共 50 条
- [2] Negative Effects of Bytecode Instrumentation on Java']Java Source Code Coverage [J]. 2016 IEEE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), VOL 1, 2016, : 225 - 235
- [3] Mobile code security by Java']Java bytecode instrumentation [J]. DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 27 - 40
- [4] Is Bytecode Instrumentation as Good as Source Code Instrumentation: An Empirical Study with Industrial Tools [J]. 2013 IEEE 24TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2013, : 380 - 389
- [5] STUBBER: Compiling Source Code into Bytecode without Dependencies for Java']Java Code Clone Detection [J]. 2021 IEEE 15TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES, IWSC 2021, 2021, : 29 - 35
- [6] Finding Source Code Clones in Intermediate Representations of Java']Java Bytecode [J]. 2023 IEEE 17TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES, IWSC 2023, 2023, : 37 - 43
- [7] Target code generation using the code expansion technique for Java']Java Bytecode [J]. PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 752 - 755
- [8] Mobile code security by Java']Java bytecode dependence analysis [J]. IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2: SMART INFO-MEDIA SYSTEMS, 2004, : 923 - 926
- [9] Checking secure information flow in Java']Java bytecode by code transformation and standard bytecode verification [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2004, 34 (13): : 1225 - 1255
- [10] A declarative approach for Java']Java code instrumentation [J]. SOFTWARE QUALITY JOURNAL, 2015, 23 (01) : 143 - 170