Full-text articles, eBooks and much more from EBSCO Discovery Service

Not found what you are looking for? Check in Onleihe or make a Purchase Request

Showing 1 - 13 of 13

1

Java bytecode as a typed term calculus
Higuchi, Tomoyuki ; Ohori, Atsushi
Proceedings of the 4th ACM SIGPLAN international conference on Principles and practice of declarative programming. :201-211

Conference
Save to List
2

A new type system for JVM lock primitives
Iwama, Futoshi ; Kobayashi, Naoki
Proceedings of the ASIAN symposium on Partial evaluation and semantics-based program manipulation. :71-82

Conference
Save to List
3

Comparing Java and .NET security: Lessons learned and missed
Paul, Nathanael ; Evans, David
In Computers & Security 2006 25(5):338-350

Academic journal
Save to List
4

Vulnerability detection into Java Card bytecode verifier
Savary, Aymerick

Sécurité Java Card Vérification de code int... Test d'intrusion Mutation de spécificatio... Test à base de modèle
Dissertation/ Thesis
Save to List
5

Vulnerability detection into Java Card bytecode verifier ; Détection de vulnérabilités appliquée à la vérification de code intermédiaire de Java Card
Savary, Aymerick ; XLIM (XLIM) ; Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS) ; et al.
https://theses.hal.science/tel-01369017 ; Système d'exploitation [cs.OS]. Université de Limoges; Université de Sherbrooke (Québec, Canada), 2016. Français. ⟨NNT : 2016LIMO0048⟩.

ProB Event-B Model-Based Testing Specification Mutation Penetration Testing Bytecode Verifier
Dissertation/ Thesis
Save to List
6

Détection de vulnérabilités appliquée à la vérification de code intermédiaire de Java Card ; Vulnerability detection into Java Card bytecode verifier
Savary, Aymerick ; Limoges ; Université de Sherbrooke (Québec, Canada) ; et al.

Sécurité Java Card Vérification de code int... Test d'intrusion Mutation de spécificatio... Test à base de modèle
Dissertation/ Thesis
Save to List
7

Checking secure information flow in Java bytecode by code transformation and standard bytecode verification
BERNARDESCHI, CINZIA ; DE FRANCESCO, NICOLETTA ; LETTIERI, GIUSEPPE ; et al.

Bytecode verifier Information flow Java bytecode Security
Academic journal
Save to List
8

Checking secure information flow in java bytecode by code transformation and standard bytecode verification
C. Bernardeschi ; N. De Francesco ; G. Lettieri ; et al.
http://www2.ing.unipi.it/~o1103499/papers/spe04.pdf.

Security Information Flow Java bytecode Bytecode Verifier
Academic journal
Save to List
9

Futoshi IWAMA and Naoki KOBAYASHI
The Pennsylvania State University CiteSeerX Archives
http://www.kb.ecei.tohoku.ac.jp/~koba/papers/jvmlock-ngc.pdf.

Java Bytecode Verifier Lock
Academic journal
Save to List
10

Checking Secure Information Flow in Java Bytecode by Code Transformation and Standard Bytecode Verification
C. Bernardeschi ; N. De Francesco ; G. Lettieri ; et al.
http://www.ing.unipi.it/~o1103499/papers/spe04.ps.gz.

Security Information Flow Java bytecode Bytecode Verifier
Academic journal
Save to List
11

This result is not available to guest users.

12

This result is not available to guest users.

13

論理学的アプローチによるJAVA仮想機械の諸性質の分析および実装への応用
樋口, 智之 ; ひぐち, ともゆき

JAVA仮想機械,バイトコードベリファイア,型シ... Java virtual machine,byt...
Save to List

Filter