共 50 条
- [31] Checking secure information flow in Java']Java bytecode by code transformation and standard bytecode verification [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2004, 34 (13): : 1225 - 1255
- [32] Obfuscating Java']Java Programs by Translating Selected Portions of Bytecode to Native Libraries [J]. 2018 IEEE 18TH INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM), 2018, : 40 - 49
- [33] On-Device Control Flow Verification for Java']Java Programs [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2011, 6542 : 43 - 57
- [34] Modular Termination Proofs of Recursive Java']Java Bytecode Programs by Term Rewriting [J]. 22ND INTERNATIONAL CONFERENCE ON REWRITING TECHNIQUES AND APPLICATIONS (RTA'11), 2011, 10 : 155 - 170
- [35] Test Case Generation for Java']Java Bytecode Programs Annotated with BML Specifications [J]. PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2016, : 605 - 610
- [36] From finite state machines to provably correct java card applets [J]. IFIP Advances in Information and Communication Technology, (465-470):
- [37] Data-flow based vulnerability analysis and Java']Java bytecode [J]. PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE: COMPUTER SCIENCE CHALLENGES, 2007, : 201 - +
- [38] Using compressed bytecode traces for slicing java programs [J]. Institution of Electrical Engineers, IEE; British Computer Society, BCS; Association for Computing Machinery, ACM SIGSOFT; Association for Computing Machinery, ACM SIGPLAN; IEEE Computer Society Technical Council on Software Engineering, 1600, 512-521 (2004):
- [39] Multithreaded dependence graphs for concurrent Java']Java programs [J]. INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 1999, : 13 - 23
- [40] From Specification to Optimisation: An Architecture for Optimisation of Java']Java Bytecode [J]. COMPILER CONSTRUCTION, PROCEEDINGS, 2009, 5501 : 17 - 31