咨询与建议

限定检索结果

文献类型

  • 43 篇 期刊文献
  • 38 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 83 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78 篇 工学
    • 69 篇 计算机科学与技术...
    • 43 篇 软件工程
    • 11 篇 电气工程
    • 4 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物医学工程(可授...
  • 3 篇 理学
    • 3 篇 数学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 83 篇 java bytecode
  • 13 篇 static analysis
  • 9 篇 abstract interpr...
  • 8 篇 java
  • 6 篇 decompilation
  • 6 篇 verification
  • 5 篇 termination
  • 5 篇 information flow
  • 4 篇 languages
  • 4 篇 java virtual mac...
  • 4 篇 reverse engineer...
  • 4 篇 theory
  • 4 篇 security
  • 4 篇 low-level langua...
  • 3 篇 instrumentation
  • 3 篇 software piracy
  • 3 篇 embedded systems
  • 3 篇 clone detection
  • 3 篇 program transfor...
  • 3 篇 software protect...

机构

  • 4 篇 univ complutense...
  • 3 篇 philipps univ ma...
  • 3 篇 tech univ madrid...
  • 2 篇 friedrich schill...
  • 2 篇 univ complutense...
  • 2 篇 consejo nacl inv...
  • 2 篇 univ complutense...
  • 2 篇 univ arizona dep...
  • 2 篇 icfai univ fac s...
  • 2 篇 rhein westfal th...
  • 2 篇 tech univ darmst...
  • 2 篇 univ pisa dipart...
  • 2 篇 tech univ madrid...
  • 2 篇 brno university ...
  • 2 篇 hangzhou dianzi ...
  • 2 篇 univ verona i-37...
  • 2 篇 univ verona dipa...
  • 2 篇 cooperat univ ge...
  • 1 篇 queens univ dept...
  • 1 篇 korea adv inst s...

作者

  • 6 篇 gomez-zamalloa m...
  • 6 篇 albert elvira
  • 5 篇 genaim samir
  • 5 篇 spoto fausto
  • 3 篇 puebla german
  • 3 篇 bockisch christo...
  • 2 篇 mueller peter
  • 2 篇 kumar krishan
  • 2 篇 monperrus martin
  • 2 篇 yang jiazha
  • 2 篇 kaur prabhpreet
  • 2 篇 zanardini d.
  • 2 篇 taentzer gabriel...
  • 2 篇 baudry benoit
  • 2 篇 falcone ylies
  • 2 篇 yu dongjin
  • 2 篇 orlov michael
  • 2 篇 otto carsten
  • 2 篇 de francesco nic...
  • 2 篇 neufeld daniel

