BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
bytecode
Google bytecode

Tag #bytecode

122 papers:

SCAMSCAM-2019-HarrandSMB #behaviour #java
The Strengths and Behavioral Quirks of Java Bytecode Decompilers (NH, CSV, MM, BB), pp. 92–102.
OOPSLAOOPSLA-2019-CelikNRG #design #implementation #java
Design, implementation, and application of GPU-based Java bytecode interpreters (, PN, CJR, MG), p. 28.
OOPSLAOOPSLA-2019-ZhangYTWK0 #abstract interpretation #analysis #dependence #named
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation (ZZ0, WY, GT, GW, YK, XZ0), p. 31.
ASEASE-2019-GhanbariZ #named #program repair
PraPR: Practical Program Repair via Bytecode Mutation (AG, LZ), pp. 1118–1121.
SANERSANER-2018-KaramitasK #performance
Efficient features for function matching between binary executables (CK, AK), pp. 335–345.
SCAMSCAM-2018-PizzolottoC #java #library #obfuscation #research #source code
[Research Paper] Obfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries (DP, MC), pp. 40–49.
OOPSLAOOPSLA-2018-WongMLK #execution #performance #program transformation
Faster variational execution with transparent bytecode transformation (CPW, JM, LL, CK), p. 30.
PLDIPLDI-2018-BohrerTMMP #cyber-physical #modelling #named
VeriPhy: verified controller executables from verified cyber-physical system models (BB, YKT, SM, MOM, AP), pp. 617–630.
PPDPPPDP-2018-Benton #equivalence #semantics
Semantic Equivalence Checking for HHVM Bytecode (NB), p. 8.
ESEC-FSEESEC-FSE-2018-0001ZSDR #verification #virtual machine
A formal verification tool for Ethereum VM bytecode (DP0, YZ, MS, PD, GR), pp. 912–915.
CAVCAV-2018-CordeiroKKST #bound #java #model checking #named #verification
JBMC: A Bounded Model Checking Tool for Verifying Java Bytecode (LCC, PK, DK, PS, MT), pp. 183–190.
VMCAIVMCAI-2018-KranzS #analysis #composition #on-demand #using
Modular Analysis of Executables Using On-Demand Heyting Completion (JK, AS), pp. 291–312.
IFM-2017-BaxterC #algebra #compilation #java #safety
Algebraic Compilation of Safety-Critical Java Bytecode (JB, AC), pp. 161–176.
LOPSTRLOPSTR-2017-LaneveG #concurrent #detection #java
Deadlock Detection of Java Bytecode (CL, AG), pp. 37–53.
SANERSANER-2016-TengeriHBGG #java #source code #test coverage
Negative Effects of Bytecode Instrumentation on Java Source Code Coverage (DT, FH, ÁB, TG, TG), pp. 225–235.
ICSE-2016-NguyenPVN #api #approach #learning #statistics
Learning API usages from bytecode: a statistical approach (TTN, HVP, PMV, TTN), pp. 416–427.
ICPCICPC-2015-Escobar-AvilaVH #categorisation #using
Unsupervised software categorization using bytecode (JEA, MLV, SH), pp. 229–239.
POPLPOPL-2015-PredaGLM #analysis #automaton #semantics #similarity
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables (MDP, RG, AL, IM), pp. 329–341.
ASEASE-2015-Vargas-Baldrich #automation #dependence #using
Automated Tagging of Software Projects Using Bytecode and Dependencies (N) (SVB, MLV, DP), pp. 289–294.
ICSEICSE-v2-2015-Escobar-Avila #automation #categorisation #library #using
Automatic Categorization of Software Libraries Using Bytecode (JEA), pp. 784–786.
DATEDATE-2015-KroeningLMST #effectiveness #low level #verification
Effective verification of low-level software with nested interrupts (DK, LL, TM, PS, MT), pp. 229–234.
PLDIPLDI-2014-DavidY #code search
Tracelet-based code search in executables (YD, EY), p. 37.
FASEFASE-2014-GomesPG #control flow #graph #java #source code
Sound Control Flow Graph Extraction from Incomplete Java Bytecode Programs (PdCG, AP, DG), pp. 215–229.
