Tag #bytecode
122 papers:
- SCAM-2019-HarrandSMB #behaviour #java
- The Strengths and Behavioral Quirks of Java Bytecode Decompilers (NH, CSV, MM, BB), pp. 92–102.
- OOPSLA-2019-CelikNRG #design #implementation #java
- Design, implementation, and application of GPU-based Java bytecode interpreters (AÇ, PN, CJR, MG), p. 28.
- OOPSLA-2019-ZhangYTWK0 #abstract interpretation #analysis #dependence #named
- BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation (ZZ0, WY, GT, GW, YK, XZ0), p. 31.
- ASE-2019-GhanbariZ #named #program repair
- PraPR: Practical Program Repair via Bytecode Mutation (AG, LZ), pp. 1118–1121.
- SANER-2018-KaramitasK #performance
- Efficient features for function matching between binary executables (CK, AK), pp. 335–345.
- SCAM-2018-PizzolottoC #java #library #obfuscation #research #source code
- [Research Paper] Obfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries (DP, MC), pp. 40–49.
- OOPSLA-2018-WongMLK #execution #performance #program transformation
- Faster variational execution with transparent bytecode transformation (CPW, JM, LL, CK), p. 30.
- PLDI-2018-BohrerTMMP #cyber-physical #modelling #named
- VeriPhy: verified controller executables from verified cyber-physical system models (BB, YKT, SM, MOM, AP), pp. 617–630.
- PPDP-2018-Benton #equivalence #semantics
- Semantic Equivalence Checking for HHVM Bytecode (NB), p. 8.
- ESEC-FSE-2018-0001ZSDR #verification #virtual machine
- A formal verification tool for Ethereum VM bytecode (DP0, YZ, MS, PD, GR), pp. 912–915.
- CAV-2018-CordeiroKKST #bound #java #model checking #named #verification
- JBMC: A Bounded Model Checking Tool for Verifying Java Bytecode (LCC, PK, DK, PS, MT), pp. 183–190.
- VMCAI-2018-KranzS #analysis #composition #on-demand #using
- Modular Analysis of Executables Using On-Demand Heyting Completion (JK, AS), pp. 291–312.
- IFM-2017-BaxterC #algebra #compilation #java #safety
- Algebraic Compilation of Safety-Critical Java Bytecode (JB, AC), pp. 161–176.
- LOPSTR-2017-LaneveG #concurrent #detection #java
- Deadlock Detection of Java Bytecode (CL, AG), pp. 37–53.
- SANER-2016-TengeriHBGG #java #source code #test coverage
- Negative Effects of Bytecode Instrumentation on Java Source Code Coverage (DT, FH, ÁB, TG, TG), pp. 225–235.
- ICSE-2016-NguyenPVN #api #approach #learning #statistics
- Learning API usages from bytecode: a statistical approach (TTN, HVP, PMV, TTN), pp. 416–427.
- ICPC-2015-Escobar-AvilaVH #categorisation #using
- Unsupervised software categorization using bytecode (JEA, MLV, SH), pp. 229–239.
- POPL-2015-PredaGLM #analysis #automaton #semantics #similarity
- Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables (MDP, RG, AL, IM), pp. 329–341.
- ASE-2015-Vargas-Baldrich #automation #dependence #using
- Automated Tagging of Software Projects Using Bytecode and Dependencies (N) (SVB, MLV, DP), pp. 289–294.
- ICSE-v2-2015-Escobar-Avila #automation #categorisation #library #using
- Automatic Categorization of Software Libraries Using Bytecode (JEA), pp. 784–786.
- DATE-2015-KroeningLMST #effectiveness #low level #verification
- Effective verification of low-level software with nested interrupts (DK, LL, TM, PS, MT), pp. 229–234.
- PLDI-2014-DavidY #code search
- Tracelet-based code search in executables (YD, EY), p. 37.
- FASE-2014-GomesPG #control flow #graph #java #source code
- Sound Control Flow Graph Extraction from Incomplete Java Bytecode Programs (PdCG, AP, DG), pp. 215–229.
- ICSM-2013-AnandEKSBK #abstraction #analysis #framework #memory management #stack
- An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables (KA, KE, AK, MS, RB, ADK), pp. 90–99.
