咨询与建议

限定检索结果

文献类型

  • 43 篇 期刊文献
  • 38 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 83 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78 篇 工学
    • 69 篇 计算机科学与技术...
    • 43 篇 软件工程
    • 11 篇 电气工程
    • 4 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物医学工程(可授...
  • 3 篇 理学
    • 3 篇 数学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 83 篇 java bytecode
  • 13 篇 static analysis
  • 9 篇 abstract interpr...
  • 8 篇 java
  • 6 篇 decompilation
  • 6 篇 verification
  • 5 篇 termination
  • 5 篇 information flow
  • 4 篇 languages
  • 4 篇 java virtual mac...
  • 4 篇 reverse engineer...
  • 4 篇 theory
  • 4 篇 security
  • 4 篇 low-level langua...
  • 3 篇 instrumentation
  • 3 篇 software piracy
  • 3 篇 embedded systems
  • 3 篇 clone detection
  • 3 篇 program transfor...
  • 3 篇 software protect...

机构

  • 4 篇 univ complutense...
  • 3 篇 philipps univ ma...
  • 3 篇 tech univ madrid...
  • 2 篇 friedrich schill...
  • 2 篇 univ complutense...
  • 2 篇 consejo nacl inv...
  • 2 篇 univ complutense...
  • 2 篇 univ arizona dep...
  • 2 篇 icfai univ fac s...
  • 2 篇 rhein westfal th...
  • 2 篇 tech univ darmst...
  • 2 篇 univ pisa dipart...
  • 2 篇 tech univ madrid...
  • 2 篇 brno university ...
  • 2 篇 hangzhou dianzi ...
  • 2 篇 univ verona i-37...
  • 2 篇 univ verona dipa...
  • 2 篇 cooperat univ ge...
  • 1 篇 queens univ dept...
  • 1 篇 korea adv inst s...

作者

  • 6 篇 gomez-zamalloa m...
  • 6 篇 albert elvira
  • 5 篇 genaim samir
  • 5 篇 spoto fausto
  • 3 篇 puebla german
  • 3 篇 bockisch christo...
  • 2 篇 mueller peter
  • 2 篇 kumar krishan
  • 2 篇 monperrus martin
  • 2 篇 yang jiazha
  • 2 篇 kaur prabhpreet
  • 2 篇 zanardini d.
  • 2 篇 taentzer gabriel...
  • 2 篇 baudry benoit
  • 2 篇 falcone ylies
  • 2 篇 yu dongjin
  • 2 篇 orlov michael
  • 2 篇 otto carsten
  • 2 篇 de francesco nic...
  • 2 篇 neufeld daniel

