Search Results - java (byte OR byty) codes

Refine Results
  1. 1

    Finite‐state model extraction and visualization from Java program execution by K. P., Jevitha, Jayaraman, Swaminathan, Jayaraman, Bharat, M, Sethumadhavan

    ISSN: 0038-0644, 1097-024X
    Published: Bognor Regis Wiley Subscription Services, Inc 01.02.2021
    Published in Software, practice & experience (01.02.2021)
    “… In this article, we use the term model extraction to refer to the construction of a finite‐state model from an execution trace of a Java program and a set of key attributes, that is, a subset of the fields of the objects in the program execution…”
    Get full text
    Journal Article
  2. 2

    Open-Source Java Code Coverage using Source and Byte Code Instruments: An Experimental Analysis by Gupta, Varuna, Srivastava, Shilpa

    ISSN: 1303-5150
    Published: Bornova Izmir NeuroQuantology 01.01.2022
    Published in NeuroQuantology (01.01.2022)
    “…The software testers inherently face the challenges of code coverage while designing test cases…”
    Get full text
    Journal Article
  3. 3

    Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques by Jackson, Kevin A., Bennett, Brian T.

    ISSN: 1558-058X
    Published: IEEE 01.04.2018
    Published in SoutheastCon 2018 (01.04.2018)
    “… problems. Other methods of finding software vulnerabilities automatically are required. This proof-of-concept study applied natural language processing on Java byte code to locate…”
    Get full text
    Conference Proceeding
  4. 4

    How Java APIs break – An empirical study by Jezek, Kamil, Dietrich, Jens, Brada, Premek

    ISSN: 0950-5849, 1873-6025
    Published: Amsterdam Elsevier B.V 01.09.2015
    Published in Information and software technology (01.09.2015)
    “… For Java programs, partial upgrades create additional interesting problems as the compiler and the virtual machine use different rule sets to enforce contracts between the providers and the consumers…”
    Get full text
    Journal Article
  5. 5

    An Empirical Study of a Hybrid Code Clone Detection Approach on Java Byte Code by Ghosh, Aritra, Lee, Young

    ISSN: 2010-2283, 2251-3043
    Published: Singapore Global Science and Technology Forum 01.01.2017
    Published in GSTF International journal on computing (01.01.2017)
    “… We conduct a case study on two open source code Java projects such as Eclipse-ant and Eclipse-JDT core to show the effectiveness of our tool…”
    Get full text
    Journal Article
  6. 6

    Spider bird swarm algorithm with deep belief network for malicious JavaScript detection by Alex, Scaria, Dhiliphan Rajkumar, T

    ISSN: 0167-4048, 1872-6208
    Published: Amsterdam Elsevier Ltd 01.08.2021
    Published in Computers & security (01.08.2021)
    “… However, the flexibility of JavaScript made these applications more prone to attacks that induce malicious behaviors in the code…”
    Get full text
    Journal Article
  7. 7

    Malware Detection on Byte Streams of Hangul Word Processor Files by Jeong, Young-Seob, Woo, Jiyoung, Kang, Ah Reum

    ISSN: 2076-3417, 2076-3417
    Published: Basel MDPI AG 01.12.2019
    Published in Applied sciences (01.12.2019)
    “… The HWP file usually has one or more byte streams that are often used for the malicious actions…”
    Get full text
    Journal Article
  8. 8

    Combinatorial Validation Testing of Java Card Byte Code Verifiers by Calvagna, Andrea, Tramontana, Emiliano

    ISBN: 1479904058, 9781479904051
    ISSN: 1524-4547
    Published: IEEE 01.06.2013
    “…We present a technique to fully automate validation of a byte code verifier (BCV) implementation by testing…”
    Get full text
    Conference Proceeding
  9. 9

    Light-Weight, Inter-Procedural and Callback-Aware Resource Leak Detection for Android Apps by Wu, Tianyong, Liu, Jierui, Xu, Zhenbo, Guo, Chaorong, Zhang, Yanli, Yan, Jun, Zhang, Jian

    ISSN: 0098-5589, 1939-3520
    Published: New York IEEE 01.11.2016
    Published in IEEE transactions on software engineering (01.11.2016)
    “…Android devices include many embedded resources such as Camera, Media Player and Sensors. These resources require programmers to explicitly request and release…”
    Get full text
    Journal Article
  10. 10

    Selected tools for Java class and bytecode inspection in the educational environment by Dobravec, Tomaž

    ISSN: 2299-1093, 2299-1093
    Published: De Gruyter 01.01.2021
    Published in Open computer science (01.01.2021)
    “…Java is not only a modern, powerful, and frequently used programming language, but together with Java Virtual Machine it represents a novel dynamic approach of writing and executing computer programs…”
    Get full text
    Journal Article
  11. 11

