Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Malte Mues, Falk Howar |
JDart: Dynamic Symbolic Execution for Java Bytecode (Competition Contribution). ![Search on Bibsonomy](Pics/bibsonomy.png) |
TACAS (2) ![In: Tools and Algorithms for the Construction and Analysis of Systems - 26th International Conference, TACAS 2020, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Dublin, Ireland, April 25-30, 2020, Proceedings, Part II, pp. 398-402, 2020, Springer, 978-3-030-45236-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Naitian Hu, Xingkong Ma, Fuqiang Lin, Bo Liu 0014, Tong Lu |
DexFus: An Android Obfuscation Technique Based on Dalvik Bytecode Translation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 419-431, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Vignesh S. Rao, Tarunkant Gupta, Saastha Vasan, Deepthi L. R |
PHPIL: Fuzzing the PHP Interpreter with Custom Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCNT ![In: 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020, Kharagpur, India, July 1-3, 2020, pp. 1-5, 2020, IEEE, 978-1-7281-6851-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Selin Sezer, Clemens Eyhoff, Wolfgang Prinz, Thomas Rose 0001 |
Exploiting Smart Contract Bytecode for Classification on Ethereum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PoEM Workshops ![In: Proceedings of the workshops co-organized with the 13th IFIP WG 8.1 working conference on the Practice of Enterprise Modelling (PoEM 2020), On-line (originally located in Riga, Latvia), November 26, 2020., pp. 11-22, 2020, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
17 | Muhammad Fakhrur Rozi, Sangwook Kim, Seiichi Ozawa |
Deep Neural Networks for Malicious JavaScript Detection Using Bytecode Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: 2020 International Joint Conference on Neural Networks, IJCNN 2020, Glasgow, United Kingdom, July 19-24, 2020, pp. 1-8, 2020, IEEE, 978-1-7281-6926-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Ahmet Çelik, Pengyu Nie 0001, Christopher J. Rossbach, Milos Gligoric 0001 |
Design, implementation, and application of GPU-based Java bytecode interpreters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Program. Lang. ![In: Proc. ACM Program. Lang. 3(OOPSLA), pp. 177:1-177:28, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Yang Zhang 0037, Shuai Shao, Huan Liu, Jing Qiu 0002, Dongwen Zhang, Guanghua Zhang |
Refactoring Java Programs for Customizable Locks Based on Bytecode Transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 66292-66303, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Yuntae Kim, Dohyun Pak, JongHyup Lee |
ScanAT: Identification of Bytecode-Only Smart Contracts With Multiple Attribute Tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 98669-98683, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Dongjin Yu, Jiazha Yang, Xin Chen 0032, Jie Chen 0060 |
Detecting Java Code Clones Based on Bytecode Sequence Alignment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 22421-22433, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Javier Cabrera-Arteaga, Martin Monperrus, Benoit Baudry |
Scalable Comparison of JavaScript V8 Bytecode Traces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1910.03478, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Nicolas Harrand, César Soto-Valero, Martin Monperrus, Benoit Baudry |
The Strengths and Behavioral Quirks of Java Bytecode Decompilers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1908.06895, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Safeeullah Soomro, Mohammad Riyaz Belgaum, Zainab Alansari, Mahdi H. Miraz |
A Framework for Debugging Java Programs in a Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1904.12501, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Davide Pizzolotto, Mariano Ceccato |
Obfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1901.04942, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Jacob Staples, Charles Endicott, Lee Krause, Partha P. Pal, Peter Samouelian, Richard E. Schantz, Austin Wellman |
A Semi-Autonomic Bytecode Repair Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 36(2), pp. 97-102, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Niels Reijers, Chi-Sheng Shih 0001 |
Improved Ahead-of-time Compilation of Stack-based JVM Bytecode on Resource-constrained Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Sens. Networks ![In: ACM Trans. Sens. Networks 15(3), pp. 34:1-34:44, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Ferenc Horváth, Tamás Gergely, Árpád Beszédes, Dávid Tengeri, Gergö Balogh, Tibor Gyimóthy |