ICSMEICSM-2013-AnandEKSBK #abstraction #analysis #framework #memory management #stack
An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables (KA, KE, AK, MS, RB, ADK), pp. 90–99.
IFMIFM-2013-SavaryFL #detection #modelling #testing #using #verification
Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing (AS, MF, JLL), pp. 223–237.
SEKESEKE-2013-AlshammariFC #java #metric #security #source code
Security Metrics for Java Bytecode Programs (BA, CJF, DC), pp. 394–399.
CGOCGO-2013-WangWC #android #named
Acceldroid: Co-designed acceleration of Android bytecode (CW, YW, MC), p. 10.
SCAMSCAM-2012-Zambon #java #obfuscation
Aucsmith-Like Obfuscation of Java Bytecode (AZ), pp. 114–119.
TOOLSTOOLS-EUROPE-2012-ZhengAMSBVTQM #partial evaluation
Turbo DiSL: Partial Evaluation for High-Level Bytecode Instrumentation (YZ, DA, LM, AS, WB, AV, PT, ZQ, MM), pp. 353–368.
FSEFSE-2012-OcteauJM #android #java
Retargeting Android applications to Java bytecode (DO, SJ, PM), p. 6.
RTARTA-2011-BrockschmidtOG #composition #java #proving #recursion #source code #term rewriting #termination
Modular Termination Proofs of Recursive Java Bytecode Programs by Term Rewriting (MB, CO, JG), pp. 155–170.
RTARTA-2010-OttoBEG #analysis #automation #java #term rewriting #termination
Automated Termination Analysis of Java Bytecode by Term Rewriting (CO, MB, CvE, JG), pp. 259–276.
PEPMPEPM-2010-AlbertGP #generative #java #named #partial evaluation #testing
PET: a partial evaluation-based test case generation tool for Java bytecode (EA, MGZ, GP), pp. 25–28.
PEPMPEPM-2010-LakhotiaBSM #analysis #obfuscation
Context-sensitive analysis of obfuscated x86 executables (AL, DRB, AS, AM), pp. 131–140.
PEPMPEPM-2010-RudolphT #code generation #named #runtime #type safety
Mnemonics: type-safe bytecode generation at run time (JR, PT), pp. 15–24.
ASEASE-2010-PasareanuR #execution #java #symbolic computation
Symbolic PathFinder: symbolic execution of Java bytecode (CSP, NR), pp. 179–180.
SCAMSCAM-2009-HamiltonD #evaluation #java
An Evaluation of Current Java Bytecode Decompilers (JH, SD), pp. 129–136.
CCCC-2009-WarburtonK #architecture #java #optimisation #specification
From Specification to Optimisation: An Architecture for Optimisation of Java Bytecode (RW, SK), pp. 17–31.
ISSTAISSTA-2009-SaebjornsenWPQS #detection
Detecting code clones in binary executables (AS, JW, TP, DJQ, ZS), pp. 117–128.
PASTEPASTE-2008-Hubert #java
A non-null annotation inferencer for Java bytecode (LH), pp. 36–42.
OOPSLAOOPSLA-2008-KatsBV #compilation #normalisation
Mixing source and bytecode: a case for compilation by normalization (LCLK, MB, EV), pp. 91–108.
LOPSTRLOPSTR-2008-AlbertGP #generative #partial evaluation #testing
Test Data Generation of Bytecode by CLP Partial Evaluation (EA, MGZ, GP), pp. 4–23.
POPLPOPL-2008-NitaGC #formal method #low level #platform
A theory of platform-dependent low-level software (MN, DG, CC), pp. 209–220.
QAPLQAPL-2008-LambertP #framework #independence #java #platform #virtual machine
Platform Independent Timing of Java Virtual Machine Bytecode Instructions (JML, JFP), pp. 97–113.
SACSAC-2008-AlbertAGPZ #cost analysis #java
Removing useless variables in cost analysis of Java bytecode (EA, PA, SG, GP, DZ), pp. 368–375.
SACSAC-2008-BaveraB #analysis #data flow #policy #type system
Type-based information flow analysis for bytecode languages with variable object field policies (FB, EB), pp. 347–351.
CCCC-2008-LimR #generative
A System for Generating Static Analyzers for Machine Instructions (JL, TWR), pp. 36–52.
