咨询与建议

限定检索结果

文献类型

  • 43 篇 期刊文献
  • 38 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 83 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78 篇 工学
    • 69 篇 计算机科学与技术...
    • 43 篇 软件工程
    • 11 篇 电气工程
    • 4 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物医学工程(可授...
  • 3 篇 理学
    • 3 篇 数学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 83 篇 java bytecode
  • 13 篇 static analysis
  • 9 篇 abstract interpr...
  • 8 篇 java
  • 6 篇 decompilation
  • 6 篇 verification
  • 5 篇 termination
  • 5 篇 information flow
  • 4 篇 languages
  • 4 篇 java virtual mac...
  • 4 篇 reverse engineer...
  • 4 篇 theory
  • 4 篇 security
  • 4 篇 low-level langua...
  • 3 篇 instrumentation
  • 3 篇 software piracy
  • 3 篇 embedded systems
  • 3 篇 clone detection
  • 3 篇 program transfor...
  • 3 篇 software protect...

机构

  • 4 篇 univ complutense...
  • 3 篇 philipps univ ma...
  • 3 篇 tech univ madrid...
  • 2 篇 friedrich schill...
  • 2 篇 univ complutense...
  • 2 篇 consejo nacl inv...
  • 2 篇 univ complutense...
  • 2 篇 univ arizona dep...
  • 2 篇 icfai univ fac s...
  • 2 篇 rhein westfal th...
  • 2 篇 tech univ darmst...
  • 2 篇 univ pisa dipart...
  • 2 篇 tech univ madrid...
  • 2 篇 brno university ...
  • 2 篇 hangzhou dianzi ...
  • 2 篇 univ verona i-37...
  • 2 篇 univ verona dipa...
  • 2 篇 cooperat univ ge...
  • 1 篇 queens univ dept...
  • 1 篇 korea adv inst s...

作者

  • 6 篇 gomez-zamalloa m...
  • 6 篇 albert elvira
  • 5 篇 genaim samir
  • 5 篇 spoto fausto
  • 3 篇 puebla german
  • 3 篇 bockisch christo...
  • 2 篇 mueller peter
  • 2 篇 kumar krishan
  • 2 篇 monperrus martin
  • 2 篇 yang jiazha
  • 2 篇 kaur prabhpreet
  • 2 篇 zanardini d.
  • 2 篇 taentzer gabriel...
  • 2 篇 baudry benoit
  • 2 篇 falcone ylies
  • 2 篇 yu dongjin
  • 2 篇 orlov michael
  • 2 篇 otto carsten
  • 2 篇 de francesco nic...
  • 2 篇 neufeld daniel

