Sciweavers

107 search results - page 20 / 22
» Reverse Execution of Java Bytecode
Sort
View
VEE
2005
ACM
143views Virtualization» more  VEE 2005»
14 years 3 months ago
Virtual machine showdown: stack versus registers
Virtual machines (VMs) are commonly used to distribute programs in an architecture-neutral format, which can easily be interpreted or compiled. A long-running question in the desi...
Yunhe Shi, David Gregg, Andrew Beatty, M. Anton Er...
MSR
2006
ACM
14 years 3 months ago
Micro pattern evolution
When analyzing the evolution history of a software project, we wish to develop results that generalize across projects. One approach is to analyze design patterns, permitting char...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.
VEE
2010
ACM
229views Virtualization» more  VEE 2010»
14 years 4 months ago
VMKit: a substrate for managed runtime environments
Managed Runtime Environments (MREs), such as the JVM and the CLI, form an attractive environment for program execution, by providing portability and safety, via the use of a bytec...
Nicolas Geoffray, Gaël Thomas, Julia L. Lawal...
SEKE
2010
Springer
13 years 8 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
SIGSOFT
2010
ACM
13 years 7 months ago
Basset: a tool for systematic testing of actor programs
This paper presents Basset, a tool for systematic testing of JVM-based actor programs. The actor programming model offers a promising approach for developing reliable concurrent a...
Steven Lauterburg, Rajesh K. Karmani, Darko Marino...