Search Results - Java byte codes
-
1
An Empirical Study of a Hybrid Code Clone Detection Approach on Java Byte Code
ISSN: 2010-2283, 2251-3043Published: Singapore Global Science and Technology Forum 01.01.2017Published in GSTF International journal on computing (01.01.2017)“… We conduct a case study on two open source code Java projects such as Eclipse-ant and Eclipse-JDT core to show the effectiveness of our tool…”
Get full text
Journal Article -
2
Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques
ISSN: 1558-058XPublished: IEEE 01.04.2018Published in SoutheastCon 2018 (01.04.2018)“… problems. Other methods of finding software vulnerabilities automatically are required. This proof-of-concept study applied natural language processing on Java byte code to locate…”
Get full text
Conference Proceeding -
3
Enhancing quality of code smell detection on java byte code
ISBN: 1339394545, 9781339394541Published: ProQuest Dissertations & Theses 01.01.2015“…A software clone occurs when two code fragments are identical to each other in the source code…”
Get full text
Dissertation -
4
Combinatorial Validation Testing of Java Card Byte Code Verifiers
ISBN: 1479904058, 9781479904051ISSN: 1524-4547Published: IEEE 01.06.2013Published in 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (01.06.2013)“…We present a technique to fully automate validation of a byte code verifier (BCV) implementation by testing…”
Get full text
Conference Proceeding -
5
Open-Source Java Code Coverage using Source and Byte Code Instruments: An Experimental Analysis
ISSN: 1303-5150Published: Bornova Izmir NeuroQuantology 01.01.2022Published in NeuroQuantology (01.01.2022)“…The software testers inherently face the challenges of code coverage while designing test cases…”
Get full text
Journal Article -
6
An Efficient Code Clone Detection Model on Java Byte Code Using Hybrid Approach
ISBN: 9781849198462, 1849198462“… Software cloning is a perception in which source code is duplicated. Code clones and its detection is one of the emerging and most dominant areas of research in the field of software engineering…”Published: Stevenage, UK IET 2013
Get full text
Conference Proceeding -
7
A Tree-Based Alternative to Java Byte-Codes
ISSN: 0885-7458, 1573-7640Published: New York, NY Plenum Press 01.02.1999Published in International journal of parallel programming (01.02.1999)“… than software transported via Java byte-codes. This is true even if the Java byte-codes are subsequently further translated into native code…”
Get full text
Journal Article -
8
Security monitor inlining and certification for multithreaded Java
ISSN: 0960-1295, 1469-8072, 1469-8072Published: Cambridge, UK Cambridge University Press 01.03.2015Published in Mathematical structures in computer science (01.03.2015)“…Security monitor inlining is a technique for security policy enforcement whereby monitor functionality is injected into application code in the style of aspect-oriented programming…”
Get full text
Journal Article -
9
Byte-code scheduling of Java programs with branches for desktop grid
ISSN: 0167-739X, 1872-7115Published: Elsevier B.V 01.11.2007Published in Future generation computer systems (01.11.2007)“…) inside desktop grids is presented. It is composed of two stages. In the first stage, a clustering algorithm is applied to extended macro data flow graphs generated on the basis of the byte-code compiled for multithreaded Java programs…”
Get full text
Journal Article -
10
Proof-carrying code from certified abstract interpretation and fixpoint compression
ISSN: 0304-3975, 1879-2294Published: Amsterdam Elsevier B.V 08.11.2006Published in Theoretical computer science (08.11.2006)“… The PCC architecture has been implemented and evaluated experimentally on a byte code language for which we have designed an interval analysis that allows to generate certificates ascertaining that no array-out-of-bounds accesses will occur…”
Get full text
Journal Article Conference Proceeding -
11
The Strengths and Behavioral Quirks of Java Bytecode Decompilers
ISSN: 2470-6892Published: IEEE 01.09.2019Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (01.09.2019)“…During compilation from Java source code to bytecode, some information is irreversibly lost…”
Get full text
Conference Proceeding -
12
Generating control flow graph from Java card byte code
ISSN: 2327-185XPublished: IEEE 01.10.2014Published in Colloquium in Information Science and Technology (Print) (01.10.2014)“… from the byte code of java-card applications…”
Get full text
Conference Proceeding -
13
Deadlock-Detection in Java-Library Using Static-Analysis
ISBN: 0769534465, 9780769534466ISSN: 1530-1362Published: IEEE 01.12.2008Published in 2008 15th Asia-Pacific Software Engineering Conference (01.12.2008)“…Well-written Java programs that conform to the Language and the J2SE-API Specifications can surprisingly deadlock their hosting JVM…”
Get full text
Conference Proceeding -
14
Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code
Published: IEEE 01.12.2015Published in 2015 11th International Conference on Information Assurance and Security (IAS) (01.12.2015)“… Recently, these methods are used in the aim of reverse engineering program code on Java Card…”
Get full text
Conference Proceeding -
15
Portable worst-case execution time analysis using Java Byte Code
ISBN: 9780769507347, 0769507344ISSN: 1068-3070Published: IEEE 2000Published in Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000 (2000)“…Addresses the problem of performing worst-case execution time (WCET) analysis of Java Byte Code (JBC…”
Get full text
Conference Proceeding -
16
Jumble Java Byte Code to Measure the Effectiveness of Unit Tests
ISBN: 0769529844, 9780769529844Published: IEEE 01.09.2007Published in Testing: Academic and Industrial Conference--Practice And Research Techniques : (TAIC PART 2007) : co-located with Mutation 2007 : proceedings : 10th-14th September, 2007, Cumberland Lodge, Windsor, United Kingdom (01.09.2007)“…Jumble is a byte code level mutation testing tool for Java which inter-operates with JUnit…”
Get full text
Conference Proceeding -
17
Java Core Permits Direct Java Byte-Code Execution
ISSN: 0013-4872, 1944-9550Published: Nashville Endeavor Business Media 30.10.2000Published in Electronic design (30.10.2000)Get full text
Magazine Article -
18
Java Byte Code Scheduling Based on the Most-Often-Used-Paths in Programs with Branches
ISBN: 0769524346, 9780769524344ISSN: 2379-5352Published: IEEE 2005Published in The 4th International Symposium on Parallel and Distributed Computing (ISPDC'05) (2005)“… These dependencies are discovered by an analysis of program byte code and stored in the form of relevant macro/dataflow graphs…”
Get full text
Conference Proceeding -
19
Low-level analysis of a portable Java byte code WCET analysis framework
ISBN: 0769509304, 9780769509303ISSN: 1530-1427Published: IEEE 2000Published in Seventh International Conference on Real-Time Computing Systems and Applications : proceedings : 12-14 December, 2000, Cheju Island, South Korea (2000)“…To support portability, worst-case execution time (WCET) analysis of Java byte code is performed at two levels - machine-independent program flow analysis…”
Get full text
Conference Proceeding -
20
Automatic Generation of Vulnerability Tests for the Java Card Byte Code Verifier
ISBN: 9781457707353, 1457707357Published: IEEE 01.05.2011Published in 2011 Conference on Network and Information Systems Security (01.05.2011)“…The byte code verifier is an essential component of the Java Card security platform…”
Get full text
Conference Proceeding