语言

  • 69 篇 英文
  • 14 篇 其他
检索条件"主题词=Java Bytecode"
83 条 记 录,以下是21-30 订阅
Activating Mobile Agents from Contactless Smart Cards through a java bytecode Extractor
Activating Mobile Agents from Contactless Smart Cards throug...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Lee, Jonathan Lee, Shin-Jie Chen, Hsi-Min Liang, Jeremy Wu, Chia-Ling Wang, Yao-Chiang Natl Cent Univ Dept Comp Sci & Informat Engn Jhongli Taiwan
As mobile agents reside on on-board units or mobile devices and act on behalf of drivers, it imposes a strong demand to devise mechanisms for protecting the algorithms that are exclusively coded in mobile agents for d... 详细信息
来源: 评论
Removing Useless Variables in Cost Analysis of java bytecode  08
Removing Useless Variables in Cost Analysis of Java Bytecode
收藏 引用
23rd Annual ACM Symposium on Applied Computing
作者: Albert, E. Arenas, P. Genaim, S. Puebla, G. Zanardini, D. Univ Complutense Madrid DSIC E-28040 Madrid Spain Tech Univ Madrid CLIP E-28660 Madrid Spain
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in order to decide whether to reject mobil... 详细信息
来源: 评论
The Strengths and Behavioral Quirks of java bytecode Decompilers  19
The Strengths and Behavioral Quirks of Java Bytecode Decompi...
收藏 引用
19th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM)
作者: Harrand, Nicolas Soto-Valero, Cesar Monperrus, Martin Baudry, Benoit KTH Royal Inst Technol Stockholm Sweden
During compilation from java source code to byte-code, some information is irreversibly lost. In other words, compilation and decompilation of java code is not symmetric. Consequently, the decompilation process, which... 详细信息
来源: 评论
Heap Space Analysis for java bytecode  07
Heap Space Analysis for Java Bytecode
收藏 引用
International Symposium on Memory Management
作者: Albert, Elvira Genaim, Samir Gomez-Zamalloa, Miguel Univ Complutense Madrid DSIC E-28040 Madrid Spain Tech Univ Madrid CLIP Madrid Spain
This article presents a heap space analysis for (sequential) java bytecode. The analysis generates heap space cost relations which define at compile-time the heap consumption of a program as a function of its data siz... 详细信息
来源: 评论
A java bytecode Metamodel for Composable Program Analyses
A Java Bytecode Metamodel for Composable Program Analyses
收藏 引用
Conference on Software Technologies - Applications and Foundations (STAF)
作者: Yildiz, Bugra M. Bockisch, Christoph Rensink, Arend Aksit, Mehmet Univ Twente Enschede Netherlands Philipps Univ Marburg Marburg Germany
Program analyses are an important tool to check if a system fulfills its specification. A typical implementation strategy for program analyses is to use an imperative, general-purpose language like java;and access the... 详细信息
来源: 评论
Finding Source Code Clones in Intermediate Representations of java bytecode  17
Finding Source Code Clones in Intermediate Representations o...
收藏 引用
IEEE 17th International Workshop on Software Clones (IWSC)
作者: Schaefer, Andre Heinze, Thomas S. Amme, Wolfram Friedrich Schiller Univ Jena Jena Germany Cooperat Univ Gera Eisenach Gera Germany
Copied, reused and modified program code is a common phenomena in software development. As the resulting code clones are often not labeled as such and their proper detection is crucial to software quality and re-engin... 详细信息
来源: 评论
Modular Termination Proofs of Recursive java bytecode Programs by Term Rewriting
Modular Termination Proofs of Recursive Java Bytecode Progra...
收藏 引用
22nd International Conference on Rewriting Techniques and Applications(RTA) held as part of Federated Conference on Rewriting, Deduction, and Programming (RDP)
作者: Brockschmidt, Marc Otto, Carsten Giesl, Juergen Rhein Westfal TH Aachen LuFG Informat 2 Aachen Germany
In [5, 15] we presented an approach to prove termination of non-recursive java bytecode (JBC) programs automatically. Here, JBC programs are first transformed to finite termination graphs which represent all possible ... 详细信息
来源: 评论
Test Case Generation for java bytecode Programs Annotated with BML Specifications  5
Test Case Generation for Java Bytecode Programs Annotated wi...
收藏 引用
5th International Conference on Multimedia Computing and Systems (ICMCS)
作者: Achour, Safaa Benattou, Mohammed Ibn Tofail Univ LASTID Lab Fac Sci Kenitra Morocco
The work presented in this paper extends an existing constraint model defined to automatically generate test inputs for java bytecode programs. We propose to consider also BML specifications for generating valid test ... 详细信息
来源: 评论
java bytecode verification for secure information flow
收藏 引用
ACM SIGPLAN NOTICES 2003年 第12期38卷 20-27页
作者: Avvenuti, M Bernardeschi, C De Francesco, N Univ Pisa Dipartimento Ingn Informaz I-56126 Pisa Italy
Security of java programs is important as they can be executed in different platforms. This paper addresses the problem of secure information flow for java bytecode. In information flow analysis one wishes to check if... 详细信息
来源: 评论
Checking secure information flow in java bytecode by code transformation and standard bytecode verification
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2004年 第13期34卷 1225-1255页
作者: Bernardeschi, C De Francesco, N Lettieri, G Martini, L Univ Pisa Dipartimento Ingn Informaz I-56100 Pisa Italy
A method is presented for checking secure information flow in java bytecode, assuming a multilevel security policy that assigns security levels to the objects. The method exploits the type-level abstract interpretatio... 详细信息
来源: 评论