Code coverage differences of Java bytecode and source code instrumentation tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Qual. J. ![In: Softw. Qual. J. 27(1), pp. 79-123, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Geonbae Na, Jongsu Lim, Sunjun Lee, Jeong Hyun Yi |
Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 19(11), pp. 2625, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Javier Cabrera-Arteaga, Martin Monperrus, Benoit Baudry |
Scalable comparison of JavaScript V8 bytecode traces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VMIL@SPLASH ![In: Proceedings of the 11th ACM SIGPLAN International Workshop on Virtual Machines and Intermediate Languages, VMIL@SPLASH 2019, Athens, Greece, October 22, 2019., pp. 22-31, 2019, ACM, 978-1-4503-6987-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Tam The Nguyen, Phong Minh Vu, Tung Thanh Nguyen |
Code Search on Bytecode for Mobile App Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 2019 ACM Southeast Conference, ACM SE '19, Kennesaw, GA, USA, April 18-20, 2019, pp. 253-256, 2019, ACM, 978-1-4503-6251-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Yanru Peng, Yuting Chen, Beijun Shen |
An Adaptive Approach to Recommending Obfuscation Rules for Java Bytecode Obfuscators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: 43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1, pp. 97-106, 2019, IEEE, 978-1-7281-2607-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Andreas Dann, Ben Hermann 0001, Eric Bodden |
SootDiff: bytecode comparison across different Java compilers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOAP@PLDI ![In: Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, SOAP@PLDI 2019, Phoenix, AZ, USA, June 22, 2019., pp. 14-19, 2019, ACM, 978-1-4503-6720-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Steven Varoumas, Tristan Crolard |
WCET of OCaml Bytecode on Microcontrollers: An Automated Method and Its Formalisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCET ![In: 19th International Workshop on Worst-Case Execution Time Analysis, WCET 2019, July 9, 2019, Stuttgart, Germany., pp. 5:1-5:12, 2019, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 978-3-95977-118-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Ali Ghanbari 0001, Samuel Benton, Lingming Zhang 0001 |
Practical program repair via bytecode mutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2019, Beijing, China, July 15-19, 2019., pp. 19-30, 2019, ACM, 978-1-4503-6224-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Lucas C. Cordeiro, Daniel Kroening, Peter Schrammel |
JBMC: Bounded Model Checking for Java Bytecode - (Competition Contribution). ![Search on Bibsonomy](Pics/bibsonomy.png) |
TACAS (3) ![In: Tools and Algorithms for the Construction and Analysis of Systems - 25 Years of TACAS: TOOLympics, Held as Part of ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, Part III, pp. 219-223, 2019, Springer, 978-3-030-17501-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Gheorghe Hajmasan, Alexandra Mondoc, Octavian Cret |
Bytecode Heuristic Signatures for Detecting Malware Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NextComp ![In: Conference on Next Generation Computing Applications, NextComp 2019, Mauritius, September 19-21, 2019, pp. 1-6, 2019, IEEE, 978-1-7281-1460-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Ali Ghanbari 0001, Lingming Zhang 0001 |
PraPR: Practical Program Repair via Bytecode Mutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 34th IEEE/ACM International Conference on Automated Software Engineering, ASE 2019, San Diego, CA, USA, November 11-15, 2019, pp. 1118-1121, 2019, IEEE, 978-1-7281-2508-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Gbadebo Ayoade, Erick Bauman, Latifur Khan, Kevin W. Hamlen |
Smart Contract Defense through Bytecode Rewriting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Blockchain ![In: IEEE International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019, pp. 384-389, 2019, IEEE, 978-1-7281-4693-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Nicolas Harrand, César Soto-Valero, Martin Monperrus, Benoit Baudry |
The Strengths and Behavioral Quirks of Java Bytecode Decompilers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 19th International Working Conference on Source Code Analysis and Manipulation, SCAM 2019, Cleveland, OH, USA, September 30 - October 1, 2019, pp. 92-102, 2019, IEEE, 978-1-7281-4937-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Ning Guo, Xiaoyong Li 0003, Hui Yin, Yali Gao |