- IFM-2013-SavaryFL #detection #modelling #testing #using #verification
- Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing (AS, MF, JLL), pp. 223–237.
- SEKE-2013-AlshammariFC #java #metric #security #source code
- Security Metrics for Java Bytecode Programs (BA, CJF, DC), pp. 394–399.
- CGO-2013-WangWC #android #named
- Acceldroid: Co-designed acceleration of Android bytecode (CW, YW, MC), p. 10.
- SCAM-2012-Zambon #java #obfuscation
- Aucsmith-Like Obfuscation of Java Bytecode (AZ), pp. 114–119.
- TOOLS-EUROPE-2012-ZhengAMSBVTQM #partial evaluation
- Turbo DiSL: Partial Evaluation for High-Level Bytecode Instrumentation (YZ, DA, LM, AS, WB, AV, PT, ZQ, MM), pp. 353–368.
- FSE-2012-OcteauJM #android #java
- Retargeting Android applications to Java bytecode (DO, SJ, PM), p. 6.
- RTA-2011-BrockschmidtOG #composition #java #proving #recursion #source code #term rewriting #termination
- Modular Termination Proofs of Recursive Java Bytecode Programs by Term Rewriting (MB, CO, JG), pp. 155–170.
- RTA-2010-OttoBEG #analysis #automation #java #term rewriting #termination
- Automated Termination Analysis of Java Bytecode by Term Rewriting (CO, MB, CvE, JG), pp. 259–276.
- PEPM-2010-AlbertGP #generative #java #named #partial evaluation #testing
- PET: a partial evaluation-based test case generation tool for Java bytecode (EA, MGZ, GP), pp. 25–28.
- PEPM-2010-LakhotiaBSM #analysis #obfuscation
- Context-sensitive analysis of obfuscated x86 executables (AL, DRB, AS, AM), pp. 131–140.
- PEPM-2010-RudolphT #code generation #named #runtime #type safety
- Mnemonics: type-safe bytecode generation at run time (JR, PT), pp. 15–24.
- ASE-2010-PasareanuR #execution #java #symbolic computation
- Symbolic PathFinder: symbolic execution of Java bytecode (CSP, NR), pp. 179–180.
- SCAM-2009-HamiltonD #evaluation #java
- An Evaluation of Current Java Bytecode Decompilers (JH, SD), pp. 129–136.
- CC-2009-WarburtonK #architecture #java #optimisation #specification
- From Specification to Optimisation: An Architecture for Optimisation of Java Bytecode (RW, SK), pp. 17–31.
- ISSTA-2009-SaebjornsenWPQS #detection
- Detecting code clones in binary executables (AS, JW, TP, DJQ, ZS), pp. 117–128.
- PASTE-2008-Hubert #java
- A non-null annotation inferencer for Java bytecode (LH), pp. 36–42.
- OOPSLA-2008-KatsBV #compilation #normalisation
- Mixing source and bytecode: a case for compilation by normalization (LCLK, MB, EV), pp. 91–108.
- LOPSTR-2008-AlbertGP #generative #partial evaluation #testing
- Test Data Generation of Bytecode by CLP Partial Evaluation (EA, MGZ, GP), pp. 4–23.
- POPL-2008-NitaGC #formal method #low level #platform
- A theory of platform-dependent low-level software (MN, DG, CC), pp. 209–220.
- QAPL-2008-LambertP #framework #independence #java #platform #virtual machine
- Platform Independent Timing of Java Virtual Machine Bytecode Instructions (JML, JFP), pp. 97–113.
- SAC-2008-AlbertAGPZ #cost analysis #java
- Removing useless variables in cost analysis of Java bytecode (EA, PA, SG, GP, DZ), pp. 368–375.
- SAC-2008-BaveraB #analysis #data flow #policy #type system
- Type-based information flow analysis for bytecode languages with variable object field policies (FB, EB), pp. 347–351.
- CC-2008-LimR #generative
- A System for Generating Static Analyzers for Machine Instructions (JL, TWR), pp. 36–52.