CCCC-2008-LogozzoF #analysis #on the #source code
On the Relative Completeness of Bytecode Analysis Versus Source Code Analysis (FL, MF), pp. 197–212.
CCCC-2008-MalePPD #java #verification
Java Bytecode Verification for @NonNull Types (CM, DJP, AP, CD), pp. 229–244.
CCCC-2008-RepsB #analysis
Improved Memory-Access Analysis for x86 Executables (TWR, GB), pp. 16–35.
TACASTACAS-2008-BalakrishnanR
Analyzing Stripped Device-Driver Executables (GB, TWR), pp. 124–140.
ICSTICST-2008-BardinH #testing
Structural Testing of Executables (SB, PH), pp. 22–31.
SCAMSCAM-2007-BinderHM #java #re-engineering #runtime #standard
Reengineering Standard Java Runtime Systems through Dynamic Bytecode Instrumentation (WB, JH, PM), pp. 91–100.
PADLPADL-2007-AlbertGHP #analysis #java #logic programming #source code #using #verification
Verification of Java Bytecode Using Analysis and Transformation of Logic Programs (EA, MGZ, LH, GP), pp. 124–139.
SASSAS-2007-PayetS #analysis #java
Magic-Sets Transformation for the Analysis of Java Bytecode (ÉP, FS), pp. 452–467.
ISMMISMM-2007-AlbertGG #analysis #java
Heap space analysis for java bytecode (EA, SG, MGZ), pp. 105–116.
ESOPESOP-2007-AlbertAGPZ #cost analysis #java
Cost Analysis of Java Bytecode (EA, PA, SG, GP, DZ), pp. 157–172.
ESOPESOP-2007-BarthePR #java #lightweight #verification
A Certified Lightweight Non-interference Java Bytecode Verifier (GB, DP, TR), pp. 125–140.
FASEFASE-2007-BurdyHP #behaviour #design #interface #java #specification
Preliminary Design of BML: A Behavioral Interface Specification Language for Java Bytecode (LB, MH, MP), pp. 215–229.
TACASTACAS-2007-ChatterjeeLQR #low level #reachability
A Reachability Predicate for Analyzing Low-Level Software (SC, SKL, SQ, ZR), pp. 19–33.
CAVCAV-2007-GulwaniT #abstract domain #low level
An Abstract Domain for Analyzing Heap-Manipulating Low-Level Software (SG, AT), pp. 379–392.
VMCAIVMCAI-2007-BalakrishnanR #named
DIVINE: DIscovering Variables IN Executables (GB, TWR), pp. 1–28.
WCREWCRE-2006-LimRL
Extracting Output Formats from Executables (JL, TWR, BL), pp. 167–178.
QAPLQAPL-2005-BinderH06 #cpu #metric #using
Using Bytecode Instruction Counting as Portable CPU Consumption Metric (WB, JH), pp. 57–77.
QAPLQAPL-2006-BinderH06a #profiling #using #virtual machine
Exact and Portable Profiling for the JVM Using Bytecode Instruction Counting (WB, JH), pp. 45–64.
SACSAC-2006-AgostaCPS #analysis #compilation #performance
Selective compilation via fast code analysis and bytecode tracing (GA, SCR, PP, MS), pp. 906–911.
SACSAC-2006-BurdyP #java #specification #verification
Java bytecode specification and verification (LB, MP), pp. 1835–1839.
SACSAC-2006-Zanardini #java
Abstract non-interference in a fragment of Java bytecode (DZ), pp. 1822–1826.
GPCEGPCE-2006-BinderH #flexibility #metric #performance
Flexible and efficient measurement of dynamic bytecode metrics (WB, JH), pp. 171–180.
CCCC-2006-HammondL #java #optimisation
Loop Transformations in the Ahead-of-Time Optimization of Java Bytecode (SH, DL), pp. 109–123.
SCAMSCAM-2005-SzegediG #java #slicing #source code
Dynamic Slicing of Java Bytecode Programs (AS, TG), pp. 35–44.
POPLPOPL-2005-AnconaDDZ #compilation #composition #java #polymorphism
Polymorphic bytecode: compositional compilation for Java-like languages (DA, FD, SD, EZ), pp. 26–37.
