*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 1 - 20 *of* 2*number_thousands_separator*038

1

Interaction-Aware Vulnerability Detection in Smart Contract Bytecodes
Li, W. ; Li, X. ; Mao, Y. ; et al.
IEEE Transactions on Dependable and Secure Computing IEEE Trans. Dependable and Secure Comput. Dependable and Secure Computing, IEEE Transactions on. 23(1):298-315 Jan, 2026

*Academic Journal*
2

AndroByte: LLM-Driven Privacy Analysis through Bytecode Summarization and Dynamic Dataflow Call Graph Generation
Khatun, Mst Eshita ; Noureddine, Lamine ; Sui, Zhiyong ; et al.
2025 IEEE Annual Computer Security Applications Conference (ACSAC) ACSAC Computer Security Applications Conference (ACSAC), 2025 IEEE Annual. :60-76 Dec, 2025

*Conference*
3

Robust Image based Malware Detection using MobileNet and Multilayer Perceptron model
Kumar, Sanjeev ; Sapru, Yudhishthira ; Sapru, Sugandha
2025 IEEE 7th International Conference on Computing, Communication and Automation (ICCCA) Computing, Communication and Automation (ICCCA), 2025 IEEE 7th International Conference on. :1-6 Nov, 2025

*Conference*
4

BCFuzz: Bytecode-Driven Fuzzing for JavaScript Engines
Wang, Jiming ; Wu, Chenggang ; Ren, Jikai ; et al.
2025 40th IEEE/ACM International Conference on Automated Software Engineering (ASE) ASE Automated Software Engineering (ASE), 2025 40th IEEE/ACM International Conference on. :1107-1118 Nov, 2025

*Conference*
5

PROXiFY: A Bytecode Analysis Tool for Detecting and Classifying Proxy Contracts in Ethereum Smart Contracts
Qasse, Ilham ; Hamdaqa, Mohammad ; Jonsson, Bjorn Tor
2025 40th IEEE/ACM International Conference on Automated Software Engineering (ASE) ASE Automated Software Engineering (ASE), 2025 40th IEEE/ACM International Conference on. :4114-4117 Nov, 2025

*Conference*
6

DEPHP: A Source Code Recovery Method for PHP Bytecode with Improved Structural Analysis
Zhao, Shiwu ; Zheng, Ningjun ; Li, Haoyu ; et al.
2025 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) RAID Research in Attacks, Intrusions and Defenses (RAID), 2025 28th International Symposium on. :77-91 Oct, 2025

*Conference*
7

AI-Based Malware Classification in Android Apps Using Vision Transformer (ViT) on Bytecode Images
Rajendran, Megala ; Al-Nussairi, Ahmed Kateb J. ; Abdulhasan, Maki Mahdi ; et al.
2025 Second International Conference on Intelligent Technologies for Sustainable Electric and Communications Systems (iTech SECOM) Intelligent Technologies for Sustainable Electric and Communications Systems (iTech SECOM), 2025 Second International Conference on. :1-6 Oct, 2025

*Conference*
8

AMADel: Android Malware Analysis Using Deep Learning
Johri, Siddharth ; Bose, Adyot ; Jha, Shaaswat K ; et al.
2025 12th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2025 12th International Conference on. :1-5 Sep, 2025

*Conference*
9

Levels of Binary Equivalence for the Comparison of Binaries from Alternative Builds
Dietrich, Jens ; White, Tim ; Hassanshahi, Behnaz ; et al.
2025 IEEE International Conference on Software Maintenance and Evolution (ICSME) ICSME Software Maintenance and Evolution (ICSME), 2025 IEEE International Conference on. :576-587 Sep, 2025

*Conference*
10

Boosting Log Observability in Production Systems Through Bytecode-Driven Fault Variable Tracking
Wang, Taizheng ; Wang, Yutong ; Chang, Wei ; et al.
2025 IEEE International Conference on Software Maintenance and Evolution (ICSME) ICSME Software Maintenance and Evolution (ICSME), 2025 IEEE International Conference on. :480-491 Sep, 2025

