Search Results - Java bytecodes*

Refine Results
  1. 1

    DALEQ - Explainable Equivalence for Java Bytecode by Dietrich, Jens, Hassanshahi, Behnaz

    ISSN: 2643-1572
    Published: IEEE 16.11.2025
    “…The security of software builds has attracted increased attention in recent years in response to incidents like solarwinds and xz. Now, several companies…”
    Get full text
    Conference Proceeding
  2. 2

    From bytecode to JavaScript: the Js_of_ocaml compiler by Vouillon, Jérôme, Balat, Vincent

    ISSN: 0038-0644, 1097-024X
    Published: Bognor Regis Blackwell Publishing Ltd 01.08.2014
    Published in Software, practice & experience (01.08.2014)
    “…SUMMARY We present the design and implementation of a compiler from OCaml bytecode to JavaScript…”
    Get full text
    Journal Article
  3. 3

    Reasoning About Exceptional Behavior At the Level of Java Bytecode with ByteBack by Paganoni, Marco, Furia, Carlo A.

    ISSN: 0934-5043, 1433-299X
    Published: New York, NY ACM 04.11.2025
    Published in Formal aspects of computing (04.11.2025)
    “… In this article, we present a novel approach to verify the exceptional behavior of Java programs, which extends our previous work on ByteBack…”
    Get full text
    Journal Article
  4. 4

    Efficient Java Bytecode Analysis and Sequence Identification for Embedded Systems by Iqbal, Adeel, Khan, Minhaj Ahmad

    ISSN: 2411-6335, 2308-8168
    Published: 31.12.2025
    Published in VAWKUM transaction on computer sciences (31.12.2025)
    “…Conventional tools and techniques of bytecode profiling require a lot of resources to generate bytecode sequences. Embedded devices have limited resources, and…”
    Get full text
    Journal Article
  5. 5

    Symbolic PathFinder: integrating symbolic execution with model checking for Java bytecode analysis by Păsăreanu, Corina S., Visser, Willem, Bushnell, David, Geldenhuys, Jaco, Mehlitz, Peter, Rungta, Neha

    ISSN: 0928-8910, 1573-7535
    Published: Boston Springer US 01.09.2013
    Published in Automated software engineering (01.09.2013)
    “…Symbolic PathFinder (SPF) is a software analysis tool that combines symbolic execution with model checking for automated test case generation and error detection in Java bytecode programs…”
    Get full text
    Journal Article
  6. 6

    An Experimental Comparison of Clone Detection Techniques using Java Bytecode by Schneider, Jean-Guy, Lee, Sung Une

    ISSN: 2640-0715
    Published: IEEE 01.12.2022
    “… Avoiding some of the issues of source-code based approaches, we are investigating the effectiveness of using various similarity measures on Bytecode to identify code clones in Java-based systems in this work…”
    Get full text
    Conference Proceeding
  7. 7

    Code coverage differences of Java bytecode and source code instrumentation tools by Horváth, Ferenc, Gergely, Tamás, Beszédes, Árpád, Tengeri, Dávid, Balogh, Gergő, Gyimóthy, Tibor

    ISSN: 0963-9314, 1573-1367
    Published: New York Springer US 01.03.2019
    Published in Software quality journal (01.03.2019)
    “… For Java, the prevalent approach to code coverage measurement is using bytecode instrumentation due to its various benefits over source code instrumentation…”
    Get full text
    Journal Article
  8. 8

    Design, implementation, and application of GPU-based Java bytecode interpreters by Celik, Ahmet, Nie, Pengyu, Rossbach, Christopher J., Gligoric, Milos

    ISSN: 2475-1421, 2475-1421
    Published: 01.10.2019
    “…We present the design and implementation of GVM, the first system for executing Java bytecode entirely on GPUs…”
    Get full text
    Journal Article
  9. 9

    A Java bytecode optimizer using side-effect analysis by Clausen, Lars R.

    ISSN: 1040-3108, 1096-9128
    Published: Chichester John Wiley & Sons, Ltd 01.11.1997
    Published in Concurrency (Chichester, England.) (01.11.1997)
    “…This paper describes Cream, an optimizer for Java bytecode using side‐effect analysis to improve the optimizations. Dead…”
    Get full text
    Journal Article
  10. 10

    Modeling the Java Bytecode Verifier by Reynolds, Mark C.

