To see the other types of publications on this topic, follow the link: Java bytecode.

Dissertations / Theses on the topic 'Java bytecode'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Java bytecode.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Batchelder, Michael Robert. "Java bytecode obfuscation." Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=18300.

Full text
Abstract:
Programs written for machine execution will always be susceptible to information theft. This information can include trademarked algorithms, data embedded in the program, or even data the program accesses. As technology advances computer scientists are building more and more powerful tools for reverse-engineering such as decompilers.The Java programming language is particularly open to reverse-engineering attacks because of its well-defined, open, and portable binary format. We examine one area of better-securing the intellectual property of a Java program; obfuscation. Obfuscation of a progra
APA, Harvard, Vancouver, ISO, and other styles
2

Klein, Gerwin. "Verified Java bytecode verification." [S.l. : s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=967128749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shah, Rahul Arvind. "Vulnerability assessment of Java bytecode." Auburn, Ala., 2005. http://repo.lib.auburn.edu/Send%2012-16-07/SHAH_RAHUL_44.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ochani, Vidit. "Java bytecode to Pilar translator." Kansas State University, 2013. http://hdl.handle.net/2097/16987.

Full text
Abstract:
Master of Science<br>Department of Computing and Information Sciences<br>Robby<br>Software technology is the pivot around which all modern industries revolve. It is not surprising that industries of diverse nature such as finance, business, engineering, medicine, defense, etc. have assimilated sophisticated software in every step of functioning. Subsequently, with larger reach of application, software technology has evolved intricately; thereby thwarting the desirable testing of software. Companies are investing millions of dollars in manual and automated testing, however, software bugs contin
APA, Harvard, Vancouver, ISO, and other styles
5

Doyon, Stéphane. "On the security of Java, the Java bytecode verifier." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0004/MQ41890.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vallee-Rai, Raja. "Soot : a java bytecode optimization framework." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=30836.

Full text
Abstract:
Java provides many attractive features such as platform independence, execution safety, garbage collection and object orientation. These features facilitate application development but are expensive to support; applications written in Java are often much slower than their counterparts written in C or C++. To use these features without having to pay a great performance penalty, sophisticated optimizations and runtime systems are required.<br>We present SOOT, a framework for optimizing Java bytecode. The framework is implemented in Java and supports three intermediate representations for represe
APA, Harvard, Vancouver, ISO, and other styles
7

Pinto, Camara Tarcisio. "Otimização bytecode Java na plataforma J2ME." Universidade Federal de Pernambuco, 2004. https://repositorio.ufpe.br/handle/123456789/2567.

Full text
Abstract:
Made available in DSpace on 2014-06-12T15:59:18Z (GMT). No. of bitstreams: 2 arquivo5023_1.pdf: 1253051 bytes, checksum: 0bb4a72739c259711e027e24c5f3659f (MD5) license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2004<br>Conselho Nacional de Desenvolvimento Científico e Tecnológico<br>Aplicações para os dispositivos móveis, como telefones celulares e pagers, implementadas em J2ME (Java 2 Micro Edition) são desenvolvidas sob severas restrições de tamanho e desempenho do código. A indústria tem adotado ferramentas de otimização, como obfuscators e s
APA, Harvard, Vancouver, ISO, and other styles
8

Modesto, Francisco. "Development of a Java Bytecode Front-End." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-6210.

Full text
Abstract:
<p>The VizzAnalyzer is a powerful software analysis tool. It is able to extract information from various software representations like source code  but also other specifications like UML. The extracted information is input to static analysis of these software projects. One programming language the VizzAnalyzer can extract information from is Java source code.</p><p>Analyzing the source code is sufficient for most of the analysis. But, sometimes it is necessary to analyze compiled classes either because the program is only available in byte-code, or the scope of analysis includes libraries that
APA, Harvard, Vancouver, ISO, and other styles
9

Zabel, Martin. "Effiziente Mehrkernarchitektur für eingebettete Java-Bytecode-Prozessoren." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-84156.

