Static Analysis of Java Bytecode

被引:1
|
作者
Jian\|jun Zhao Department of Computer Science and Engineering
机构
关键词
Control flow analysis; Java virtual machine; software testing; software maintenance;
D O I
暂无
中图分类号
TP311 [程序设计、软件工程];
学科分类号
摘要
Understanding control flows in a computer program is essential for many software engineering tasks such as testing, debugging, reverse engineering, and maintenance. In this paper ,we present a control flow analysis technique to analyze the control flow in Java bytecode. To perform the analysis, we construct a control flow graph(CFG) for Java bytecode not only at the intraprocedural level but also at the interprocedural level. We also discuss some applications of a CFG in a maintenance environment for Java bytecode.
引用
收藏
页码:383 / 390
页数:8
相关论文
共 50 条
  • [41] Verified Java']Java Bytecode Verification
    Klein, Gerwin
    IT-INFORMATION TECHNOLOGY, 2005, 47 (02): : 107 - 110
  • [42] Java']Java & static analysis
    Chaturvedi, A
    DR DOBBS JOURNAL, 2005, 30 (07): : 25 - +
  • [43] Java bytecode dependence analysis for secure information flow
    Bian, Gaowei
    Nakayama, Ken
    Kobayashi, Yoshitake
    Maekawa, Mamoru
    International Journal of Network Security, 2007, 4 (01) : 59 - 68
  • [44] An Evaluation of Current Java']Java Bytecode Decompilers
    Hamilton, James
    Danicic, Sebastian
    2009 NINTH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2009, : 129 - 136
  • [45] Advanced obfuscation techniques for Java']Java bytecode
    Chan, JT
    Yang, W
    JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 71 (1-2) : 1 - 10
  • [46] Abstract Interpretation of Java']Java Bytecode in Sturdy
    Marx, Stefan
    Erdweg, Sebastian
    PROCEEDINGS OF THE 26TH ACM INTERNATIONAL WORKSHOP ON FORMAL TECHNIQUES FOR JAVA-LIKE PROGRAMS, FTFJP 2024, 2024, : 17 - 22
  • [47] Path Executions of Java']Java Bytecode Programs
    Soomro, Safeeullah
    Alansari, Zainab
    Belgaum, Mohammad Riyaz
    PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, VOL 2, 2018, 564 : 261 - 271
  • [48] Extending operational semantics of the Java']Java bytecode
    Czarnik, Patryk
    Schubert, Aleksy
    TRUSTWORTHY GLOBAL COMPUTING, 2008, 4912 : 57 - 72
  • [49] User-Definable Resource Usage Bounds Analysis for Java']Java Bytecode
    Navas, Jorge
    Mendez-Lojo, Mario
    Hermenegildo, Manuel V.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 253 (05) : 65 - 82
  • [50] SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java']Java Bytecode
    Geraldo, Eduardo
    Seco, Joao Costa
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2019, (302): : 16 - 31