JavaScript provides the technological foundation of Web 2.0 applications. AJAX (Asynchronous JavaScript And XML) applications have received wide-spread attention as a new way to develop highly interactive web applicat...
详细信息
JavaScript provides the technological foundation of Web 2.0 applications. AJAX (Asynchronous JavaScript And XML) applications have received wide-spread attention as a new way to develop highly interactive web applications. Breaking with the complete-page-reload paradigm of traditional web applications, AJAX applications rival desktop applications in their look-and-feel. But AJAX places a high burden on a web developer requiring extensive JavaScript knowledge as well as other advanced client-side technologies. In this paper, we introduce a technique that allows a developer to implement an application in Java or *** language and then automatically cross-compile it to an AJAX-enabled web application. Published by Elsevier B.V.
Java programs are compiled into a platform in dependent byte code format. Much of the information contained in the source code is retained in the byte code. Consequently reverse engineering becomes much easier. Severa...
详细信息
ISBN:
(纸本)9781424405039
Java programs are compiled into a platform in dependent byte code format. Much of the information contained in the source code is retained in the byte code. Consequently reverse engineering becomes much easier. Several software protection techniques have been developed, of which, code obfuscation seems to be a promising one. In this paper, two new byte code obfuscation techniques have been evolved. These techniques involve applying obfuscating transformations to the Java byte code. These techniques prevent automatic software analysis tools, De-compilers, from producing correct source code by introducing syntax and semantic errors in the generated source code. The proposed techniques arc applied on sample Java class files to examine the effectiveness of the techniques in impeding reverse engineering. The results reveal the erroneous codes generated by the tested de-compilers.
Reconfigurable hardware will be used in many future embedded applications. Since most of these embedded systems will be temporarily or permanently connected to a network, the possibility to reload parts of the applica...
详细信息
ISBN:
(纸本)0769518702
Reconfigurable hardware will be used in many future embedded applications. Since most of these embedded systems will be temporarily or permanently connected to a network, the possibility to reload parts of the application at run time arises. In the 90ies it was recognized, that the huge variety of processors would lead to a tremendous amount of binaries for the same piece of software. For the hardware parts of an embedded system, the situation today is even worse. The java approach based on a java virtual machine (JVM) was invented to solve the problem for software. In this paper, we show how the hardware parts of an embedded system can be implemented in a hardware byte code, which can be interpreted using a virtual hardware machine running on an arbitrary FPGA. Our results show that this approach is feasible and that it leads to fast, portable and reconfigurable designs, which run on any programmable target architecture.
Information from computer programs can be extracted from its source code, external documentation, and compiled code. Although compiled code is an assured information source which is always exists in published computer...
详细信息
ISBN:
(纸本)9781479979967
Information from computer programs can be extracted from its source code, external documentation, and compiled code. Although compiled code is an assured information source which is always exists in published computer programs, it is seldom used by the existing search engines since some reverse engineering tasks are needed. In this research, a search engine for Java archives that uses byte code (compiled code for Java Archive) as its information source is developed. It enables user to search within a collection of Java Archives without relying with source code and external documentation. Compared with Penta and FindJar [2][7], A novel term extraction process beyond the file and class name is proposed, which includes field name, method name, string literal used in program, program flow weighting, and method expansion. Exclusive tokenization, stopping, and stemming are also implemented to improve effectiveness. Based on evaluation, it has a fairly good effectiveness although it may vary based on terms stored on index. Its effectiveness is higher than FindJar main features reimplementation which indicates that detailed compiled code has positive influences in computer programs search engine. Efficiency depends on how many terms stored on index and how many process used at certain step.
Reconfigurable hardware will be used in many future embedded applications. Since most of these embedded systems will be temporarily or permanently connected to a network, the possibility to reload parts of the applica...
详细信息
ISBN:
(纸本)9780769518701
Reconfigurable hardware will be used in many future embedded applications. Since most of these embedded systems will be temporarily or permanently connected to a network, the possibility to reload parts of the application at run time arises. In the 90ies it was recognized, that the huge variety of processors would lead to a tremendous amount of binaries for the same piece of software. For the hardware parts of an embedded system, the situation today is even worse. The java approach based on a java virtual machine (JVM) was invented to solve the problem for software. In this paper, we show how the hardware parts of an embedded system can be implemented in a hardware byte code, which can be interpreted using a virtual hardware machine running on an arbitrary FPGA. Our results show that this approach is feasible and that it leads to fast, portable and reconfigurable designs, which run on any programmable target architecture.