Full text
Abstract:
Die Java-Plattform bietet viele Vorteile für die schnelle Entwicklung komplexer Software. Für die Ausführung des Java-Bytecodes auf eingebetteten Systemen eignen sich insbesondere Java-(Bytecode)-Prozessoren, die den Java-Bytecode als nativen Befehlssatz unterstützen. Die vorliegende Arbeit untersucht detailliert die Gestaltung einer Mehrkernarchitektur für Java-Prozessoren zur effizienten Nutzung der auf Thread-Ebene ohnehin vorhandenen Parallelität eines Java-Programms. Für die Funktionalitäts- und Leistungsbewertung eines Prototyps wird eine eigene Trace-Architektur eingesetzt. Es wird eine
APA, Harvard, Vancouver, ISO, and other styles
10

Zabel, Martin, and Rainer G. Spallek. "SHAP — Scalable Multi-Core Java Bytecode Processor." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-97619.

Full text
Abstract:
Abstract This paper introduces a new embedded Java multi-core architecture which shows a significantly better performance for a large number of cores than the related projects JopCMP and jamuth IP multi-core. The cores gain fast access to the shared heap by a fullduplex bus with pipelined transactions. Each core is equipped with local on-chip memory for the Java operand stack and the method cache to further reduce the memory bandwidth requirements. As opposed to the related projects, synchronization is supported on a per object-basis instead of a single lock. Load balancing is implemented in J
APA, Harvard, Vancouver, ISO, and other styles
11

Quigley, Claire Louise. "A programming logic for Java bytecode programs." Thesis, University of Glasgow, 2004. http://theses.gla.ac.uk/3030/.

Full text
Abstract:
One significant disadvantage of interpreted bytecode languages, such as Java, is their low execution speed in comparison to compiled languages like C. The mobile nature of bytecode adds to the problem, as many checks are necessary to ensure that downloaded code from untrusted sources is rendered as safe as possible. But there do exist ways of speeding up such systems. One approach is to carry out static type checking at load time, as in the case of the Java Bytecode Verifier. This reduces the number of runtime checks that must be done and also allows certain instructions to be replaced by fast
APA, Harvard, Vancouver, ISO, and other styles
12

Zabel, Martin, and Rainer G. Spallek. "SHAP — Scalable Multi-Core Java Bytecode Processor." Technische Universität Dresden, 2009. https://tud.qucosa.de/id/qucosa%3A26171.

Full text
Abstract:
Abstract This paper introduces a new embedded Java multi-core architecture which shows a significantly better performance for a large number of cores than the related projects JopCMP and jamuth IP multi-core. The cores gain fast access to the shared heap by a fullduplex bus with pipelined transactions. Each core is equipped with local on-chip memory for the Java operand stack and the method cache to further reduce the memory bandwidth requirements. As opposed to the related projects, synchronization is supported on a per object-basis instead of a single lock. Load balancing is implemented in J
APA, Harvard, Vancouver, ISO, and other styles
13

Žamberský, Zdeněk. "Zpětný překladač jazyka Java." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2015. http://www.nusl.cz/ntk/nusl-232034.

Full text
Abstract:
The goal was to create decompiler for Java programing language. Decompiler should reconstruct original Java source code from class files, representing its compiled form. First part of thesis focuses on Java langage, its compilation and structure of class file. Then Java Virtual Machine and its instruction set is discussed. After that thesis focuses on decompilation and algoritms designed and used for decompiler realization. Examples of decompiled code are presented.
APA, Harvard, Vancouver, ISO, and other styles
14

Rasi, Stefano. "Manipolazione di Bytecode Java con la libreria ASM." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Find full text
Abstract:
La piattaforma Java è stata introdotta da Sun Microsystem nel 1995 con il motto "write once, run everywhere" (scrivi una volta, esegui ovunque). La macchina virtuale Java o Java Virtual Machine (JVM), insieme al linguaggio omonimo, ha permesso agli sviluppatori di scrivere programmi per dispositivi e sistemi operativi diversi senza dovere modificare il proprio codice, e compilando per tutti questi una sola volta. Questa tecnologia si è rivelata molto utile con la diffusione del web, permettendo l'esecuzione e la condivisione di programmi compilati tra diversi computer in un ottica cross-platf
APA, Harvard, Vancouver, ISO, and other styles
15

Lagerkvist, Mikael Zayenz. "Machine Assisted Reasoning for Multi-Threaded Java Bytecode." Thesis, KTH, Electronic, Computer and Software Systems, ECS, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-9512.

