Search Results - java (byte OR byty) codes
-
1
Finite‐state model extraction and visualization from Java program execution
ISSN: 0038-0644, 1097-024XPublished: Bognor Regis Wiley Subscription Services, Inc 01.02.2021Published in Software, practice & experience (01.02.2021)“… In this article, we use the term model extraction to refer to the construction of a finite‐state model from an execution trace of a Java program and a set of key attributes, that is, a subset of the fields of the objects in the program execution…”
Get full text
Journal Article -
2
Open-Source Java Code Coverage using Source and Byte Code Instruments: An Experimental Analysis
ISSN: 1303-5150Published: Bornova Izmir NeuroQuantology 01.01.2022Published in NeuroQuantology (01.01.2022)“…The software testers inherently face the challenges of code coverage while designing test cases…”
Get full text
Journal Article -
3
Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques
ISSN: 1558-058XPublished: IEEE 01.04.2018Published in SoutheastCon 2018 (01.04.2018)“… problems. Other methods of finding software vulnerabilities automatically are required. This proof-of-concept study applied natural language processing on Java byte code to locate…”
Get full text
Conference Proceeding -
4
How Java APIs break – An empirical study
ISSN: 0950-5849, 1873-6025Published: Amsterdam Elsevier B.V 01.09.2015Published in Information and software technology (01.09.2015)“… For Java programs, partial upgrades create additional interesting problems as the compiler and the virtual machine use different rule sets to enforce contracts between the providers and the consumers…”
Get full text
Journal Article -
5
An Empirical Study of a Hybrid Code Clone Detection Approach on Java Byte Code
ISSN: 2010-2283, 2251-3043Published: Singapore Global Science and Technology Forum 01.01.2017Published in GSTF International journal on computing (01.01.2017)“… We conduct a case study on two open source code Java projects such as Eclipse-ant and Eclipse-JDT core to show the effectiveness of our tool…”
Get full text
Journal Article -
6
Spider bird swarm algorithm with deep belief network for malicious JavaScript detection
ISSN: 0167-4048, 1872-6208Published: Amsterdam Elsevier Ltd 01.08.2021Published in Computers & security (01.08.2021)“… However, the flexibility of JavaScript made these applications more prone to attacks that induce malicious behaviors in the code…”
Get full text
Journal Article -
7
Malware Detection on Byte Streams of Hangul Word Processor Files
ISSN: 2076-3417, 2076-3417Published: Basel MDPI AG 01.12.2019Published in Applied sciences (01.12.2019)“… The HWP file usually has one or more byte streams that are often used for the malicious actions…”
Get full text
Journal Article -
8
Combinatorial Validation Testing of Java Card Byte Code Verifiers
ISBN: 1479904058, 9781479904051ISSN: 1524-4547Published: IEEE 01.06.2013Published in 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (01.06.2013)“…We present a technique to fully automate validation of a byte code verifier (BCV) implementation by testing…”
Get full text
Conference Proceeding -
9
Light-Weight, Inter-Procedural and Callback-Aware Resource Leak Detection for Android Apps
ISSN: 0098-5589, 1939-3520Published: New York IEEE 01.11.2016Published in IEEE transactions on software engineering (01.11.2016)“…Android devices include many embedded resources such as Camera, Media Player and Sensors. These resources require programmers to explicitly request and release…”
Get full text
Journal Article -
10
Selected tools for Java class and bytecode inspection in the educational environment
ISSN: 2299-1093, 2299-1093Published: De Gruyter 01.01.2021Published in Open computer science (01.01.2021)“…Java is not only a modern, powerful, and frequently used programming language, but together with Java Virtual Machine it represents a novel dynamic approach of writing and executing computer programs…”
Get full text
Journal Article -
11
Byte-code scheduling of Java programs with branches for desktop grid
ISSN: 0167-739X, 1872-7115Published: Elsevier B.V 01.11.2007Published in Future generation computer systems (01.11.2007)“…) inside desktop grids is presented. It is composed of two stages. In the first stage, a clustering algorithm is applied to extended macro data flow graphs generated on the basis of the byte-code compiled for multithreaded Java programs…”
Get full text
Journal Article -
12
Creating and Developing a High-Throughput Covert Channel via Program Execution
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 01.01.2024Published in IEEE access (01.01.2024)“… This paper introduces a high-performance implementation of a covert channel that leverages Java exception handling during program execution…”
Get full text
Journal Article -
13
Software Components Compatibility Verification Based on Static Byte-Code Analysis
ISSN: 1089-6503Published: IEEE 01.09.2013Published in EUROMICRO (IEEE Computer Society Press) (01.09.2013)“… of the components are out of their reach. In this work, we propose an approach that analyses the byte-code of Java classes to reconstruct the mutual dependencies of respective components first…”
Get full text
Conference Proceeding -
14
Safe uniform proxies for Java
ISSN: 0167-6423, 1872-7964Published: Elsevier B.V 01.09.2013Published in Science of computer programming (01.09.2013)“… 1.3, Java has supported the concept of a dynamic proxy. Such an object conforms to a set of types specified by the program and can be used wherever an expression of any of these types is expected, yet it reifies invocations performed…”
Get full text
Journal Article -
15
Big Code != Big Vocabulary: Open-Vocabulary Models for Source Code
ISSN: 1558-1225Published: ACM 01.10.2020Published in 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE) (01.10.2020)“…Statistical language modeling techniques have successfully been applied to large source code corpora, yielding a variety of new software development tools, such as tools for code suggestion, improving…”
Get full text
Conference Proceeding -
16
Security monitor inlining and certification for multithreaded Java
ISSN: 0960-1295, 1469-8072, 1469-8072Published: Cambridge, UK Cambridge University Press 01.03.2015Published in Mathematical structures in computer science (01.03.2015)“…Security monitor inlining is a technique for security policy enforcement whereby monitor functionality is injected into application code in the style of aspect-oriented programming…”
Get full text
Journal Article -
17
Enhancing quality of code smell detection on java byte code
ISBN: 1339394545, 9781339394541Published: ProQuest Dissertations & Theses 01.01.2015“…A software clone occurs when two code fragments are identical to each other in the source code…”
Get full text
Dissertation -
18
JavaScript Dead Code Identification, Elimination, and Empirical Assessment
ISSN: 0098-5589, 1939-3520Published: New York IEEE 01.07.2023Published in IEEE transactions on software engineering (01.07.2023)“…Web apps are built by using a combination of HTML, CSS, and JavaScript. While building modern web apps, it is common practice to make use of third-party libraries and frameworks, as to improve developers' productivity and code quality…”
Get full text
Journal Article -
19
Java archives search engine using byte code as information source
ISBN: 1479981753, 9781479981755Published: IEEE 01.11.2014Published in 2014 International Conference on Data and Software Engineering (ICODSE) (01.11.2014)“… In this research, a search engine for Java archives that uses byte code (compiled code for Java Archive…”
Get full text
Conference Proceeding -
20
Generating control flow graph from Java card byte code
ISSN: 2327-185XPublished: IEEE 01.10.2014Published in Colloquium in Information Science and Technology (Print) (01.10.2014)“… from the byte code of java-card applications…”
Get full text
Conference Proceeding