- CC-2008-LogozzoF #analysis #on the #source code
- On the Relative Completeness of Bytecode Analysis Versus Source Code Analysis (FL, MF), pp. 197–212.
- CC-2008-MalePPD #java #verification
- Java Bytecode Verification for @NonNull Types (CM, DJP, AP, CD), pp. 229–244.
- CC-2008-RepsB #analysis
- Improved Memory-Access Analysis for x86 Executables (TWR, GB), pp. 16–35.
- TACAS-2008-BalakrishnanR
- Analyzing Stripped Device-Driver Executables (GB, TWR), pp. 124–140.
- ICST-2008-BardinH #testing
- Structural Testing of Executables (SB, PH), pp. 22–31.
- SCAM-2007-BinderHM #java #re-engineering #runtime #standard
- Reengineering Standard Java Runtime Systems through Dynamic Bytecode Instrumentation (WB, JH, PM), pp. 91–100.
- PADL-2007-AlbertGHP #analysis #java #logic programming #source code #using #verification
- Verification of Java Bytecode Using Analysis and Transformation of Logic Programs (EA, MGZ, LH, GP), pp. 124–139.
- SAS-2007-PayetS #analysis #java
- Magic-Sets Transformation for the Analysis of Java Bytecode (ÉP, FS), pp. 452–467.
- ISMM-2007-AlbertGG #analysis #java
- Heap space analysis for java bytecode (EA, SG, MGZ), pp. 105–116.
- ESOP-2007-AlbertAGPZ #cost analysis #java
- Cost Analysis of Java Bytecode (EA, PA, SG, GP, DZ), pp. 157–172.
- ESOP-2007-BarthePR #java #lightweight #verification
- A Certified Lightweight Non-interference Java Bytecode Verifier (GB, DP, TR), pp. 125–140.
- FASE-2007-BurdyHP #behaviour #design #interface #java #specification
- Preliminary Design of BML: A Behavioral Interface Specification Language for Java Bytecode (LB, MH, MP), pp. 215–229.
- TACAS-2007-ChatterjeeLQR #low level #reachability
- A Reachability Predicate for Analyzing Low-Level Software (SC, SKL, SQ, ZR), pp. 19–33.
- CAV-2007-GulwaniT #abstract domain #low level
- An Abstract Domain for Analyzing Heap-Manipulating Low-Level Software (SG, AT), pp. 379–392.
- VMCAI-2007-BalakrishnanR #named
- DIVINE: DIscovering Variables IN Executables (GB, TWR), pp. 1–28.
- WCRE-2006-LimRL
- Extracting Output Formats from Executables (JL, TWR, BL), pp. 167–178.
- QAPL-2005-BinderH06 #cpu #metric #using
- Using Bytecode Instruction Counting as Portable CPU Consumption Metric (WB, JH), pp. 57–77.
- QAPL-2006-BinderH06a #profiling #using #virtual machine
- Exact and Portable Profiling for the JVM Using Bytecode Instruction Counting (WB, JH), pp. 45–64.
- SAC-2006-AgostaCPS #analysis #compilation #performance
- Selective compilation via fast code analysis and bytecode tracing (GA, SCR, PP, MS), pp. 906–911.
- SAC-2006-BurdyP #java #specification #verification
- Java bytecode specification and verification (LB, MP), pp. 1835–1839.
- SAC-2006-Zanardini #java
- Abstract non-interference in a fragment of Java bytecode (DZ), pp. 1822–1826.
- GPCE-2006-BinderH #flexibility #metric #performance
- Flexible and efficient measurement of dynamic bytecode metrics (WB, JH), pp. 171–180.
- CC-2006-HammondL #java #optimisation
- Loop Transformations in the Ahead-of-Time Optimization of Java Bytecode (SH, DL), pp. 109–123.
- SCAM-2005-SzegediG #java #slicing #source code
- Dynamic Slicing of Java Bytecode Programs (AS, TG), pp. 35–44.
- POPL-2005-AnconaDDZ #compilation #composition #java #polymorphism
- Polymorphic bytecode: compositional compilation for Java-like languages (DA, FD, SD, EZ), pp. 26–37.
