共 50 条
- [2] SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java']Java Bytecode [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2019, (302): : 16 - 31
- [3] Using data flow analysis to infer type information in Java']Java bytecode [J]. FIRST IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2001, : 211 - 222
- [5] Checking secure information flow in Java']Java bytecode by code transformation and standard bytecode verification [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2004, 34 (13): : 1225 - 1255
- [6] Termination analysis of Java']Java Bytecode [J]. FORMAL METHODS FOR OPEN OBJECT-BASED DISTRIBUTED SYSTEMS, PROCEEDINGS, 2008, 5051 : 2 - +
- [7] Using standard verifier to check secure information flow in Java']Java bytecode [J]. 26TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 850 - 855
- [8] Using Bytecode Instrumentation to Secure Information Flow in Multithreaded Java']Java Applications [J]. 2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 362 - 367
- [9] Cost analysis of Java']Java bytecode [J]. PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2007, 4421 : 157 - +
- [10] Dependence analysis of Java']Java bytecode [J]. 24TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COSPSAC 2000), 2000, 24 : 486 - 491