VulHunter: An Automated Vulnerability Detection System Based on Deep Learning and Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 21st International Conference, ICICS 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers, pp. 199-218, 2019, Springer, 978-3-030-41578-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Chu-Pan Wong, Jens Meinicke, Lukas Lazarek, Christian Kästner |
Faster variational execution with transparent bytecode transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Program. Lang. ![In: Proc. ACM Program. Lang. 2(OOPSLA), pp. 117:1-117:30, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Zheng Cheng, Rosemary Monahan, James F. Power |
Formalised EMFTVM bytecode language for sound verification of model transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Syst. Model. ![In: Softw. Syst. Model. 17(4), pp. 1197-1225, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Haihe Ba, Huaizhe Zhou, Huidong Qiao, Zhiying Wang 0003, Jiangchun Ren |
RIM4J: An Architecture for Language-Supported Runtime Measurement against Malicious Bytecode in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 10(7), pp. 253, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Elvira Albert, Pablo Gordillo, Benjamin Livshits, Albert Rubio, Ilya Sergey |
EthIR: A Framework for High-Level Analysis of Ethereum Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1805.07208, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
17 | Eduardo Geraldo, João Costa Seco |
SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VORTEX@ECOOP/ISSTA ![In: Proceedings of the Second Workshop on Verification of Objects at RunTime EXecution, VORTEX@ECOOP/ISSTA 2018, Amsterdam, Netherlands, 17th July 2018., pp. 16-31, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Ali Ghanbari 0001, Lingming Zhang 0001 |
Practical Program Repair via Bytecode Mutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1807.03512, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
17 | Chu-Pan Wong, Jens Meinicke, Lukas Lazarek, Christian Kästner |
Faster Variational Execution with Transparent Bytecode Transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1809.04193, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
17 | Zhenyu Ning, Fengwei Zhang |
DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1803.02471, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
17 | Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Zheng Wang 0001 |
Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 74, pp. 202-220, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Georg Moser, Michael Schaper |
From Jinja bytecode to term rewriting: A complexity reflecting transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Comput. ![In: Inf. Comput. 261, pp. 116-143, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Safaa Achour, Mohammed Benattou |
A Model Based Testing Approach for Java Bytecode Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. ![In: J. Comput. 13(9), pp. 1098-1114, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Izuru Kume, Masahide Nakamura, Naoya Nitta |
Revealing Implicit Correspondence between Bytecode Instructions and Expressions Determined by Java Compilers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASWEC ![In: 25th Australasian Software Engineering Conference, ASWEC 2018, Adelaide, Australia, November 26-30, 2018, pp. 126-130, 2018, IEEE Computer Society, 978-1-7281-1241-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Patryk Czarnik, Jacek Chrzaszcz, Aleksy Schubert |
A Java Bytecode Formalisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VSTTE ![In: Verified Software. Theories, Tools, and Experiments - 10th International Conference, VSTTE 2018, Oxford, UK, July 18-19, 2018, Revised Selected Papers, pp. 135-154, 2018, Springer, 978-3-030-03591-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Zhenyu Ning, Fengwei Zhang |
DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018, Luxembourg City, Luxembourg, June 25-28, 2018, pp. 690-701, 2018, IEEE Computer Society, 978-1-5386-5596-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Lucas C. Cordeiro, Pascal Kesseli, Daniel Kroening, Peter Schrammel, Marek Trtík |
JBMC: A Bounded Model Checking Tool for Verifying Java Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAV (1) ![In: Computer Aided Verification - 30th International Conference, CAV 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part I, pp. 183-190, 2018, Springer, 978-3-319-96144-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Elvira Albert, Pablo Gordillo, Benjamin Livshits, Albert Rubio, Ilya Sergey |
