    Get full text
    Journal Article
  2. 2

    Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques by Jackson, Kevin A., Bennett, Brian T.

    ISSN: 1558-058X
    Published: IEEE 01.04.2018
    Published in SoutheastCon 2018 (01.04.2018)
    “… problems. Other methods of finding software vulnerabilities automatically are required. This proof-of-concept study applied natural language processing on Java byte code to locate…”
    Get full text
    Conference Proceeding
  3. 3

    Enhancing quality of code smell detection on java byte code by Ghosh, Aritra

    ISBN: 1339394545, 9781339394541
    Published: ProQuest Dissertations & Theses 01.01.2015
    “…A software clone occurs when two code fragments are identical to each other in the source code…”
    Get full text
    Dissertation
  4. 4

    Combinatorial Validation Testing of Java Card Byte Code Verifiers by Calvagna, Andrea, Tramontana, Emiliano

    ISBN: 1479904058, 9781479904051
    ISSN: 1524-4547
    Published: IEEE 01.06.2013
    “…We present a technique to fully automate validation of a byte code verifier (BCV) implementation by testing…”
    Get full text
    Conference Proceeding
  5. 5

    Open-Source Java Code Coverage using Source and Byte Code Instruments: An Experimental Analysis by Gupta, Varuna, Srivastava, Shilpa

    ISSN: 1303-5150
    Published: Bornova Izmir NeuroQuantology 01.01.2022
    Published in NeuroQuantology (01.01.2022)
    “…The software testers inherently face the challenges of code coverage while designing test cases…”
    Get full text
    Journal Article
  6. 6

    An Efficient Code Clone Detection Model on Java Byte Code Using Hybrid Approach by Raheja, K, Tekchandani, R.K

    ISBN: 9781849198462, 1849198462
    Published: Stevenage, UK IET 2013
    “… Software cloning is a perception in which source code is duplicated. Code clones and its detection is one of the emerging and most dominant areas of research in the field of software engineering…”
    Get full text
    Conference Proceeding
  7. 7

    A Tree-Based Alternative to Java Byte-Codes by Kistler, Thomas, Franz, Michael

    ISSN: 0885-7458, 1573-7640
    Published: New York, NY Plenum Press 01.02.1999
    “… than software transported via Java byte-codes. This is true even if the Java byte-codes are subsequently further translated into native code…”
    Get full text
    Journal Article
  8. 8

    Security monitor inlining and certification for multithreaded Java by DAM, MADS, JACOBS, BART, LUNDBLAD, ANDREAS, PIESSENS, FRANK

    ISSN: 0960-1295, 1469-8072, 1469-8072
    Published: Cambridge, UK Cambridge University Press 01.03.2015
    “…Security monitor inlining is a technique for security policy enforcement whereby monitor functionality is injected into application code in the style of aspect-oriented programming…”
    Get full text
    Journal Article
  9. 9

    Byte-code scheduling of Java programs with branches for desktop grid by Laskowski, Eryk, Tudruj, Marek, Olejnik, Richard, Toursel, Bernard

    ISSN: 0167-739X, 1872-7115
    Published: Elsevier B.V 01.11.2007
    Published in Future generation computer systems (01.11.2007)
    “…) inside desktop grids is presented. It is composed of two stages. In the first stage, a clustering algorithm is applied to extended macro data flow graphs generated on the basis of the byte-code compiled for multithreaded Java programs…”
    Get full text
    Journal Article
  10. 10

    Proof-carrying code from certified abstract interpretation and fixpoint compression by Besson, Frédéric, Jensen, Thomas, Pichardie, David

    ISSN: 0304-3975, 1879-2294
    Published: Amsterdam Elsevier B.V 08.11.2006
    Published in Theoretical computer science (08.11.2006)
    “… The PCC architecture has been implemented and evaluated experimentally on a byte code language for which we have designed an interval analysis that allows to generate certificates ascertaining that no array-out-of-bounds accesses will occur…”
    Get full text
    Journal Article Conference Proceeding
  11. 11

    The Strengths and Behavioral Quirks of Java Bytecode Decompilers by Harrand, Nicolas, Soto-Valero, Cesar, Monperrus, Martin, Baudry, Benoit

    ISSN: 2470-6892
    Published: IEEE 01.09.2019
    “…During compilation from Java source code to bytecode, some information is irreversibly lost…”
    Get full text
    Conference Proceeding
  12. 12

    Generating control flow graph from Java card byte code by Amine, Achkar, Mohammed, Benattou, Jean-Louis, Lanet

    ISSN: 2327-185X
    Published: IEEE 01.10.2014
    “… from the byte code of java-card applications…”
    Get full text
    Conference Proceeding
  13. 13

    Deadlock-Detection in Java-Library Using Static-Analysis by Shanbhag, V.K.

    ISBN: 0769534465, 9780769534466
    ISSN: 1530-1362
    Published: IEEE 01.12.2008
    “…Well-written Java programs that conform to the Language and the J2SE-API Specifications can surprisingly deadlock their hosting JVM…”
    Get full text
    Conference Proceeding
  14. 14

    Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code by Kasmi, Mohammed Amine, Azizi, Mostafa, Lanet, Jean-Louis

    Published: IEEE 01.12.2015
    “… Recently, these methods are used in the aim of reverse engineering program code on Java Card…”
    Get full text
    Conference Proceeding
  15. 15

    Portable worst-case execution time analysis using Java Byte Code by Bernat, G., Burns, A., Wellings, A.

    ISBN: 9780769507347, 0769507344
    ISSN: 1068-3070
    Published: IEEE 2000
    “…Addresses the problem of performing worst-case execution time (WCET) analysis of Java Byte Code (JBC…”
    Get full text
    Conference Proceeding
  16. 16
  17. 17

    Java Core Permits Direct Java Byte-Code Execution by Vollmer, Alfred

    ISSN: 0013-4872, 1944-9550
    Published: Nashville Endeavor Business Media 30.10.2000
    Published in Electronic design (30.10.2000)
    Get full text
    Magazine Article
  18. 18

    Java Byte Code Scheduling Based on the Most-Often-Used-Paths in Programs with Branches by Laskowski, E., Tudruj, M., Olejnik, R., Toursel, B.

    ISBN: 0769524346, 9780769524344
    ISSN: 2379-5352
    Published: IEEE 2005
    “… These dependencies are discovered by an analysis of program byte code and stored in the form of relevant macro/dataflow graphs…”
    Get full text
    Conference Proceeding
  19. 19

    Low-level analysis of a portable Java byte code WCET analysis framework by Bate, I., Bernat, G., Murphy, G., Puschner, P.

    ISBN: 0769509304, 9780769509303
    ISSN: 1530-1427
    Published: IEEE 2000
    “…To support portability, worst-case execution time (WCET) analysis of Java byte code is performed at two levels - machine-independent program flow analysis…”
    Get full text
    Conference Proceeding
  20. 20

    Automatic Generation of Vulnerability Tests for the Java Card Byte Code Verifier by Savary, A., Frappier, M., Lanet, J.

    ISBN: 9781457707353, 1457707357
    Published: IEEE 01.05.2011
    “…The byte code verifier is an essential component of the Java Card security platform…”
    Get full text
    Conference Proceeding