*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 1 - 20 *of* 18*number_thousands_separator*796

1

Yaksha-Prashna: Understanding eBPF Bytecode Network Function Behavior
Singh, Animesh ; Kumar, K Shiv ; VenkataKeerthy, S. ; et al.

Cryptography and Securit... Programming Languages Software Engineering
*Report*
2

Esim: EVM Bytecode Similarity Detection Based on Stable-Semantic Graph
Chen, Zhuo ; Ji, Gaoqiang ; He, Yiling ; et al.

Cryptography and Securit... Artificial Intelligence
*Report*
3

Bytecode-centric Detection of Known-to-be-vulnerable Dependencies in Java Projects
Schott, Stefan ; Ponta, Serena Elisa ; Fischer, Wolfram ; et al.

Software Engineering Cryptography and Securit...
*Report*
4

AndroByte: LLM-Driven Privacy Analysis through Bytecode Summarization and Dynamic Dataflow Call Graph Generation
Khatun, Mst Eshita ; Noureddine, Lamine ; Sui, Zhiyong ; et al.

Cryptography and Securit...
*Report*
5

Seeing Through EVM Bytecode Obfuscation
Pasquale De Rosa ; Pascal Felber ; Valerio Schiavoni
IEEE Access, Vol 14, Pp 25515-25536 (2026)

Bytecode detectors EVM machine learning malware obfuscation
*Academic Journal*
6

EPSO: A Caching-Based Efficient Superoptimizer for BPF Bytecode
Zhu, Qian ; Liu, Yuxuan ; Zhu, Ziyuan ; et al.

Software Engineering Programming Languages
*Report*
7

Byte by Byte: Unmasking Browser Fingerprinting at the Function Level Using V8 Bytecode Transformers
Bahrami, Pouneh Nikkhah ; Cutler, Dylan ; Bilogrevic, Igor

Cryptography and Securit...
*Report*
8

Smart Contract Bytecode Vulnerability Detection Method Based on Heterogeneous Graphs and Instruction Sequences
SONG Jianhua, CAO Kai, ZHANG Yan
Jisuanji kexue, Vol 52, Iss 12, Pp 367-373 (2025)

smart contracts bytecode vulnerability detection heterogeneous graph bytecode instruction seq... deep learning Computer software
*Academic Journal*
9

DALEQ -- Explainable Equivalence for Java Bytecode
Dietrich, Jens ; Hassanshahi, Behnaz

Cryptography and Securit...
*Report*
10

Building Reuse-Sensitive Control Flow Graphs (CFGs) for EVM Bytecode
Wang, Dingding ; He, Jianting ; Yang, Yizheng ; et al.

Computer Science - Softw...
*Report*
11

Empirically Evaluating the Use of Bytecode for Diversity-Based Test Case Prioritisation
Elgendy, Islam T. ; Hierons, Robert M. ; McMinn, Phil

Computer Science - Softw...
*Report*
12

SmartBugBert: BERT-Enhanced Vulnerability Detection for Smart Contract Bytecode
Bu, Jiuyang ; Li, Wenkai ; Li, Zongwei ; et al.

Cryptography and Securit...
*Report*
13

Automating Comment Generation for Smart Contract from Bytecode
Xiang, Jianhang ; Gao, Zhipeng ; Bao, Lingfeng ; et al.

Computer Science - Softw...
*Report*
14

An alternative to code comment generation? Generating comment from bytecode
Chen, Xiangping ; Chen, Junqi ; Lian, Zhilu ; et al.
In Information and Software Technology March 2025 179

*Academic Journal*
15

*This result is not displayed to guests*

16

*This result is not displayed to guests*

17

Verifying Functional Correctness Properties At the Level of Java Bytecode
Paganoni, Marco ; Furia, Carlo A.

Computer Science - Progr... Computer Science - Logic...
*Report*
18

Reasoning About Exceptional Behavior At the Level of Java Bytecode
Paganoni, Marco ; Furia, Carlo A.

Computer Science - Progr... Computer Science - Logic...
*Report*
19

PonziLens+: Visualizing Bytecode Actions for Smart Ponzi Scheme Identification
Wen, Xiaolin ; Nguyen, Tai D. ; Ruan, Shaolun ; et al.

Computer Science - Human...
*Report*
20

*This result is not displayed to guests*


*Filter*