语言

  • 69 篇 英文
  • 14 篇 其他
检索条件"主题词=Java Bytecode"
83 条 记 录,以下是31-40 订阅
排序:
java bytecode verification for secure information flow
收藏 引用
ACM SIGPLAN NOTICES 2003年 第12期38卷 20-27页
作者: Avvenuti, M Bernardeschi, C De Francesco, N Univ Pisa Dipartimento Ingn Informaz I-56126 Pisa Italy
Security of java programs is important as they can be executed in different platforms. This paper addresses the problem of secure information flow for java bytecode. In information flow analysis one wishes to check if... 详细信息
来源: 评论
From CIL to java bytecode: Semantics-based translation for static analysis leveraging
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2020年 第0期191卷 102392-000页
作者: Ferrara, Pietro Cortesi, Agostino Spot, Fausto JuliaSoft Verona Italy Univ Ca Foscari Venezia Venice Italy Univ Verona Verona Italy
A formal translation of CIL (i.e., .Net) bytecode into java bytecode is introduced and proved sound with respect to the language semantics. The resulting code is then analyzed with Julia, an industrial static analyzer... 详细信息
来源: 评论
An Evaluation of Dynamic java bytecode Software Watermarking Algorithms
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2016年 第7期10卷 147-156页
作者: Kumar, Krishan Kehar, Viney Kaur, Prabhpreet ICFAI Univ Fac Sci & Technol Baddi HP India NIT Dept Comp Sci & Engn Hamirpur India Guru Nanak Dev Univ Dept Comp Sci & Technol Amritsar Punjab India
In the era of Information technology, Software Piracy and security has become one of the most important issue in world. Numbers of techniques have been proposed and implemented to prevent software piracy and illegal m... 详细信息
来源: 评论
Checking security of java bytecode by abstract interpretation  02
Checking security of Java bytecode by abstract interpretatio...
收藏 引用
Proceedings of the 2002 ACM symposium on Applied computing
作者: Roberto Barbuti Cinzia Bernardeschi Nicoletta De Francesco Università di Pisa Corso Italia 40 56100 Pisa Italy Università di Pisa Via Diotisalvi 2 56100 Pisa Italy
We present a method to certify a subset of the java bytecode, with respect to security. The method is based on abstract interpretation of the operational semantics of the language. We define a concrete small-step enha... 详细信息
来源: 评论
Decompiling Boolean Expressions from javabytecode  16
Decompiling Boolean Expressions from Java™ Bytecode
收藏 引用
9th India Software Engineering Conference (ISEC)
作者: Nanda, Mangala Gowri Arun-Kumar, S. IBM Res Bangalore Karnataka India Indian Inst Technol Delhi India
java bytecode obfuscates the original structure of a java expression in the source code. So a simple expression such as (c1 I I c2) or (cl && c2) may be captured in the bytecode in 4 different ways (as shown i... 详细信息
来源: 评论
Detecting java Code Clones Based on bytecode Sequence Alignment
收藏 引用
IEEE ACCESS 2019年 7卷 22421-22433页
作者: Yu, Dongjin Yang, Jiazha Chen, Xin Chen, Jie Hangzhou Dianzi Univ Sch Comp Sci & Technol Hangzhou 310018 Zhejiang Peoples R China
When the source code is copied and pasted or modified, there will be a lot of identical or similar code snippets in the software system, which are called code clones. Because code clones are believed to result in unde... 详细信息
来源: 评论
A software tool for semi-automatic gridification of resource-intensive java bytecodes and its application to ray tracing and sequence alignment
收藏 引用
ADVANCES IN ENGINEERING SOFTWARE 2011年 第4期42卷 172-186页
作者: Mateos, Cristian Zunino, Alejandro Hirsch, Matias Fernandez, Mariano Campo, Marcelo ISISTAN Res Inst Buenos Aires DF Argentina UNICEN Univ Tandil Buenos Aires DF Argentina Consejo Nacl Invest Cient & Tecn RA-1033 Buenos Aires DF Argentina
Computational Grids deliver the necessary computational infrastructure to perform resource-intensive computations such as the ones that solve the problems scientists are facing today. Exploiting Computational Grids co... 详细信息
来源: 评论
Negative Effects of bytecode Instrumentation on java Source Code Coverage  23
Negative Effects of Bytecode Instrumentation on Java Source ...
收藏 引用
23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER)
作者: Tengeri, David Horvath, Ferenc Beszedes, Arpad Gergely, Tamas Gyimothy, Tibor Univ Szeged Dept Software Engn Szeged Hungary
Code coverage measurement is an important element in white-box testing, both in industrial practice and academic research. Other related areas are highly dependent on code coverage as well, including test case generat... 详细信息
来源: 评论
Detecting java Code Clones with Multi-Granularities Based on bytecode  41
Detecting Java Code Clones with Multi-Granularities Based on...
收藏 引用
41st IEEE Annual Computer Software and Applications Conference (COMPSAC)
作者: Yu, Dongjin Wang, Jie Wu, Qing Yang, Jiazha Wang, Jiaojiao Yang, Wei Yan, Wei Hangzhou Dianzi Univ Sch Comp Sci & Technol Hangzhou Zhejiang Peoples R China Zhejiang Topcheer Informat Technol Co Ltd Zhejiang Inst Comp Technol Hangzhou Zhejiang Peoples R China Zhejiang Inst Sci & Technol Informat Hangzhou Zhejiang Peoples R China
Sequences of duplicate code, either with or without modification, are known as code clones or just clones. Code clones are generally considered undesirable for a number of reasons, although they can offer some conveni... 详细信息
来源: 评论
java decompiler diversity and its application to meta-decompilation
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2020年 168卷 110645-110645页
作者: Harrand, Nicolas Soto-Valero, Cesar Monperrus, Martin Baudry, Benoit KTH Royal Inst Technol SE-10044 Stockholm Sweden
During compilation from java source code to bytecode, some information is irreversibly lost. In other words, compilation and decompilation of java code is not symmetric. Consequently, decompilation, which aims at prod... 详细信息
来源: 评论