*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 1 - 20 *of* 10*number_thousands_separator*408

1

AndroByte: LLM-Driven Privacy Analysis through Bytecode Summarization and Dynamic Dataflow Call Graph Generation
Khatun, Mst Eshita ; Noureddine, Lamine ; Sui, Zhiyong ; et al.
2025 IEEE Annual Computer Security Applications Conference (ACSAC) ACSAC Computer Security Applications Conference (ACSAC), 2025 IEEE Annual. :60-76 Dec, 2025

*Conference*
2

BCFuzz: Bytecode-Driven Fuzzing for JavaScript Engines
Wang, Jiming ; Wu, Chenggang ; Ren, Jikai ; et al.
2025 40th IEEE/ACM International Conference on Automated Software Engineering (ASE) ASE Automated Software Engineering (ASE), 2025 40th IEEE/ACM International Conference on. :1107-1118 Nov, 2025

*Conference*
3

DEPHP: A Source Code Recovery Method for PHP Bytecode with Improved Structural Analysis
Zhao, Shiwu ; Zheng, Ningjun ; Li, Haoyu ; et al.
2025 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) RAID Research in Attacks, Intrusions and Defenses (RAID), 2025 28th International Symposium on. :77-91 Oct, 2025

*Conference*
4

AI-Based Malware Classification in Android Apps Using Vision Transformer (ViT) on Bytecode Images
Rajendran, Megala ; Al-Nussairi, Ahmed Kateb J. ; Abdulhasan, Maki Mahdi ; et al.
2025 Second International Conference on Intelligent Technologies for Sustainable Electric and Communications Systems (iTech SECOM) Intelligent Technologies for Sustainable Electric and Communications Systems (iTech SECOM), 2025 Second International Conference on. :1-6 Oct, 2025

*Conference*
5

PROXiFY: A Bytecode Analysis Tool for Detecting and Classifying Proxy Contracts in Ethereum Smart Contracts
Qasse, Ilham ; Hamdaqa, Mohammad ; Jonsson, Bjorn Tor
2025 40th IEEE/ACM International Conference on Automated Software Engineering (ASE) ASE Automated Software Engineering (ASE), 2025 40th IEEE/ACM International Conference on. :4114-4117 Nov, 2025

*Conference*
6

Boosting Log Observability in Production Systems Through Bytecode-Driven Fault Variable Tracking
Wang, Taizheng ; Wang, Yutong ; Chang, Wei ; et al.
2025 IEEE International Conference on Software Maintenance and Evolution (ICSME) ICSME Software Maintenance and Evolution (ICSME), 2025 IEEE International Conference on. :480-491 Sep, 2025

*Conference*
7

Efficient Vulnerability Detection in Solidity Ethereum Smart Contracts Through Bytecode Analysis Using Customized CNN
Kumar, K. Praveen ; Lubna, Shaik ; Kumar, Pullagurla Tharun
2025 International Conference on Information, Implementation, and Innovation in Technology (I2ITCON) Information, Implementation, and Innovation in Technology (I2ITCON), 2025 International Conference on. :1-7 Jul, 2025

*Conference*
8

Secure Optimizations on Ethereum Bytecode Jump-Free Sequences
Albert, E. ; Genaim, S. ; Kirchner, D. ; et al.
IEEE Transactions on Dependable and Secure Computing IEEE Trans. Dependable and Secure Comput. Dependable and Secure Computing, IEEE Transactions on. 22(4):3676-3691 Aug, 2025

*Academic Journal*
9

Large Language Model-Guided Detection of Java Fileless Webshells via Bytecode Instrumentation
Shuhao, Liu ; Yijun, Liu ; Pei, Guo ; et al.
2025 22nd International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 2025 22nd International Computer Conference on. :1-5 Dec, 2025

*Conference*
10

Pre-trained Models for Bytecode Instructions
Kim, Donggyu ; Kim, Taemin ; Shin, Jiho ; et al.
2025 IEEE Conference on Software Testing, Verification and Validation (ICST) Software Testing, Verification and Validation (ICST), 2025 IEEE Conference on. :608-612 Mar, 2025

*Conference*
11

DALEQ - Explainable Equivalence for Java Bytecode
Dietrich, Jens ; Hassanshahi, Behnaz
2025 40th IEEE/ACM International Conference on Automated Software Engineering (ASE) ASE Automated Software Engineering (ASE), 2025 40th IEEE/ACM International Conference on. :3628-3638 Nov, 2025

*Conference*
12

EPSO: A Caching-Based Efficient Superoptimizer for BPF Bytecode
Zhu, Qian ; Liu, Yuxuan ; Zhu, Ziyuan ; et al.
2025 40th IEEE/ACM International Conference on Automated Software Engineering (ASE) ASE Automated Software Engineering (ASE), 2025 40th IEEE/ACM International Conference on. :2945-2956 Nov, 2025

*Conference*
13

Towards Improving the Performance of Comment Generation Models by Using Bytecode Information
Huang, Y. ; Huang, J. ; Chen, X. ; et al.
IEEE Transactions on Software Engineering IIEEE Trans. Software Eng. Software Engineering, IEEE Transactions on. 51(2):503-520 Feb, 2025

*Academic Journal*
14

JasFree: Grammar-free Program Analysis for JavaScript Bytecode
Jiang, Hao ; Lai, Haiwei ; Wu, Si ; et al.
2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) TRUSTCOM Trust, Security and Privacy in Computing and Communications (TrustCom), 2024 IEEE 23rd International Conference on. :326-337 Dec, 2024

*Conference*
15

Yaksha-Prashna: Understanding eBPF Bytecode Network Function Behavior
Singh, Animesh ; Kumar, K Shiv ; VenkataKeerthy, S. ; et al.

Cryptography and Securit... Programming Languages Software Engineering
*Report*
16

COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts
Li, Wenkai ; Li, Xiaoqi ; Li, Zongwei ; et al.
2024 39th IEEE/ACM International Conference on Automated Software Engineering (ASE) ASE Automated Software Engineering (ASE), 2024 39th IEEE/ACM International Conference on. :1358-1369 Oct, 2024

*Conference*
17

*This result is not displayed to guests*

18

Improving Android Malware Detection with Entropy Bytecode-to-Image Encoding Framework
Makkawy, Saleh J. ; Alblwi, Abdalrahman H. ; De Lucia, Michael J. ; et al.
2024 33rd International Conference on Computer Communications and Networks (ICCCN) Computer Communications and Networks (ICCCN), 2024 33rd International Conference on. :1-9 Jul, 2024

*Conference*
19

LSTM-Based Malware Classification using Bytecode and Opcode Features for IoT Security
Subhameena, M. ; A.Rajesh ; A.Packialatha ; et al.
2025 8th International Conference on Computing Methodologies and Communication (ICCMC) Computing Methodologies and Communication (ICCMC), 2025 8th International Conference on. :68-75 Jul, 2025

*Conference*
20

Esim: EVM Bytecode Similarity Detection Based on Stable-Semantic Graph
Chen, Zhuo ; Ji, Gaoqiang ; He, Yiling ; et al.

Cryptography and Securit... Artificial Intelligence
*Report*

*Filter*