EthIR: A Framework for High-Level Analysis of Ethereum Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATVA ![In: Automated Technology for Verification and Analysis - 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedings, pp. 513-520, 2018, Springer, 978-3-030-01089-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Safaa Achour, Mohammed Benattou |
Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMCS ![In: 6th International Conference on Multimedia Computing and Systems, ICMCS 2018, Rabat, Morocco, May 10-12, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-6221-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Fabio Niephaus, Tim Felgentreff, Robert Hirschfeld |
GraalSqueak: A Fast Smalltalk Bytecode Interpreter Written in an AST Interpreter Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOOOLPS@ECOOP ![In: Proceedings of the 13th Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems, ICOOOLPS@ECOOP 2018, Amsterdam, Netherlands, July 16-21, 2018, pp. 30-35, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Daejun Park 0001, Yi Zhang, Manasvi Saxena, Philip Daian, Grigore Rosu |
A formal verification tool for Ethereum VM bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/SIGSOFT FSE 2018, Lake Buena Vista, FL, USA, November 04-09, 2018, pp. 912-915, 2018, ACM, 978-1-4503-5573-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Joanna Strug, Barbara Strug |
Cost Reduction in Mutation Testing with Bytecode-Level Mutants Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAISC (1) ![In: Artificial Intelligence and Soft Computing - 17th International Conference, ICAISC 2018, Zakopane, Poland, June 3-7, 2018, Proceedings, Part I, pp. 714-723, 2018, Springer, 978-3-319-91252-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Safaa Achour, Mohammed Benattou |
Constraint Based Testing and Verification of Java Bytecode Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIST ![In: 5th IEEE International Congress on Information Science and Technology, CiSt 2018, Marrakech, Morocco, October 21-27, 2018, pp. 64-69, 2018, IEEE, 978-1-5386-4385-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Taemin Park, Julian Lettner, Yeoul Na, Stijn Volckaert, Michael Franz |
Bytecode Corruption Attacks Are Real - And How to Defend Against Them. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings, pp. 326-348, 2018, Springer, 978-3-319-93410-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Judong Bao, Yongqiang He, Weiping Wen |
DroidPro: An AOTC-Based Bytecode-Hiding Scheme for Packing the Android Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/BigDataSE ![In: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018, pp. 624-632, 2018, IEEE, 978-1-5386-4388-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Nick Benton |
Semantic Equivalence Checking for HHVM Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPDP ![In: Proceedings of the 20th International Symposium on Principles and Practice of Declarative Programming, PPDP 2018, Frankfurt am Main, Germany, September 03-05, 2018, pp. 3:1-3:8, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Sidney Amani, Myriam Bégel, Maksym Bortin, Mark Staples |
Towards verifying ethereum smart contract bytecode in Isabelle/HOL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPP ![In: Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, CPP 2018, Los Angeles, CA, USA, January 8-9, 2018, pp. 66-77, 2018, ACM, 978-1-4503-5586-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Yuxin Ding, Rui Wu, Fuxing Xue |
Detecting Android Malware Using Bytecode Image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCC ![In: Cognitive Computing - ICCC 2018 - Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings, pp. 164-169, 2018, Springer, 978-3-319-94306-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Pietro Ferrara 0001, Agostino Cortesi, Fausto Spoto |
CIL to Java-bytecode translation for static analysis leveraging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FormaliSE@ICSE ![In: Proceedings of the 6th Conference on Formal Methods in Software Engineering, FormaliSE 2018, collocated with ICSE 2018, Gothenburg, Sweden, June 2, 2018, pp. 40-49, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Tobias Hamann, Mihai Herda, Heiko Mantel, Martin Mohr, David Schneider 0002, Markus Tasch |
A Uniform Information-Flow Security Benchmark Suite for Source Code and Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings, pp. 437-453, 2018, Springer, 978-3-030-03637-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Tetsuya Inafune, Shinichi Miura, Toshihiro Taketa, Yukio Hiranaka |