CCCC-2005-BalakrishnanGRT #framework #named #platform
CodeSurfer/x86 — A Platform for Analyzing x86 Executables (GB, RG, TWR, TT), pp. 250–254.
ESOPESOP-2005-WildmoserN #safety
Asserting Bytecode Safety (MW, TN), pp. 326–341.
TACASTACAS-2005-SuwimonteerabuthSE #java #named
jMoped: A Java Bytecode Checker Based on Moped (DS, SS, JE), pp. 541–545.
CAVCAV-2005-BalakrishnanRKLLMGYCT #model checking
Model Checking x86 Executables with CodeSurfer/x86 and WPDS++ (GB, TWR, NK, AL, JL, DM, RG, SHY, CHC, TT), pp. 158–163.
VMCAIVMCAI-2005-GenaimS #analysis #data flow #java
Information Flow Analysis for Java Bytecode (SG, FS), pp. 346–362.
KDDKDD-2004-KolterM #detection #learning
Learning to detect malicious executables in the wild (JZK, MAM), pp. 470–478.
ICSEICSE-2004-WangR #java #slicing #source code #using
Using Compressed Bytecode Traces for Slicing Java Programs (TW, AR), pp. 512–521.
SACSAC-2004-BarbutiC #java #verification
Java bytecode verification on Java cards (RB, SC), pp. 431–438.
CCCC-2004-BalakrishnanR #memory management
Analyzing Memory Accesses in x86 Executables (GB, TWR), pp. 5–23.
FASEFASE-2004-BartheD #framework #verification
A Tool-Assisted Framework for Certified Bytecode Verification (GB, GD), pp. 99–113.
CSLCSL-2004-AmadioCDJ #bound #functional #verification
A Functional Scenario for Bytecode Verification of Resource Bounds (RMA, SCG, SDZ, LJ), pp. 265–279.
SCAMSCAM-2003-KissJLG #interprocedural #slicing
Interprocedural Static Slicing of Binary Executables (ÁK, JJ, GL, TG), p. 118–?.
WCREWCRE-2003-SnavelyDA #reverse engineering
Unscheduling, Unpredication, Unspeculation: Reverse Engineering Itanium Executables (NS, SKD, GRA), pp. 4–13.
GPCEGPCE-2003-ChibaN #java #performance #tool support
An Easy-to-Use Toolkit for Efficient Java Bytecode Translators (SC, MN), pp. 364–376.
CCCC-2003-GagnonH #effectiveness #java #sequence #thread #using
Effective Inline-Threaded Interpretation of Java Bytecode Using Preparation Sequences (EG, LJH), pp. 170–184.
ICFPICFP-2002-SerpetteS #compilation #performance #virtual machine
Compiling scheme to JVM bytecode: : a performance study (BPS, MS), pp. 259–270.
SEKESEKE-2002-BarbutiTBF #java #verification
Fixing the Java bytecode verifier by a suitable type domain (RB, LT, CB, NDF), pp. 377–382.
SEKESEKE-2002-SantoneV #java #model checking
Local model checking of Java bytecode (AS, GV), pp. 383–389.
PEPMASIA-PEPM-2002-AffeldtMSY #runtime
Supporting objects in run-time bytecode specialization (RA, HM, ES, AY), pp. 50–60.
PPDPPPDP-2002-HiguchiO #calculus #java
Java bytecode as a typed term calculus (TH, AO), pp. 201–211.
SACSAC-2002-BarbutiBF #abstract interpretation #java #security
Checking security of Java bytecode by abstract interpretation (RB, CB, NDF), pp. 229–236.
GPCEGPCE-2002-TanterSNP #java #semantics
Altering Java Semantics via Bytecode Manipulation (ÉT, MSD, JN, JMP), pp. 283–298.
ASPLOSASPLOS-2002-OgataKN #interpreter #java #optimisation
Bytecode fetch optimization for a Java interpreter (KO, HK, TN), pp. 58–67.
CCCC-2002-MiecznikowskiH #java #problem
Decompiling Java Bytecode: Problems, Traps and Pitfalls (JM, LJH), pp. 111–127.
VMCAIVMCAI-2002-BernardeschiF #abstract interpretation #java #model checking #security
Combining Abstract Interpretation and Model Checking for Analysing Security Properties of Java Bytecode (CB, NDF), pp. 1–15.