Full text
Abstract:
<p>In this thesis an operational semantics for a subset of the Java Virtual Machine (JVM) is developed and presented. The subset contains standard operations such as control flow, computation, and memory management. In addition, the subset contains a treatment of parallel threads of execution.</p><p> </p><p>The operational semantics are embedded into a $µ$-calculus based proof assistant, called the VeriCode Proof Tool (VCPT). VCPT has been developed at the Swedish Institute of Computer Science (SICS), and has powerful features for proving inductive assertions.</p><p> </p><p>Some examples of pr
APA, Harvard, Vancouver, ISO, and other styles
16

HILLERT, EMILIA. "Obfuscate Java bytecode: an evaluation ofobfuscating transformations using JBCO." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-153909.

Full text
Abstract:
Today, software is one of the most complex and intriguing technologies around us. Software development companies must be able to protect their products in order to stay strong against its competitors and against other threats. One solution to this problem is code obfuscation. This master’s thesis investigates how to protect Java source codeagainst reverse engineering. Three obfuscating transformations was successfully implemented and evaluated within a specific obfuscator named JBCO. The conclusion is that in many cases, code obfuscation provides a higher level of obscurity to a program, which
APA, Harvard, Vancouver, ISO, and other styles
17

Mbhambhu, Tsakani Joseph. "A Java bytecode compiler for the 8051 micro-controller." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52645.

Full text
Abstract:
Thesis (MScEng)--Stellenbosch University, 2002.<br>ENGLISH ABSTRACT: This report describes the development of a Java Bytecode Compiler (JBC) for the 8051 micro-controller. Bytecodes are found in the class file generated when a Java source file is compiled with the java compiler (javac). On Java platforms, the Java Virtual Machine (JVM) interprets and executes the bytecodes. Currently existing Java platforms do not support programming the 8051 using Java. As an 8-bit micro-controller with only 64 KB of total memory, the 8051's word size and memory is too limited to implement a NM. Moreove
APA, Harvard, Vancouver, ISO, and other styles
18

de, Carvalho Gomes Pedro. "Sound Modular Extraction of Control Flow Graphs from Java Bytecode." Licentiate thesis, KTH, Teoretisk datalogi, TCS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-105275.

Full text
Abstract:
Control flow graphs (CFGs) are abstract program models that preserve the control flow information. They have been widely utilized for many static analyses in the past decades. Unfortunately, previous studies about the CFG construction from modern languages, such as Java, have either neglected advanced features that influence the control flow, or do not provide a correctness argument. This is a bearable issue for some program analyses, but not for formal methods, where the soundness of CFGs is a mandatory condition for the verification of safety-critical properties. Moreover, when developing op
APA, Harvard, Vancouver, ISO, and other styles
19

Isber, Elias. "A compiler for all context-free grammars generating Java bytecode." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp04/mq25612.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Arte, Ashish Sturgill David Brian. "Java bytecode compilation for high-performance, platform-independent logical inference." Waco, Tex. : Baylor University, 2005. http://hdl.handle.net/2104/2887.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Gagnon, Etienne. "A portable research framework for the execution of Java bytecode /." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82876.

Full text
Abstract:
Compilation to bytecode paired with interpretation is often used as a technique to easily build prototypes for new programming languages. Some languages, including Java, push this further and use the bytecode layer to isolate programs from the underlying platform. Current state-of-the-art commercial and research Java virtual machines implement advanced just-in-time and adaptive compilation techniques to deliver high-performance execution of Java bytecode. Yet, experimenting with new features such as adding new bytecodes or redesigning the type system can be a daunting task within these
APA, Harvard, Vancouver, ISO, and other styles
22

de, Carvalho Gomes Pedro, and Attilio Picoco. "Sound Extraction of Control-Flow Graphs from open Java Bytecode Systems." KTH, Teoretisk datalogi, TCS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104076.

Full text
Abstract:
Formal verification techniques have been widely deployed as means to ensure the quality of software products. Unfortunately, they suffer with the combinatorial explosion of the state space. That is, programs have a large number of states, sometimes infinite. A common approach to alleviate the problem is to perform the verification over abstract models from the program. Control-flow graphs (CFG) are one of the most common models, and have been widely studied in the past decades. Unfortunately, previous works over modern programming languages, such as Java, have either neglected features that in
APA, Harvard, Vancouver, ISO, and other styles
23

Urquhart, Luke Dominic Mark. "Worst-case resource-usage analysis of Java Card classic editions application bytecode." Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/42538.