In a virtual machine interpreter, the code for each virtual machine instruction has similarities to code for other instructions. We present an interpreter generator that takes simple virtual machine instruction descri...
详细信息
In a virtual machine interpreter, the code for each virtual machine instruction has similarities to code for other instructions. We present an interpreter generator that takes simple virtual machine instruction descriptions as input and generates C code for processing the instructions in several ways: execution, virtual machine code generation, disassembly, tracing, and profiling. The generator is designed to support efficient interpreters: it supports threaded code, caching the top-of-stack item in a register, combining simple instructions into superinstructions, and other optimizations. We have used the generator to create interpreters for Forth and Java. The resulting interpreters are faster than other interpreters for the same languages and they are typically 2-10 times slower than code produced by native-code compilers. We also present results for the effects of the individual optimizations supported by the generator. Copyright (C) 2002 John Wiley Sons, Ltd.
Security aware multimedia mobility is crucial for the further progress of ubiquitous environment. Java has been promising in view of multimedia mobile features and easy treating, but this lacks simplicity in language ...
详细信息
ISBN:
(纸本)9789806560680
Security aware multimedia mobility is crucial for the further progress of ubiquitous environment. Java has been promising in view of multimedia mobile features and easy treating, but this lacks simplicity in language processing and platform organization. This has resulted in the saturation of increasing the overall performance of ubiquitous network. On the other hand, user security has been really threatened due to diversified open access to the ubiquitous network, while the diversity from small devices to large machines brings about easy access anytime anywhere. Thus, ever growing ubiquitous community makes overall demands for security, speed, and power consciousness in processing large quantity of multimedia data. The key technology to answer these requirements will be a single VLSI (very large scale integration) chip processor and its software support system, We have exploited the H/S (hardware/software) codesign of a hardware cryptography-embedded multimedia mobile processor and its language processing. The processor named HCgorilla is a devised interpreter type Java CPU (central processing unit) with less power and higher throughput for multimedia cryptographic streaming. The language processing for HCgorilla includes a Java interface and parallelizing compilers. We describe in this article our recent results about the overall system of HCgorilla.
We describe a platform for the portable and secure execution of mobile agents written in various interpreted languages on top of a common run-time core. Agents may migrate at any point in their execution, fully preser...
详细信息
ISBN:
(纸本)3540628037
We describe a platform for the portable and secure execution of mobile agents written in various interpreted languages on top of a common run-time core. Agents may migrate at any point in their execution, fully preserving their state, and may exchange messages with other agents. One system may contain many virtual places, each establishing a domain of logically related services under a common security policy governing all agents at this place. Agents are equipped with allowances limiting their resource accesses, both globally per agent lifetime and locally per place. We discuss aspects of this architecture and report about ongoing work.
This paper introduces a new virtual machine for sensor networks and small embedded devices which has been designed with efficient resource usage and an event-driven programming model in mind. The virtual machine runs ...
详细信息
ISBN:
(纸本)9781424443093
This paper introduces a new virtual machine for sensor networks and small embedded devices which has been designed with efficient resource usage and an event-driven programming model in mind. The virtual machine runs on 8, 16, and 32-bit micro-controllers with as little as 4 KB of volatile and 32 KB of non-volatile memory Our virtual machine is not bound to a single high-level programming language, but targets all strictly-typed programming languages. In conjunction with the virtual machine, we also present our development tool chain for Java and C#, and discuss the effects of our virtual machine design on these high-level languages. We also present a compact load-file format which allows applications to be stream-linked in a way that minimizes memory usage and bandwidth. All presented components are part of the IBM Mote Runner, a run-time environment for wireless sensor networks.
The field of Computer Science has been solving issues related to the domains of data, information, knowledge and intelligence, obviously in a chronological manner. Among these the issue of Symbol Recognition has recei...
详细信息
暂无评论