Sciweavers

107 search results - page 1 / 22
» Reverse Execution of Java Bytecode
Sort
View
CJ
2002
65views more  CJ 2002»
13 years 10 months ago
Reverse Execution of Java Bytecode
Jonathan J. Cook
WISTP
2007
Springer
14 years 5 months ago
Reverse Engineering Java Card Applets Using Power Analysis
Abstract. Power analysis on smart cards is widely used to obtain information about implemented cryptographic algorithms. We propose similar methodology for Java Card applets revers...
Dennis Vermoen, Marc F. Witteman, Georgi Gaydadjie...
COMPSAC
2000
IEEE
14 years 3 months ago
Dependence Analysis of Java Bytecode
Understanding program dependencies in a computer program is essential for many software engineering tasks such as program understanding, testing, debugging, reverse engineering, a...
Jianjun Zhao
ENTCS
2008
144views more  ENTCS 2008»
13 years 10 months ago
Platform Independent Timing of Java Virtual Machine Bytecode Instructions
The accurate measurement of the execution time of Java bytecode is one factor that is important in order to estimate the total execution time of a Java application running on a Ja...
Jonathan M. Lambert, James F. Power
JVM
2001
97views Education» more  JVM 2001»
14 years 7 days ago
Deterministic Execution of Java's Primitive Bytecode Operations
For the application of Java in realtime and safety critical domains, an analysis of the worst-case execution times of primitive Java operations is necessary. All primitive operati...
Fridtjof Siebert, Andy Walter