*Conference*
11

Quiet Watchdogs: CNN-Based Whispering Machines for Android Malware Identification
Sarkar, Amlan Kumar ; Kumar, Pawan ; Rai, Kajal
2025 International Conference on Intelligent and Secure Engineering Solutions (CISES) Intelligent and Secure Engineering Solutions (CISES), 2025 International Conference on. :1366-1372 Aug, 2025

*Conference*
12

MiniLib: A flow analysis–based approach for attack surface reduction through software debloating
Kopanias, Loukas ; Sotiropoulos, Panagiotis ; Kolokotronis, Nicholas ; et al.
2025 IEEE International Conference on Cyber Security and Resilience (CSR) Cyber Security and Resilience (CSR), 2025 IEEE International Conference on. :260-266 Aug, 2025

*Conference*
13

Efficient Vulnerability Detection in Solidity Ethereum Smart Contracts Through Bytecode Analysis Using Customized CNN
Kumar, K. Praveen ; Lubna, Shaik ; Kumar, Pullagurla Tharun
2025 International Conference on Information, Implementation, and Innovation in Technology (I2ITCON) Information, Implementation, and Innovation in Technology (I2ITCON), 2025 International Conference on. :1-7 Jul, 2025

*Conference*
14

Research on Smart Contract Vulnerability Detection Based on Graph Neural Networks
Li, An
2025 5th International Conference on Artificial Intelligence, Big Data and Algorithms (CAIBDA) Artificial Intelligence, Big Data and Algorithms (CAIBDA), 2025 5th International Conference on. :1065-1070 Jun, 2025

*Conference*
15

SmartTrans: Advanced Similarity Analysis for Detecting Vulnerabilities in Ethereum Smart Contracts
Chen, L. ; Wang, H. ; Zhou, Y. ; et al.
IEEE Transactions on Dependable and Secure Computing IEEE Trans. Dependable and Secure Comput. Dependable and Secure Computing, IEEE Transactions on. 22(4):4412-4427 Aug, 2025

*Academic Journal*
16

Secure Optimizations on Ethereum Bytecode Jump-Free Sequences
Albert, E. ; Genaim, S. ; Kirchner, D. ; et al.
IEEE Transactions on Dependable and Secure Computing IEEE Trans. Dependable and Secure Comput. Dependable and Secure Computing, IEEE Transactions on. 22(4):3676-3691 Aug, 2025

*Academic Journal*
17

Pre-trained Models for Bytecode Instructions
Kim, Donggyu ; Kim, Taemin ; Shin, Jiho ; et al.
2025 IEEE Conference on Software Testing, Verification and Validation (ICST) Software Testing, Verification and Validation (ICST), 2025 IEEE Conference on. :608-612 Mar, 2025

*Conference*
18

Methodology for Embedding a Digital Watermark in Java Application Class Files Resistant to Decompilation Attacks Aimed at Its Destruction
Sharikov, Pavel ; Krasov, Andrey ; Chechulin, Andrey
2025 International Russian Smart Industry Conference (SmartIndustryCon) Russian Smart Industry Conference (SmartIndustryCon), 2025 International. :906-911 Mar, 2025

*Conference*
19

Hanoi Puzzle, Complexity Analysis of the Recursive, Iterative, and RBC Approaches
El Ghabzouri, Mohammad ; Es Salhi, Abdenacer
2025 IEEE Integrated STEM Education Conference (ISEC) Integrated STEM Education Conference (ISEC), 2025 IEEE. :1-4 Mar, 2025

*Conference*
20

Updatable Corpus of Compiled Java Projects with Dependencies
Beskid, Pavol ; Sulir, Matus
2025 IEEE 23rd World Symposium on Applied Machine Intelligence and Informatics (SAMI) Applied Machine Intelligence and Informatics (SAMI), 2025 IEEE 23rd World Symposium on. :000237-000242 Jan, 2025

*Conference*

*Filter*