Java mobile code security by bytecode behavior analysis.
Gaowei BianKen NakayamaYoshitake KobayashiMamoru MaekawaPublished in: IASTED Conf. on Software Engineering and Applications (2004)
Keyphrases
- behavior analysis
- java card
- byte code
- java virtual machine
- source code
- static analysis
- smart card
- android application
- java bytecode
- smart phones
- countermeasures
- virtual machine
- java programs
- mobile devices
- mobile phone
- program execution
- surveillance system
- open source
- security requirements
- anomaly detection
- information security
- control flow
- elliptic curve
- security model
- behavioral model
- mobile applications
- social insects
- access control
- garbage collection
- mobile agent system
- context aware
- code examples
- multi class
- learning algorithm
- efficient execution
- preprocessing
- image sequences
- feature selection