Full text
Abstract:
Java Card is the dominant smartcard technology in use today, with over 12 billion Java Card smartcards having shipped globally in the last 15 years. Almost exclusively, the deployed Java Card smartcards are instances of a Classic edition for which garbage collection is an optional component in even the most recent Classic edition. Poorly written or malicious Java Card applications may drain the available memory of a Java Card Virtual Machine to the point the card becomes unusable, and undisciplined use of the transaction mechanism may exhaust the available transaction buffers, resulting in pro
APA, Harvard, Vancouver, ISO, and other styles
24

Vittoria, Claude. "Études et principes de conception d'une machine langage Java : le processeur bytecode." Rennes 1, 2008. ftp://ftp.irisa.fr/techreports/theses/2008/vittoria.pdf.

Full text
Abstract:
La démocratisation d'Internet facilite aujourd'hui le téléchargement des applications. Mais en contrepartie, le risque de corruption de ces applications à des fins malveillantes peut mettre en péril l'intégrité du système qui les exécute et la sécurité des données. Le langage Java apporte des propriétés telles que la vérification de l'intégrité du code, et la sûreté d'exécution des applications pour palier à ces risques. Nous avons cherché à utiliser le langage Java pour construire une plateforme minimale dédiée à son exécution : le processeur bytecode. Nous avons isolé les éléments manquants
APA, Harvard, Vancouver, ISO, and other styles
25

Charreteur, Florence. "Modélisation par contraintes de programmes en bytecode Java pour la génération automatique de tests." Phd thesis, Université Européenne de Bretagne, 2010. http://tel.archives-ouvertes.fr/tel-00497785.

Full text
Abstract:
La vérification des programmes est indispensable pour maintenir un certain niveau de qualité et de fiabilité. Le test est à ce jour le moyen de vérification des logiciels le plus utilisé dans l¤industrie. La programmation par contraintes est vue comme un moyen efficace pour automatiser la génération de données de test. Dans cette thèse nous proposons une modélisation par contraintes de la sémantique du bytecode Java, ainsi qu¤une méthode, basée sur cette modélisation, pour générer automatiquement des données de test. Notre modèle à contraintes de la sémantique d¤un programme en bytecode Java p
APA, Harvard, Vancouver, ISO, and other styles
26

Charreteur, Schadle Florence. "Modélisation par contraintes de programmes en bytecode java pour la génération automatique de tests." Rennes 1, 2010. http://www.theses.fr/2010REN1S019.

Full text
Abstract:
La vérification des programmes est indispensable pour maintenir un certain niveau de qualité et de fiabilité. Le test est à ce jour le moyen de vérification des logiciels le plus utilisé dans l’industrie. La programmation par contraintes est vue comme un moyen efficace pour automatiser la génération de données de test. Dans cette thèse nous proposons une modélisation par contraintes de la sémantique du bytecode Java, ainsi qu’une méthode, basée sur cette modélisation, pour générer automatiquement des données de test. Notre modèle à contraintes de la sémantique d’un programme en bytecode Java p
APA, Harvard, Vancouver, ISO, and other styles
27

Hubert, Laurent. "Foundations and implementation of a tool bench for static analysis of Java bytecode programs." Rennes 1, 2010. http://www.theses.fr/2010REN1S122.

Full text
Abstract:
In this thesis we study the static analysis of Java bytecode and its semantics foundations. The initialization of an information system is a delicate operation where security properties are enforced and invariants installed. Initialization of fields, objects and classes in Java are difficult operations. These difficulties may lead to security breaches and to bugs, and make the static verification of software more difficult. This thesis proposes static analyses to better master initialization in Java. Hence, we propose a null pointer analysis that finely tracks initialization of fields. It allo
APA, Harvard, Vancouver, ISO, and other styles
28

Žárský, Jan. "Instrumentace Java programů, kontrakty pro paralelismus." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445489.