    Byte-code scheduling of Java programs with branches for desktop grid by Laskowski, Eryk, Tudruj, Marek, Olejnik, Richard, Toursel, Bernard

    ISSN: 0167-739X, 1872-7115
    Published: Elsevier B.V 01.11.2007
    Published in Future generation computer systems (01.11.2007)
    “…) inside desktop grids is presented. It is composed of two stages. In the first stage, a clustering algorithm is applied to extended macro data flow graphs generated on the basis of the byte-code compiled for multithreaded Java programs…”
    Get full text
    Journal Article
  12. 12

    Creating and Developing a High-Throughput Covert Channel via Program Execution by Alhelal, Abdulrahman, Al-Khatib, Mohammad

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 01.01.2024
    Published in IEEE access (01.01.2024)
    “… This paper introduces a high-performance implementation of a covert channel that leverages Java exception handling during program execution…”
    Get full text
    Journal Article
  13. 13

    Software Components Compatibility Verification Based on Static Byte-Code Analysis by Jezek, Kamil, Holy, Lukas, Slezacek, Antonin, Brada, Premek

    ISSN: 1089-6503
    Published: IEEE 01.09.2013
    Published in EUROMICRO (IEEE Computer Society Press) (01.09.2013)
    “… of the components are out of their reach. In this work, we propose an approach that analyses the byte-code of Java classes to reconstruct the mutual dependencies of respective components first…”
    Get full text
    Conference Proceeding
  14. 14

    Safe uniform proxies for Java by Eugster, Patrick

    ISSN: 0167-6423, 1872-7964
    Published: Elsevier B.V 01.09.2013
    Published in Science of computer programming (01.09.2013)
    “… 1.3, Java has supported the concept of a dynamic proxy. Such an object conforms to a set of types specified by the program and can be used wherever an expression of any of these types is expected, yet it reifies invocations performed…”
    Get full text
    Journal Article
  15. 15

    Big Code != Big Vocabulary: Open-Vocabulary Models for Source Code by Karampatsis, Rafael-Michael, Babii, Hlib, Robbes, Romain, Sutton, Charles, Janes, Andrea

    ISSN: 1558-1225
    Published: ACM 01.10.2020
    “…Statistical language modeling techniques have successfully been applied to large source code corpora, yielding a variety of new software development tools, such as tools for code suggestion, improving…”
    Get full text
    Conference Proceeding
  16. 16

    Security monitor inlining and certification for multithreaded Java by DAM, MADS, JACOBS, BART, LUNDBLAD, ANDREAS, PIESSENS, FRANK

    ISSN: 0960-1295, 1469-8072, 1469-8072
    Published: Cambridge, UK Cambridge University Press 01.03.2015
    “…Security monitor inlining is a technique for security policy enforcement whereby monitor functionality is injected into application code in the style of aspect-oriented programming…”
    Get full text
    Journal Article
  17. 17

    Enhancing quality of code smell detection on java byte code by Ghosh, Aritra

    ISBN: 1339394545, 9781339394541
    Published: ProQuest Dissertations & Theses 01.01.2015
    “…A software clone occurs when two code fragments are identical to each other in the source code…”
    Get full text
    Dissertation
  18. 18

    JavaScript Dead Code Identification, Elimination, and Empirical Assessment by Malavolta, Ivano, Nirghin, Kishan, Scoccia, Gian Luca, Romano, Simone, Lombardi, Salvatore, Scanniello, Giuseppe, Lago, Patricia

    ISSN: 0098-5589, 1939-3520
    Published: New York IEEE 01.07.2023
    Published in IEEE transactions on software engineering (01.07.2023)
    “…Web apps are built by using a combination of HTML, CSS, and JavaScript. While building modern web apps, it is common practice to make use of third-party libraries and frameworks, as to improve developers' productivity and code quality…”
    Get full text
    Journal Article
  19. 19

    Java archives search engine using byte code as information source by Karnalim, Oscar, Mandala, Rila

    ISBN: 1479981753, 9781479981755
    Published: IEEE 01.11.2014
    “… In this research, a search engine for Java archives that uses byte code (compiled code for Java Archive…”
    Get full text
    Conference Proceeding
  20. 20

    Generating control flow graph from Java card byte code by Amine, Achkar, Mohammed, Benattou, Jean-Louis, Lanet

    ISSN: 2327-185X
    Published: IEEE 01.10.2014
    “… from the byte code of java-card applications…”
    Get full text
    Conference Proceeding