    ISSN: 0167-6423, 1872-7964
    Published: Elsevier B.V 01.03.2013
    Published in Science of computer programming (01.03.2013)
    “… in Java, particularly in the Bytecode Verifier, a critical component used to verify class semantics before loading is complete…”
    Get full text
    Journal Article
  11. 11

    Formal Model of Conformity Analysis Method of Java Bytecode Programs annotated with BML Specifications by Achour, Safaa, Benattou, Mohammed, Lanet, Jean-Louis

    ISSN: 1819-656X, 1819-9224
    Published: Hong Kong International Association of Engineers 17.05.2021
    “…This paper presents an analysis method of detecting the inconsistencies between a Java Bytecode program and its formal specification expressed at the Bytecode level, using the Bytecode Modeling Language (BML…”
    Get full text
    Journal Article
  12. 12

    An empirical study of Java bytecode programs by Collberg, Christian, Myles, Ginger, Stepp, Michael

    ISSN: 0038-0644, 1097-024X
    Published: Chichester, UK John Wiley & Sons, Ltd 01.05.2007
    Published in Software, practice & experience (01.05.2007)
    “…We present a study of the static structure of real Java bytecode programs. A total of 1132 Java jar…”
    Get full text
    Journal Article
  13. 13

    CIL to Java-Bytecode Translation for Static Analysis Leveraging by Ferrara, Pietro, Cortesi, Agostino, Spoto, Fausto

    ISSN: 2575-5099
    Published: ACM 01.05.2018
    “…A formal translation of CIL (i.e., .Net) bytecode into Java bytecode is introduced and proved sound with respect to the language semantics…”
    Get full text
    Conference Proceeding
  14. 14

    Applying Java bytecode static instrumentation for software dynamic analysis by Vartanov, S.P., Ermakov, M.K.

    ISSN: 2079-8156, 2220-6426
    Published: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018
    “…: analysis tool may not have access to target program source code, and the program may be interpreted by a non-standard virtual machine with bytecode format different from Java Virtual Machine specifications…”
    Get full text
    Journal Article
  15. 15

    Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs by Achour, Safaa, Benattou, Mohammed

    ISSN: 2472-7652
    Published: IEEE 01.05.2018
    “… Thus, we propose in this paper a constraint-based analysis technique to detect vulnerabilities in Java applications at the executable level…”
    Get full text
    Conference Proceeding
  16. 16

    Provably correct control flow graphs from Java bytecode programs with exceptions by Amighi, Afshin, Gomes, Pedro de Carvalho, Gurov, Dilian, Huisman, Marieke

    ISSN: 1433-2779, 1433-2787, 1433-2787
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.11.2016
    “…We present an algorithm for extracting control flow graphs from Java bytecode that captures normal as well as exceptional control flow…”
    Get full text
    Journal Article
  17. 17

    A certified lightweight non-interference Java bytecode verifier by BARTHE, GILLES, PICHARDIE, DAVID, REZK, TAMARA

    ISSN: 0960-1295, 1469-8072
    Published: Cambridge Cambridge University Press 01.10.2013
    “…Non-interference guarantees the absence of illicit information flow throughout program execution. It can be enforced by appropriate information flow type…”
    Get full text
    Journal Article
  18. 18

    Java Bytecode Verification: Algorithms and Formalizations by Leroy, Xavier

    ISSN: 0168-7433, 1573-0670
    Published: Springer Verlag 01.05.2003
    Published in Journal of automated reasoning (01.05.2003)
    “…Bytecode verification is a crucial security component for Java applets, on the Web and on embedded devices such as smart cards…”
    Get full text
    Journal Article
  19. 19

    Decompilation of Java bytecode to Prolog by partial evaluation by Gómez-Zamalloa, Miguel, Albert, Elvira, Puebla, Germán

    ISSN: 0950-5849, 1873-6025
    Published: Amsterdam Elsevier B.V 01.10.2009
    Published in Information and software technology (01.10.2009)
    “…Reasoning about Java bytecode (JBC) is complicated due to its unstructured control-flow, the use of three-address code combined with the use of an operand stack, etc…”
    Get full text
    Journal Article
  20. 20

    Advanced obfuscation techniques for Java bytecode by Chan, Jien-Tsai, Yang, Wuu

    ISSN: 0164-1212, 1873-1228
    Published: New York Elsevier Inc 01.04.2004
    Published in The Journal of systems and software (01.04.2004)
    “…There exist several obfuscation tools for preventing Java bytecode from being decompiled…”
    Get full text
    Journal Article