SCAMSCAM-2001-MaggiS #analysis #data flow #java #using
Using Data Flow Analysis to Infer Type Information in Java Bytecode (PM, RS), p. 213–?.
ECOOPECOOP-2001-TatsuboriSCI #distributed #execution #java #legacy
A Bytecode Translator for Distributed Execution of “Legacy” Java Software (MT, TS, SC, KI), pp. 236–255.
PLDIPLDI-2001-DeLineF #low level #protocol
Enforcing High-Level Protocols in Low-Level Software (RD, MF), pp. 59–69.
PLDIPLDI-2001-EvansF
Bytecode Compression via Profiled Grammar Rewriting (WSE, CWF), pp. 148–155.
FoSSaCSFoSSaCS-2001-Nipkow #verification
Verified Bytecode Verifiers (TN), pp. 347–363.
CAVCAV-2001-Leroy #java #overview #perspective #verification
Java Bytecode Verification: An Overview (XL), pp. 265–285.
POPLPOPL-2000-KnoblockR #java #type system
Type Elaboration and Subtype Completion for Java Bytecode (TBK, JR), pp. 228–242.
SASSAS-2000-GagnonHM #java #performance #static typing
Efficient Inference of Static Types for Java Bytecode (EG, LJH, GM), pp. 199–219.
SACSAC-2000-DoyonD #java #verification
Verifying Object Initialization in the Java Bytecode Language (SD, MD), pp. 821–830.
CCCC-2000-Vallee-RaiGHLPS #framework #java #optimisation #question #using
Optimizing Java Bytecode Using the Soot Framework: Is It Feasible? (RVR, EG, LJH, PL, PP, VS), pp. 18–34.
CADECADE-2000-MichaelA #higher-order #logic #semantics #syntax
Machine Instruction Syntax and Semantics in Higher Order Logic (NGM, AWA), pp. 7–24.
OOPSLAOOPSLA-1999-FreundM #framework #java #verification
A Formal Framework for the Java Bytecode Language and Verifier (SNF, JCM), pp. 147–166.
TOOLSTOOLS-EUROPE-1999-Waldron #java #object-oriented #source code
Dynamic Bytecode Usage by Object Oriented Java Programs (JW), pp. 384–395.
POPLPOPL-1999-OCallahn #java #type system
A Simple, Comprehensive Type System for Java Bytecode Subroutines (RO), pp. 70–78.
PPDPPPDP-1999-Costa #optimisation #prolog
Optimising Bytecode Emulation for Prolog (VSC), pp. 261–277.
ICSEICSE-1999-JacksonW #lightweight #modelling
Lightweight Extraction of Object Models from Bytecode (DJ, AW), pp. 194–202.
TACASTACAS-1999-Pusch #higher-order #java #proving #specification #verification
Proving the Soundness of a Java Bytecode Verifier Specification in Isabelle/HOL (CP), pp. 89–103.
CAVCAV-1999-BasinFPV #java #model checking #verification
Java Bytecode Verification by Model Checking (DAB, SF, JP, HV), pp. 491–494.
IWPCIWPC-1998-CifuentesS #semantics #specification
Specifying the Semantics of Machine Instructions (CC, SS), pp. 126–133.
OOPSLAOOPSLA-1998-FreundM #java #type system
A Type System for Object Initialization in the Java Bytecode Language (SNF, JCM), pp. 310–327.
TOOLSTOOLS-PACIFIC-1998-MathewSH #java #performance
Inter-Server Transport Performance of Java Bytecode in a Metacomputing Environment (JAM, AJS, KAH), p. 264–?.
POPLPOPL-1998-StataA #java #type system
A Type System for Java Bytecode Subroutines (RS, MA), pp. 149–160.
ICSMEICSM-1997-CifuentesF #slicing
Intraprocedural Static Slicing of Binary Executables (CC, AF), p. 188–?.
PLDIPLDI-1996-Ramsey
Relocating Machine Instructions by Currying (NR), pp. 226–236.
CCCC-1996-FritzonWHSS #array #debugging #distributed #parallel #process
A Parallel Debugger with Support for Distributed Arrays, Multiple Executables and Dynamic Processes (PF, RW, OH, JS, PS), pp. 341–355.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.