- CC-2005-BalakrishnanGRT #framework #named #platform
- CodeSurfer/x86 — A Platform for Analyzing x86 Executables (GB, RG, TWR, TT), pp. 250–254.
- ESOP-2005-WildmoserN #safety
- Asserting Bytecode Safety (MW, TN), pp. 326–341.
- TACAS-2005-SuwimonteerabuthSE #java #named
- jMoped: A Java Bytecode Checker Based on Moped (DS, SS, JE), pp. 541–545.
- CAV-2005-BalakrishnanRKLLMGYCT #model checking
- Model Checking x86 Executables with CodeSurfer/x86 and WPDS++ (GB, TWR, NK, AL, JL, DM, RG, SHY, CHC, TT), pp. 158–163.
- VMCAI-2005-GenaimS #analysis #data flow #java
- Information Flow Analysis for Java Bytecode (SG, FS), pp. 346–362.
- KDD-2004-KolterM #detection #learning
- Learning to detect malicious executables in the wild (JZK, MAM), pp. 470–478.
- ICSE-2004-WangR #java #slicing #source code #using
- Using Compressed Bytecode Traces for Slicing Java Programs (TW, AR), pp. 512–521.
- SAC-2004-BarbutiC #java #verification
- Java bytecode verification on Java cards (RB, SC), pp. 431–438.
- CC-2004-BalakrishnanR #memory management
- Analyzing Memory Accesses in x86 Executables (GB, TWR), pp. 5–23.
- FASE-2004-BartheD #framework #verification
- A Tool-Assisted Framework for Certified Bytecode Verification (GB, GD), pp. 99–113.
- CSL-2004-AmadioCDJ #bound #functional #verification
- A Functional Scenario for Bytecode Verification of Resource Bounds (RMA, SCG, SDZ, LJ), pp. 265–279.
- SCAM-2003-KissJLG #interprocedural #slicing
- Interprocedural Static Slicing of Binary Executables (ÁK, JJ, GL, TG), p. 118–?.
- WCRE-2003-SnavelyDA #reverse engineering
- Unscheduling, Unpredication, Unspeculation: Reverse Engineering Itanium Executables (NS, SKD, GRA), pp. 4–13.
- GPCE-2003-ChibaN #java #performance #tool support
- An Easy-to-Use Toolkit for Efficient Java Bytecode Translators (SC, MN), pp. 364–376.
- CC-2003-GagnonH #effectiveness #java #sequence #thread #using
- Effective Inline-Threaded Interpretation of Java Bytecode Using Preparation Sequences (EG, LJH), pp. 170–184.
- ICFP-2002-SerpetteS #compilation #performance #virtual machine
- Compiling scheme to JVM bytecode: : a performance study (BPS, MS), pp. 259–270.
- SEKE-2002-BarbutiTBF #java #verification
- Fixing the Java bytecode verifier by a suitable type domain (RB, LT, CB, NDF), pp. 377–382.
- SEKE-2002-SantoneV #java #model checking
- Local model checking of Java bytecode (AS, GV), pp. 383–389.
- ASIA-PEPM-2002-AffeldtMSY #runtime
- Supporting objects in run-time bytecode specialization (RA, HM, ES, AY), pp. 50–60.
- PPDP-2002-HiguchiO #calculus #java
- Java bytecode as a typed term calculus (TH, AO), pp. 201–211.
- SAC-2002-BarbutiBF #abstract interpretation #java #security
- Checking security of Java bytecode by abstract interpretation (RB, CB, NDF), pp. 229–236.
- GPCE-2002-TanterSNP #java #semantics
- Altering Java Semantics via Bytecode Manipulation (ÉT, MSD, JN, JMP), pp. 283–298.
- ASPLOS-2002-OgataKN #interpreter #java #optimisation
- Bytecode fetch optimization for a Java interpreter (KO, HK, TN), pp. 58–67.
- CC-2002-MiecznikowskiH #java #problem
- Decompiling Java Bytecode: Problems, Traps and Pitfalls (JM, LJH), pp. 111–127.
- VMCAI-2002-BernardeschiF #abstract interpretation #java #model checking #security
- Combining Abstract Interpretation and Model Checking for Analysing Security Properties of Java Bytecode (CB, NDF), pp. 1–15.