Full text
Abstract:
Contracts for concurrency describe required atomicity of method sequences in concurrent programs. This work proposes a dynamic analyzer to verify programs written in Java against contracts for concurrency. The analyzer was designed to detect violations of parametric contracts with spoilers. The proposed analyzer was implemented as an extension to the RoadRunner framework. Support for accessing the method arguments and return values was added to RoadRunner as a part of the solution. The analyzer was fully implemented and verified on a set of testing programs.
APA, Harvard, Vancouver, ISO, and other styles
29

Zabel, Martin [Verfasser], Rainer G. [Akademischer Betreuer] Spallek, and Djamshid [Akademischer Betreuer] Tavangarian. "Effiziente Mehrkernarchitektur für eingebettete Java-Bytecode-Prozessoren / Martin Zabel. Gutachter: Rainer G. Spallek ; Djamshid Tavangarian. Betreuer: Rainer G. Spallek." Dresden : Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://d-nb.info/1067731520/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Rose, Eva. "Vérification de code d'octet de la machine virtuelle Java : formalisation et implantation." Paris 7, 2002. http://www.theses.fr/2002PA077166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Poncová, Vendula. "Optimalizace velikosti bajtkódu Javy." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255348.

Full text
Abstract:
This paper deals with the Java bytecode size optimization. It describes the Java Virtual Machine and the Java class file format. It also presents some tools for the bytecode manipulation. Using these tools, I have analyzed selected data and found sequences of instructions, that could be optimized. Based on the results of the analysis, I have designed and implemented methods for bytecode size optimization. The bytecode size of the selected data was reduced by roughly 25%.
APA, Harvard, Vancouver, ISO, and other styles
32

Mrázek, Petr. "Generický zpětný překlad programů v bajtkódu do vyšší formy reprezentace." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236178.

Full text
Abstract:
The work describes methods and principles of decompilation, basic information about reverse engineering and its use in both software engineering and engineering in general. Furthermore, it introduces the decompiler developed within the Lissom project at BUT FIT. The goal of the work is to design and implement a retargetable decompiler for bytecode, which extends the original decompiler.
APA, Harvard, Vancouver, ISO, and other styles
33

Savary, Aymerick. "Détection de vulnérabilités appliquée à la vérification de code intermédiaire de Java Card." Thèse, Université de Sherbrooke, 2016. http://hdl.handle.net/11143/9584.

Full text
Abstract:
La vérification de la résistance aux attaques des implémentations embarquées des vérifieurs de code intermédiaire Java Card est une tâche complexe. Les méthodes actuelles n'étant pas suffisamment efficaces, seule la génération de tests manuelle est possible. Pour automatiser ce processus, nous proposons une méthode appelée VTG (Vulnerability Test Generation, génération de tests de vulnérabilité). En se basant sur une représentation formelle des comportements fonctionnels du système sous test, un ensemble de tests d'intrusions est généré. Cette méthode s'inspire des techniques de mutation et de
APA, Harvard, Vancouver, ISO, and other styles
34

Gisel, Daniel. "Eiffel library to generate Java bytecodes." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Professur für Software Engineering /Chair of Software Engineering, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Mathewson, Nicholas A. (Nicholas Albert) 1977. "Verifying information flow control in Java bytecodes." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86523.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.<br>Includes bibliographical references (p. 49).<br>by Nicholas A. Mathewson.<br>M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
36

Lima, Willian dos Santos [UNESP]. "Compilação de bytecodes Java para um ambiente de arquitetura reconfigurável." Universidade Estadual Paulista (UNESP), 2009. http://hdl.handle.net/11449/98650.

Full text
Abstract:
Made available in DSpace on 2014-06-11T19:29:39Z (GMT). No. of bitstreams: 0 Previous issue date: 2009-02-27Bitstream added on 2014-06-13T20:39:05Z : No. of bitstreams: 1 lima_ws_me_sjrp.pdf: 1076568 bytes, checksum: 2b137d2ad2832d04670f7d9c091eb474 (MD5)<br>Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)<br>Durante esta pesquisa, foram investigados conceitos relacionados à computação reconfigurável, processo de compilação e funcionamento da compilação Java, especialmente no que se refere à manipulação de bytecodes. O principal objetivo é a elaboração conceitual de um co
APA, Harvard, Vancouver, ISO, and other styles
37

Lima, Willian dos Santos. "Compilação de bytecodes Java para um ambiente de arquitetura reconfigurável /." São José do Rio Preto : [s.n.], 2009. http://hdl.handle.net/11449/98650.

