AbstractOne of the biggest obstacles in the formalisation of the Java bytecode is that the language consists of 200 instructions. However, a rigorous handling of a programming language in the context of program verification and error detection requires a formalism which is compact in size. Therefore, the actual Java bytecode instruction set is never used in the context. Instead, the existing formalisations usually cover a ‘representative’ set of instructions. This paper describes how to reduce the number of instructions in a systematic and rigorous way into a manageable set of more general operations that cover the full functionality of the Java bytecode. The factorisation of the instruction set is based on the use of the runtime structures...
This paper deals with the Java bytecode size optimization. It describes the Java Virtual Machine and...
This paper presents a sound type system for a large subset of the Java bytecode language including c...
We propose a framework for establishing the correctness of untrusted Java bytecode components w.r.t....
New toolkits that parse, analyze, and transform Java Bytecode are frequently developed from scratch ...
The Java virtual machine embodies a verifier that performs a set of checks on Java bytecode programs...
. In this chapter we formally specify a subset of Java Virtual Machine (JVM) instructions for object...
Java applets run on a Virtual Machine that checks code's integrity and correctness before execu...
Optimizing Java byte code is complicated by the fact that it uses a stack-based execution model. Ch...
The Java virtual machine executes stack-based bytecode. The intensive use of an operand stack has be...
The Java Virtual Machine embodies a verifier that performs a set of checks on Java bytecode programs...
Bytecode verification is one of the key security functions of several architectures for mobile and e...
Java bytecode is widely used as binary program representation on many different hardware platforms. ...
In this paper we present Jimple, a 3-address intermediate representation that has been designed to s...
Compilation to bytecode paired with interpretation is often used as a technique to easily build pro...
In the standard Java implementation, a Java language program is compiled to Java bytecode and this b...
This paper deals with the Java bytecode size optimization. It describes the Java Virtual Machine and...
This paper presents a sound type system for a large subset of the Java bytecode language including c...
We propose a framework for establishing the correctness of untrusted Java bytecode components w.r.t....
New toolkits that parse, analyze, and transform Java Bytecode are frequently developed from scratch ...
The Java virtual machine embodies a verifier that performs a set of checks on Java bytecode programs...
. In this chapter we formally specify a subset of Java Virtual Machine (JVM) instructions for object...
Java applets run on a Virtual Machine that checks code's integrity and correctness before execu...
Optimizing Java byte code is complicated by the fact that it uses a stack-based execution model. Ch...
The Java virtual machine executes stack-based bytecode. The intensive use of an operand stack has be...
The Java Virtual Machine embodies a verifier that performs a set of checks on Java bytecode programs...
Bytecode verification is one of the key security functions of several architectures for mobile and e...
Java bytecode is widely used as binary program representation on many different hardware platforms. ...
In this paper we present Jimple, a 3-address intermediate representation that has been designed to s...
Compilation to bytecode paired with interpretation is often used as a technique to easily build pro...
In the standard Java implementation, a Java language program is compiled to Java bytecode and this b...
This paper deals with the Java bytecode size optimization. It describes the Java Virtual Machine and...
This paper presents a sound type system for a large subset of the Java bytecode language including c...
We propose a framework for establishing the correctness of untrusted Java bytecode components w.r.t....