- SCAM-2001-MaggiS #analysis #data flow #java #using
- Using Data Flow Analysis to Infer Type Information in Java Bytecode (PM, RS), p. 213–?.
- ECOOP-2001-TatsuboriSCI #distributed #execution #java #legacy
- A Bytecode Translator for Distributed Execution of “Legacy” Java Software (MT, TS, SC, KI), pp. 236–255.
- PLDI-2001-DeLineF #low level #protocol
- Enforcing High-Level Protocols in Low-Level Software (RD, MF), pp. 59–69.
- PLDI-2001-EvansF
- Bytecode Compression via Profiled Grammar Rewriting (WSE, CWF), pp. 148–155.
- FoSSaCS-2001-Nipkow #verification
- Verified Bytecode Verifiers (TN), pp. 347–363.
- CAV-2001-Leroy #java #overview #perspective #verification
- Java Bytecode Verification: An Overview (XL), pp. 265–285.
- POPL-2000-KnoblockR #java #type system
- Type Elaboration and Subtype Completion for Java Bytecode (TBK, JR), pp. 228–242.
- SAS-2000-GagnonHM #java #performance #static typing
- Efficient Inference of Static Types for Java Bytecode (EG, LJH, GM), pp. 199–219.
- SAC-2000-DoyonD #java #verification
- Verifying Object Initialization in the Java Bytecode Language (SD, MD), pp. 821–830.
- CC-2000-Vallee-RaiGHLPS #framework #java #optimisation #question #using
- Optimizing Java Bytecode Using the Soot Framework: Is It Feasible? (RVR, EG, LJH, PL, PP, VS), pp. 18–34.
- CADE-2000-MichaelA #higher-order #logic #semantics #syntax
- Machine Instruction Syntax and Semantics in Higher Order Logic (NGM, AWA), pp. 7–24.
- OOPSLA-1999-FreundM #framework #java #verification
- A Formal Framework for the Java Bytecode Language and Verifier (SNF, JCM), pp. 147–166.
- TOOLS-EUROPE-1999-Waldron #java #object-oriented #source code
- Dynamic Bytecode Usage by Object Oriented Java Programs (JW), pp. 384–395.
- POPL-1999-OCallahn #java #type system
- A Simple, Comprehensive Type System for Java Bytecode Subroutines (RO), pp. 70–78.
- PPDP-1999-Costa #optimisation #prolog
- Optimising Bytecode Emulation for Prolog (VSC), pp. 261–277.
- ICSE-1999-JacksonW #lightweight #modelling
- Lightweight Extraction of Object Models from Bytecode (DJ, AW), pp. 194–202.
- TACAS-1999-Pusch #higher-order #java #proving #specification #verification
- Proving the Soundness of a Java Bytecode Verifier Specification in Isabelle/HOL (CP), pp. 89–103.
- CAV-1999-BasinFPV #java #model checking #verification
- Java Bytecode Verification by Model Checking (DAB, SF, JP, HV), pp. 491–494.
- IWPC-1998-CifuentesS #semantics #specification
- Specifying the Semantics of Machine Instructions (CC, SS), pp. 126–133.
- OOPSLA-1998-FreundM #java #type system
- A Type System for Object Initialization in the Java Bytecode Language (SNF, JCM), pp. 310–327.
- TOOLS-PACIFIC-1998-MathewSH #java #performance
- Inter-Server Transport Performance of Java Bytecode in a Metacomputing Environment (JAM, AJS, KAH), p. 264–?.
- POPL-1998-StataA #java #type system
- A Type System for Java Bytecode Subroutines (RS, MA), pp. 149–160.
- ICSM-1997-CifuentesF #slicing
- Intraprocedural Static Slicing of Binary Executables (CC, AF), p. 188–?.
- PLDI-1996-Ramsey
- Relocating Machine Instructions by Currying (NR), pp. 226–236.
- CC-1996-FritzonWHSS #array #debugging #distributed #parallel #process
- A Parallel Debugger with Support for Distributed Arrays, Multiple Executables and Dynamic Processes (PF, RW, OH, JS, PS), pp. 341–355.