Checking secure information flow in Java bytecode by code transformation and standard bytecode verification.
Cinzia BernardeschiNicoletta De FrancescoGiuseppe LettieriLuca MartiniPublished in: Softw. Pract. Exp. (2004)
Keyphrases
- java bytecode
- information flow
- virtual machine
- java virtual machine
- programming language
- method invocation
- efficient execution
- intermediate representation
- garbage collection
- memory management
- communication networks
- social networks
- program execution
- supply chain
- information systems
- multi threaded
- information security
- operating system