Java Mobile Code Dynamic Verification by Bytecode Modification for Host Confidentiality.
Dan LuYoshitake KobayashiKen NakayamaMamoru MaekawaPublished in: Int. J. Netw. Secur. (2008)
Keyphrases
- java bytecode
- source code
- java virtual machine
- java card
- byte code
- virtual machine
- java programs
- mobile devices
- programming language
- smart card
- android application
- open source
- garbage collection
- static analysis
- efficient execution
- information security
- program execution
- database systems
- dynamic environments
- information leakage
- model checking
- memory management
- software systems
- database applications
- intermediate representation
- programs written
- countermeasures
- mobile computing