๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Weaknesses in Java bytecode verifier


Publisher
Elsevier Science
Year
1996
Tongue
English
Weight
139 KB
Volume
1996
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


On object initialization in the Java byt
โœ S Doyon; M Debbabi ๐Ÿ“‚ Article ๐Ÿ“… 2000 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 154 KB

Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs can be statically analyzed and validated. The program's behavior is then monitored to prevent potentially malicious opera

Annotating the Java bytecodes in support
โœ Hummel, Joseph; Azevedo, Ana; Kolson, David; Nicolau, Alexandru ๐Ÿ“‚ Article ๐Ÿ“… 1997 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 117 KB ๐Ÿ‘ 2 views

The efficient execution of Java programs presents a challenge to hardware and software designers alike. The difficulty, however, lies with the Java bytecodes. Their model of a simplistic, platform-independent stack machine is well-suited for portability, though at the expense of execution speed. Var

A Type System for Object Initialization
โœ Stephen N. Freund; John C. Mitchell ๐Ÿ“‚ Article ๐Ÿ“… 1998 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 286 KB

In the standard Java implementation, a Java language program is compiled to Java bytecode and this bytecode is then interpreted by the Java Virtual Machine. Since bytecode may be written by hand, or corrupted during network transmission, the Java Virtual Machine contains a bytecode veri er that perf

Efficient exception handling in Java byt
โœ Dong-Heon Jung; JongKuk Park; Sung-Hwan Bae; Jaemok Lee; Soo-Mook Moon ๐Ÿ“‚ Article ๐Ÿ“… 2008 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 627 KB

One of the most promising approaches to Java acceleration in embedded systems is a bytecode-to-C ahead-of-time compiler (AOTC). It improves the performance of a Java virtual machine (JVM) by translating bytecode into C code, which is then compiled into machine code via an existing C compiler. One im

Weaknesses in some multisignature scheme
โœ Wei-Hua He ๐Ÿ“‚ Article ๐Ÿ“… 2002 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 66 KB

The author points out that Laih and Yen's multisignature scheme and Hwang, Chen and Chang's multisignature scheme do not satisfy their security requirements.