Symbolic backward simulation of Java bytecode program. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCMS ![In: Proceedings of the 10th International Conference on Computer Modeling and Simulation, ICCMS 2018, Sydney, Australia, January 08-10, 2018, pp. 140-145, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Davide Pizzolotto, Mariano Ceccato |
[Research Paper] Obfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 18th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2018, Madrid, Spain, September 23-24, 2018, pp. 40-49, 2018, IEEE Computer Society, 978-1-5386-8290-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Tewfik Ziadi, Lom-Messan Hillah |
Software Product Line Extraction from Bytecode Based Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 23rd International Conference on Engineering of Complex Computer Systems, ICECCS 2018, Melbourne, Australia, December 12-14, 2018, pp. 221-225, 2018, IEEE Computer Society, 978-1-5386-9341-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Doni Pracner, Zoran Budimac |
Enabling code transformations with FermaT on simplified bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Softw. Evol. Process. ![In: J. Softw. Evol. Process. 29(5), 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Niels Reijers, Chi-Sheng Shih 0001 |
Improved Ahead-of-Time Compilation of Stack-Based JVM Bytecode on Resource-Constrained Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1712.05590, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
17 | Abel Garcia, Cosimo Laneve |
Deadlock detection of Java Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1709.04152, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
17 | Eugene Minibaev |
Static Dalvik VM bytecode instrumentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1706.06925, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
17 | Tufail Muhammad, Zahid Halim, Majid Ali Khan |
Visualizing trace of Java collection APIs by dynamic bytecode instrumentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Vis. Lang. Comput. ![In: J. Vis. Lang. Comput. 43, pp. 14-29, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Cagatay Catal, Serkan Tugul, Basar Akpinar |
Automatic Software Categorization Using Ensemble Methods and Bytecode Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Eng. Knowl. Eng. ![In: Int. J. Softw. Eng. Knowl. Eng. 27(7), pp. 1129-, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Beibei Zhao, Zhanyong Tang, Zhen Li, Lina Song, Xiaoqing Gong, Dingyi Fang, Fangyuan Liu, Zheng Wang 0001 |
DexPro: A Bytecode Level Code Protection System for Android Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSS ![In: Cyberspace Safety and Security - 9th International Symposium, CSS 2017, Xi'an, China, October 23-25, 2017, Proceedings, pp. 367-382, 2017, Springer, 978-3-319-69470-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Niels Reijers, Chi-Sheng Shih 0001 |
Ahead-of-Time Compilation of Stack-Based JVM Bytecode on Resource-Constrained Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EWSN ![In: Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, EWSN 2017, Uppsala, Sweden, February 20-22, 2017, pp. 84-95, 2017, Junction Publishing, Canada / ACM, 978-0-9949886-1-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
17 | Dongjin Yu, Jie Wang 0013, Qing Wu, Jiazha Yang, Jiaojiao Wang, Wei Yang, Wei Yan |
Detecting Java Code Clones with Multi-granularities Based on Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: 41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 1, pp. 317-326, 2017, IEEE Computer Society, 978-1-5386-0367-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | James Baxter 0001, Ana Cavalcanti 0001 |
Algebraic Compilation of Safety-Critical Java Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFM ![In: Integrated Formal Methods - 13th International Conference, IFM 2017, Turin, Italy, September 20-22, 2017, Proceedings, pp. 161-176, 2017, Springer, 978-3-319-66844-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Bugra M. Yildiz, Christoph Bockisch, Arend Rensink, Mehmet Aksit |
A Java Bytecode Metamodel for Composable Program Analyses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STAF Workshops ![In: Software Technologies: Applications and Foundations - STAF 2017 Collocated Workshops, Marburg, Germany, July 17-21, 2017, Revised Selected Papers, pp. 30-40, 2017, Springer, 978-3-319-74729-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Cosimo Laneve, Abel Garcia |
