Efficient Bytecode Verification Using Immediate Postdominators in Control Flow Graphs: Extended Abstract
暂无分享,去创建一个
Nicoletta De Francesco | Luca Martini | Cinzia Bernardeschi | L. Martini | C. Bernardeschi | N. Francesco
[1] Xavier Leroy,et al. Java Bytecode Verification: Algorithms and Formalizations , 2003, Journal of Automated Reasoning.
[2] James Gosling,et al. Java Intermediate Bytecode , 1995, Intermediate Representations Workshop.
[3] James Gosling,et al. Java Intermediate Bytecode , 1995, Intermediate Representations Workshop.
[4] GoslingJames. Java intermediate bytecodes , 1995 .
[5] Frank Yellin,et al. Low Level Security in Java , 1995, WWW.
[6] Eva Rose,et al. Lightweight Bytecode Verification , 2004, Journal of Automated Reasoning.
[7] Gary A. Kildall,et al. A unified approach to global program optimization , 1973, POPL.
[8] LeroyXavier. Bytecode verification on Java smart cards , 2002 .
[9] Xavier Leroy,et al. Bytecode verification on Java smart cards , 2002 .
[10] Frank Yellin,et al. The Java Virtual Machine Specification , 1996 .
[11] Thomas Ball,et al. What's in a region?: or computing control dependence regions in near-linear time for reducible control flow , 1993, LOPL.