Full text
Abstract:
Orientador: Renata Spolon Lobato<br>Banca: Eduardo Marques<br>Banca: Aleardo Manacero Junior<br>Resumo: Durante esta pesquisa, foram investigados conceitos relacionados à computação reconfigurável, processo de compilação e funcionamento da compilação Java, especialmente no que se refere à manipulação de bytecodes. O principal objetivo é a elaboração conceitual de um compilador capaz de traduzir bytecodes de um aplicativo Java para código binário obediente ao conjunto de instruções do processador Nios II da Altera®, acompanhada de algumas implementações. Com este compilador, será possível a con
APA, Harvard, Vancouver, ISO, and other styles
38

"Otimização bytecode Java na plataforma J2ME." Tese, Biblioteca Digital de Teses e Dissertações da UFPE, 2004. http://www.bdtd.ufpe.br/tedeSimplificado//tde_busca/arquivo.php?codArquivo=1319.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Klein, Gerwin [Verfasser]. "Verified Java bytecode verification / Gerwin Klein." 2003. http://d-nb.info/967128749/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Wang, Yi-Chieh, and 王繹傑. "Instruction Set Extension for Java Bytecode." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/41889087975284590298.

Full text
Abstract:
碩士<br>國立成功大學<br>工程科學系碩博士班<br>97<br>This thesis is to define a subset of Java bytecodes that are suitable for instruction set extension as the basis of CPU executing Java bytecode directly. The first step is to analyze the usage of each Java bytecode from benchmark programs, and then identify the bytecodes suitable for instruction set extension. These experiments are performed on the open-source Java Virtual Machine, the JamVM and GNU Classpath. These experiments collect the usage of Java bytecodes of the DaCapo benchmark suite. We implemented a profiler inside the JVM to help tracing and analy
APA, Harvard, Vancouver, ISO, and other styles
41

Šafařík, Tomáš. "Preprocesor Java bytecode pro verifikační nástroje." Master's thesis, 2016. http://www.nusl.cz/ntk/nusl-347971.

Full text
Abstract:
Both J2BP and PANDA tools verify compiled Java programs. By now, these tools are not able to process some programs with specific JVM bytecode instruction sequences in the correct way. We described these instruction sequences and proposed their transformations. We developed the new application, called BytecodeTransformer, based on these propositions. This application transforms compiled Java programs and replaces the problematic instruction sequences with some others. Usage of BytecodeTransformer enlarges the set of programs that can be verified by both J2BP and PANDA. We also evaluated Bytecod
APA, Harvard, Vancouver, ISO, and other styles
42

Tsai, Pao-Chin, and 蔡寶進. "Java Bytecode Obfuscator Using Exception Handling Mechanism." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/62949161489806889919.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊工程學系<br>88<br>Recently, mobile computing and enterprise computing are more and more popular over computer networks. In mobile computing, it has become common to distribute mobile programs to the clients at the time when they needed. Because the client platforms are of many types, mobile programs have to be platform-independent. To ensure that, these mobile programs should be in high-level forms and be quite similar to the original source codes. Thus, the common platform-independent codes are easy to be decompiled, and hence they may trap into the risk of malicious reverse eng
APA, Harvard, Vancouver, ISO, and other styles
43

Zabel, Martin. "Effiziente Mehrkernarchitektur für eingebettete Java-Bytecode-Prozessoren." Doctoral thesis, 2011. https://tud.qucosa.de/id/qucosa%3A24907.

Full text
Abstract:
Die Java-Plattform bietet viele Vorteile für die schnelle Entwicklung komplexer Software. Für die Ausführung des Java-Bytecodes auf eingebetteten Systemen eignen sich insbesondere Java-(Bytecode)-Prozessoren, die den Java-Bytecode als nativen Befehlssatz unterstützen. Die vorliegende Arbeit untersucht detailliert die Gestaltung einer Mehrkernarchitektur für Java-Prozessoren zur effizienten Nutzung der auf Thread-Ebene ohnehin vorhandenen Parallelität eines Java-Programms. Für die Funktionalitäts- und Leistungsbewertung eines Prototyps wird eine eigene Trace-Architektur eingesetzt. Es wird eine
APA, Harvard, Vancouver, ISO, and other styles
44

Wu, Jian-Zhi, and 吳劍智. "Bytecode Optimizations on Frame Allocations for Java Processors." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/94953313918078119090.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊工程學系<br>88<br>In this thesis, we describe two techniques to optimize hardware stack machine performances on Java environments. Our hardware model basically is a Java processor with a fixed-size stack cache, which directly implements the method frame activation allocations of a software Java virtual machine (JVM). In the first category, we present a technique to solve the problem about the stack allocations for intra-procedural methods in the Java processor. We put emphasis on the issue with the local variable allocation of the method frame. A structure or object unfolding tec
APA, Harvard, Vancouver, ISO, and other styles
45

Kumar, Ranjan. "Analysis of Java Programs Using Bytecode Based Frameworks." Thesis, 2015. http://ethesis.nitrkl.ac.in/7645/1/98.pdf.