Deadlock Detection of Java Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LOPSTR ![In: Logic-Based Program Synthesis and Transformation - 27th International Symposium, LOPSTR 2017, Namur, Belgium, October 10-12, 2017, Revised Selected Papers, pp. 37-53, 2017, Springer, 978-3-319-94459-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Ralph Duncan |
Managing Bytecode and ISA Compatibility with an Enhanced Toolchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: 18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2017, Taipei, Taiwan, December 18-20, 2017, pp. 414-420, 2017, IEEE Computer Society, 978-1-5386-3151-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Haihe Ba, Huaizhe Zhou, Jiangchun Ren, Zhiying Wang 0003 |
Runtime Measurement Architecture for Bytecode Integrity in JVM-Based Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 36th IEEE Symposium on Reliable Distributed Systems, SRDS 2017, Hong Kong, Hong Kong, September 26-29, 2017, pp. 262-263, 2017, IEEE Computer Society, 978-1-5386-1679-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Oliver Haase |
Abstract Interpretation of Java Bytecode for Immutability Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. ![In: J. Comput. Sci. 12(7), pp. 314-322, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Afshin Amighi, Pedro de Carvalho Gomes, Dilian Gurov, Marieke Huisman |
Provably correct control flow graphs from Java bytecode programs with exceptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Tools Technol. Transf. ![In: Int. J. Softw. Tools Technol. Transf. 18(6), pp. 653-684, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Michael Backes 0001, Robert Künnemann, Esfandiar Mohammadi |
Computational Soundness for Dalvik Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1608.04362, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
17 | Md. Jawaherul Alam, Michael T. Goodrich, Timothy Johnson |
J-Viz: Sibling-First Recursive Graph Drawing for Visualizing Java Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1608.08970, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
17 | Daibin Wang, Hai Jin 0001, Deqing Zou, Peng Xu 0003, Tianqing Zhu, Gang Chen |
Taming transitive permission attack via bytecode rewriting on Android application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 9(13), pp. 2100-2114, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Walter Binder, Philippe Moret, Éric Tanter, Danilo Ansaloni |
Polymorphic bytecode instrumentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Pract. Exp. ![In: Softw. Pract. Exp. 46(10), pp. 1351-1380, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Mangala Gowri Nanda, S. Arun-Kumar |
Decompiling Boolean Expressions from Java™ Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISEC ![In: Proceedings of the 9th India Software Engineering Conference, Goa, India, February 18-20, 2016, pp. 59-69, 2016, ACM, 978-1-4503-4018-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Michael Backes 0001, Robert Künnemann, Esfandiar Mohammadi |
Computational Soundness for Dalvik Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, pp. 717-730, 2016, ACM, 978-1-4503-4139-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Md. Jawaherul Alam, Michael T. Goodrich, Timothy Johnson |
J-Viz: Finding algorithmic complexity attacks via graph visualization of Java bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 13th IEEE Symposium on Visualization for Cyber Security, VizSec 2016, Baltimore, MD, USA, October 24, 2016, pp. 1-8, 2016, IEEE Computer Society, 978-1-5090-1605-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Dávid Tengeri, Ferenc Horváth, Árpád Beszédes, Tamás Gergely, Tibor Gyimóthy |
Negative Effects of Bytecode Instrumentation on Java Source Code Coverage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SANER ![In: IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, SANER 2016, Suita, Osaka, Japan, March 14-18, 2016 - Volume 1, pp. 225-235, 2016, IEEE Computer Society, 978-1-5090-1855-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Sangwook Cho, Gyoosik Kim, Seong-je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han |
Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RACS ![In: Proceedings of the International Conference on Research in Adaptive and Convergent Systems, RACS 2016, Odense, Denmark, October 11-14, 2016, pp. 148-152, 2016, ACM, 978-1-4503-4455-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Safaa Achour, Mohammed Benattou |