语言

  • 69 篇 英文
  • 14 篇 其他
检索条件"主题词=java bytecode"
83 条 记 录,以下是1-10 订阅
Mutation Testing of java bytecode: A Model-Driven Approach  24
Mutation Testing of Java Bytecode: A Model-Driven Approach
收藏 引用
27th International Conference on Model Driven Engineering Languages and Systems (MODELS)
作者: Bockisch, Christoph Eren, Deniz Lehmann, Sascha Neufeld, Daniel Taentzer, Gabriele Philipps Univ Marburg Marburg Germany
Mutation testing is an approach to checking the robustness of test suites. The program code is slightly changed by mutations to inject bugs. A test suite is robust enough if it finds such bugs. Mutation testing tools ... 详细信息
来源: 评论
Abstract Interpretation of java bytecode in Sturdy  26
Abstract Interpretation of Java Bytecode in Sturdy
收藏 引用
26th ACM International Conference on Formal Techniques for java-like Programs (FTfJP)
作者: Marx, Stefan Erdweg, Sebastian JGU Mainz Mainz Germany
We develop a framework of definitional abstract interpreters for java bytecode in Sturdy. Specifically, we provide a generic interpreter that abstractly executes java bytecode but resorts to configurable analysis comp... 详细信息
来源: 评论
Finding Source Code Clones in Intermediate Representations of java bytecode  17
Finding Source Code Clones in Intermediate Representations o...
收藏 引用
IEEE 17th International Workshop on Software Clones (IWSC)
作者: Schaefer, Andre Heinze, Thomas S. Amme, Wolfram Friedrich Schiller Univ Jena Jena Germany Cooperat Univ Gera Eisenach Gera Germany
Copied, reused and modified program code is a common phenomena in software development. As the resulting code clones are often not labeled as such and their proper detection is crucial to software quality and re-engin... 详细信息
来源: 评论
MMT: Mutation Testing of java bytecode with Model Transformation
MMT: Mutation Testing of Java Bytecode with Model Transforma...
收藏 引用
ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS)
作者: Bockisch, Christoph Taentzer, Gabriele Neufeld, Daniel Philipps Univ Marburg Marburg Germany
Mutation testing is an approach to check the robustness of test suites. The program code is slightly changed by mutations to inject errors. A test suite is robust enough if it finds such errors. Tools for mutation tes... 详细信息
来源: 评论
From CIL to java bytecode: Semantics-based translation for static analysis leveraging
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2020年 第0期191卷 102392-000页
作者: Ferrara, Pietro Cortesi, Agostino Spot, Fausto JuliaSoft Verona Italy Univ Ca Foscari Venezia Venice Italy Univ Verona Verona Italy
A formal translation of CIL (i.e., .Net) bytecode into java bytecode is introduced and proved sound with respect to the language semantics. The resulting code is then analyzed with Julia, an industrial static analyzer... 详细信息
来源: 评论
A Comparative Analysis of Static and Dynamic java bytecode Watermarking Algorithms  50th
A Comparative Analysis of Static and Dynamic Java Bytecode W...
收藏 引用
50th Annual Convention of the Computer-Society-of-India (CSI) on Digital Life
作者: Kumar, Krishan Kaur, Prabhpreet ICFAI Univ Fac Sci & Technol Baddi HP India Gum Nanak Dev Univ Dept Comp Sci & Technol Amritsar Punjab India
Software piracy is one of the most serious issues confronted by software industry creating a huge number of dollars misfortune consistently to the product creating organizations. The worldwide income misfortune was as... 详细信息
来源: 评论
The Strengths and Behavioral Quirks of java bytecode Decompilers  19
The Strengths and Behavioral Quirks of Java Bytecode Decompi...
收藏 引用
19th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM)
作者: Harrand, Nicolas Soto-Valero, Cesar Monperrus, Martin Baudry, Benoit KTH Royal Inst Technol Stockholm Sweden
During compilation from java source code to byte-code, some information is irreversibly lost. In other words, compilation and decompilation of java code is not symmetric. Consequently, the decompilation process, which... 详细信息
来源: 评论
Vulnerabilities Constraint Based Analysis Approach for java bytecode Programs  6
Vulnerabilities Constraint Based Analysis Approach for Java ...
收藏 引用
6th International Conference on Multimedia Computing and Systems (ICMCS)
作者: Achour, Safaa Benattou, Mohammed Ibn Tofail Univ LASTID Lab Kenitra Morocco
The verification process of software is of growing importance as it helps to assure that an application is correctly built. However, an efficient verification method of implementation of an application should also rej... 详细信息
来源: 评论
A java bytecode Formalisation  1
收藏 引用
10th International Working Conference on Verified Software - Theories, Tools, and Experiments (VSTTE) held as Part of the Federated Logic Conference (FLoC)
作者: Czarnik, Patryk Chrzaszcz, Jacek Schubert, Aleksy Univ Warsaw Inst Informat Ul S Banacha 2 PL-02097 Warsaw Poland
This paper presents the first Coq formalisation of the full java bytecode instruction set and its semantics. The set of instructions is organised in a hierarchy depending on how the instructions deal with the runtime ... 详细信息
来源: 评论
A java bytecode Metamodel for Composable Program Analyses
收藏 引用
Conference on Software Technologies - Applications and Foundations (STAF)
作者: Yildiz, Bugra M. Bockisch, Christoph Rensink, Arend Aksit, Mehmet Univ Twente Enschede Netherlands Philipps Univ Marburg Marburg Germany
Program analyses are an important tool to check if a system fulfills its specification. A typical implementation strategy for program analyses is to use an imperative, general-purpose language like java;and access the... 详细信息
来源: 评论