共 50 条
- [31] Mobile code security by Java']Java bytecode dependence analysis IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2: SMART INFO-MEDIA SYSTEMS, 2004, : 923 - 926
- [32] JBMC: Bounded Model Checking for Java']Java Bytecode (Competition Contribution) TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PT III, 2019, 11429 : 219 - 223
- [33] JBMC: A Bounded Model Checking Tool for Verifying Java']Java Bytecode COMPUTER AIDED VERIFICATION (CAV 2018), PT I, 2018, 10981 : 183 - 190
- [34] SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java']Java Bytecode ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2019, (302): : 16 - 31
- [35] Using data flow analysis to infer type information in Java']Java bytecode FIRST IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2001, : 211 - 222
- [36] MMT: Mutation Testing of Java']Java Bytecode with Model Transformation 2023 ACM/IEEE INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS COMPANION, MODELS-C, 2023, : 35 - 39
- [37] Magic-sets transformation for the analysis of Java']Java bytecode STATIC ANALYSIS, PROCEEDINGS, 2007, 4634 : 452 - +
- [40] Target code generation using the code expansion technique for Java']Java Bytecode PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 752 - 755