Test case generation for Java Bytecode programs annotated with BML specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMCS ![In: 5th International Conference on Multimedia Computing and Systems, ICMCS 2016, Marrakech, Morocco, September 29 - October 1, 2016, pp. 605-610, 2016, IEEE, 978-1-5090-5146-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Tam The Nguyen, Hung Viet Pham, Phong Minh Vu, Tung Thanh Nguyen |
Learning API usages from bytecode: a statistical approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: Proceedings of the 38th International Conference on Software Engineering, ICSE 2016, Austin, TX, USA, May 14-22, 2016, pp. 416-427, 2016, ACM, 978-1-4503-3900-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Luke Dominic Mark Urquhart |
Worst-case resource-usage analysis of Java Card classic editions application bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2016 |
RDF |
|
17 | Aymerick Savary |
Détection de vulnérabilités appliquée à la vérification de code intermédiaire de Java Card. (Vulnerability detection into Java Card bytecode verifier). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2016 |
RDF |
|
17 | Seiji Umatani, Tomoharu Ugawa, Masahiro Yasugi |
Design and Implementation of a Java Bytecode Manipulation Library for Clojure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 23(5), pp. 716-729, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Surachai Thongkaew, Tsuyoshi Isshiki, Dongju Li, Hiroaki Kunieda |
Dalvik Bytecode Acceleration Using Fetch/Decode Hardware Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 23(2), pp. 118-130, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Hendra Gunadi, Alwen Tiu, Rajeev Goré |
Formal Certification of Android Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1504.01842, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
17 | Tam The Nguyen, Hung Viet Pham, Phong Minh Vu, Tung Thanh Nguyen |
Learning API Usages from Bytecode: A Statistical Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1507.07306, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
17 | Mohamed Sarrab |
Bytecode instrumentation mechanism for monitoring mobile application information flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Secur. Networks ![In: Int. J. Secur. Networks 10(3), pp. 191-206, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | David A. W. Clarke, Tim Miller 0001, Antonette Mendoza |
Using "must" and "may" summaries to detect data races in Java bytecode that does not rely on the synchronized construct. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASWEC (2) ![In: Proceedings of the 24th Australasian Software Engineering Conference, ASWEC 2015, Volume II, Adelaide, SA, Australia, September 28 - October 1, 2015, pp. 64-68, 2015, ACM, 978-1-4503-3796-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Mohammad R. Azadmanesh, Matthias Hauswirth |
BLAST: Bytecode-Level Analysis on Sliced Traces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPPJ ![In: Proceedings of the Principles and Practices of Programming on The Java Platform, PPPJ 2015, Melbourne, FL, USA, September 8-11, 2015, pp. 152-158, 2015, ACM, 978-1-4503-3712-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Hyeong-Seok Oh, Ji Hwan Yeo, Soo-Mook Moon |
Bytecode-to-C ahead-of-time compilation for Android Dalvik virtual machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, DATE 2015, Grenoble, France, March 9-13, 2015, pp. 1048-1053, 2015, ACM, 978-3-9815370-4-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
17 | Patrik Lantz, Björn Johansson 0006 |
Towards bridging the gap between Dalvik bytecode and native code during static analysis of Android applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: International Wireless Communications and Mobile Computing Conference, IWCMC 2015, Dubrovnik, Croatia, August 24-28, 2015, pp. 587-593, 2015, IEEE, 978-1-4799-5344-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Julien Lancia, Guillaume Bouffard |
Java Card Virtual Machine Compromising from a Bytecode Verified Applet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications - 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers, pp. 75-88, 2015, Springer, 978-3-319-31270-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Javier Escobar-Avila, Mario Linares Vásquez, Sonia Haiduc |
Unsupervised software categorization using bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPC ![In: Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension, ICPC 2015, Florence/Firenze, Italy, May 16-24, 2015, pp. 229-239, 2015, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|