Full text
Abstract:
Java SDG(System dependence Graph) API and JOANA (Java Object-sensitive Analysis) are two bytecode based analysis frameworks available for analyzing object oriented java programs for different applications. In the present era, the continuous evolution of the customer expectations and requirements has resulted in the increase of size of the software. This arises the problems in maintaining software. Both the frameworks i.e Java SDG API and Joana consist of different variety of analysis techniques which are based on dependence graph generation and computation of slices of an input program. In our
APA, Harvard, Vancouver, ISO, and other styles
46

Chen, Chien-Chung, and 陳建忠. "Instruction Level Parallelism Analysis of Java Bytecode with Folding." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/46868680981727304642.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊工程學系<br>86<br>The performance of a stack machine is limited mainly by sequential stackacceses. A performance enhancement mechanism - Stack Operations Folding -was used in Sun Microelectronics' picoJava design. There are another twofolding techniques: fixed- pattern folding and POC model beyond Sun'.In thisthesis, we use the Java bytecode language as the target machine language, analyze the factors affecting ILP, and extract parallelism among bytecodesafter folding using PO
APA, Harvard, Vancouver, ISO, and other styles
47

Chen, Hsiang-Yang, and 陳湘揚. "Control Flow Obfuscation and Protection of Java Bytecode Programs." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/13096136575698138666.

Full text
Abstract:
博士<br>國立成功大學<br>工程科學系碩博士班<br>97<br>Software piracy is the unauthorized copying or distribution of copyrighted software. The money loss for software piracy is still very high in this world now. Software protection is used to against software piracy. Software protection techniques disable part or all the functions of a program upon detecting any unwanted modifications. There are many software protection techniques, such as obfuscation, tamper-proofing, software watermarking, cryptography, etc. Java programs can be easily decompiled and reverse engineered from Java bytecode to Java source code by
APA, Harvard, Vancouver, ISO, and other styles
48

TANG, CHING HUI, and 鄭秦輝. "The Study and Implementation of the Java Bytecode Compiler." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/67329828531522416740.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊工程學系<br>86<br>Java虛擬機器(virtual machine)是由昇陽公司提出的一種支援Java程式 語言的執行環境,具有嚴格安全檢查,跨平台支援等優點。當時昇陽公司 以Java語言發展HotJava WWW Browser來展示Java程式和Applet,結果在 網際網路(Internet)上造成一股流行風潮,加上後來各個公司的WWW Browser都納入Java虛擬機器,因而將Java系統推上了流行的高峰。雖然 Java程式語言本身具有很多的優點,但Java虛擬機器的執行速度過慢,無 法做為大量科學計算,大架構(large-scale)程式,及發展embedding系統 等等的平台。昇陽公司為了解決這個問題,同時採取幾種方法,包括使用 硬體來加速位元組碼的執行,如執行Java Bytecode的CPU(picoJava)及軟 體上更進,如即時編譯(JIT)等技巧。在本論文中,我們研究與實作Java 位元組碼(bytecode)的靜態
APA, Harvard, Vancouver, ISO, and other styles
49

Gopinadhan, Gautam V. S. "Architecture for using Java bytecode for processing Digital Items." 2003. http://www.lib.ncsu.edu/theses/available/etd-12182003-061448/unrestricted/etd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Lin, You-Chen, and 林祐辰. "Implementation of Java 8-compliant InvokeDynamic Bytecode for CVM." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/5g5md9.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊科學與工程研究所<br>107<br>CVM (the J2ME/CDC JIT-capable VM) is a Java virtual machine released by Sun Microsystems for connected devices. Compare with other JVMs, CVM has some features that are suitable for embedded systems, such as, smaller code size, a high performance Just-in-time compiler, and a small 126-class core library for minimal Java application execution. Most importantly, it has been ported to the largest number of different CPU architecture. However, the open-source version of CVM only supports Java 2 Micro Edition (J2ME). After the acquisition of Sun by Oracle, they s
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!