*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 1 - 20 *of* 971

1

Seeing Through EVM Bytecode Obfuscation
Pasquale De Rosa ; Pascal Felber ; Valerio Schiavoni
IEEE Access, Vol 14, Pp 25515-25536 (2026)

Bytecode detectors EVM machine learning malware obfuscation
*Academic Journal*
2

Smart Contract Bytecode Vulnerability Detection Method Based on Heterogeneous Graphs and Instruction Sequences
SONG Jianhua, CAO Kai, ZHANG Yan
Jisuanji kexue, Vol 52, Iss 12, Pp 367-373 (2025)

smart contracts bytecode vulnerability detection heterogeneous graph bytecode instruction seq... deep learning Computer software
*Academic Journal*
3

Examining the effectiveness of transformer-based smart contract vulnerability scan
Balci, Emre ; Aydede, Timucin ; Yilmaz, Gorkem ; et al.
In The Journal of Systems & Software January 2026 231

*Academic Journal*
4

CNN-AutoMIC: Combining convolutional neural network and autoencoder to learn non-linear features for KNN-based malware image classification
Andriani, Simone ; Galantucci, Stefano ; Iannacone, Andrea ; et al.
In Computers & Security September 2025 156

*Academic Journal*
5

Cross-platform development for microcontrollers: design of a virtual machine based portable programming language
Nuru Dashdamirli
Збірник наукових праць Державного університету інфраструктури та технологій: серія "Транспортні системи і технології", Iss 45 (2025)

microcontroller embedded systems virtual machine programming, bytecode Internet of Things concurrency
*Academic Journal*
6

Comparing R Bytecode Compilers Written in R, Java, and Rust (Extended Abstract)
Donat-Bouillud, Pierre ; Křikava, Filip ; Hain, Jakob ; et al.

bytecode compiler
*Academic Journal*
7

ByteSpector: A Verifying Disassembler for EVM Bytecode
Cassez, Franck ; Franck Cassez

EVM bytecode deductive verification Control Flow Graph
*Academic Journal*
8

An alternative to code comment generation? Generating comment from bytecode
Chen, Xiangping ; Chen, Junqi ; Lian, Zhilu ; et al.
In Information and Software Technology March 2025 179

*Academic Journal*
9

Enhancing Smart Contract Vulnerability Detection via Dual-Source Feature Extraction and Fusion
Wang, Xiao ; Tong, Yanxiang ; Dong, Hai ; et al.
In Blockchain: Research and Applications March 2026

*Academic Journal*
10

PyRHOH: A meta-learning analysis framework for determining the impact of compilation on malicious JavaScript identification
Fulkerson, Eli ; Yocam, Eric ; Vaidyan, Varghese ; et al.
In Machine Learning with Applications August 2025

*Academic Journal*
11

MalVis: Large-Scale Bytecode Visualization Framework for Explainable Android Malware Detection
Saleh J. Makkawy ; Michael J. De Lucia ; Kenneth E. Barner
Journal of Cybersecurity and Privacy ; Volume 5 ; Issue 4 ; Pages: 109

Android malware entropy static analysis dynamic analysis behavior analysis
*Academic Journal*
12

Multimodal Deep Learning for Android Malware Classification
James Arrowsmith ; Teo Susnjak ; Julian Jang-Jaccard
Machine Learning and Knowledge Extraction ; Volume 7 ; Issue 1 ; Pages: 23

multimodal deep learning... enhanced malware analysi... graph neural networks function call graphs (FC... efficient multimodal lat... CNN GNN Ensemble
*Academic Journal*
13

Cross-platform development for microcontrollers: design of a virtual machine based portable programming language ; Крос-платформенна розробка для мікроконтролерів: проєктування переносимої мови програмування на основі віртуальної машини
Dashdamirli, Nuru
Transport systems and technologies; No. 45 (2025): Transport systems and technologies ; Транспортные системы и технологии; № 45 (2025): Transport systems and technologies ; Транспортні системи і технології; № 45 (2025): Транспортні системи і технології ; 2617-9059 ; 2617-9040 ; 10.32703/2617-9059-2025-45

мікроконтроллер... вбудовані системи... віртуальна машина... програмування... байт-код паралелізм
*Academic Journal*
14

Climbing the Hill to Understand the Code
Doni Pracner ; Martin P. Ward ; Natasa Sukur ; et al.
IEEE Access, Vol 12, Pp 56847-56859 (2024)

Automated code transform... bytecode assembly program comprehension Electrical engineering.... TK1-9971
*Academic Journal*
15

Java Bytecode Normalization for Code Similarity Analysis
Schott, Stefan ; Ponta, Serena Elisa ; Fischer, Wolfram ; et al.

Bytecode Java Compiler Code Similarity Analysis
*Academic Journal*
16

Block-gram: Mining knowledgeable features for efficiently smart contract vulnerability detection
Xie, Xueshuo ; Wang, Haolong ; Jian, Zhaolong ; et al.
In Digital Communications and Networks July 2023

*Academic Journal*
17

Enhancing The Opcode Parsing Approach for Automated Unit Test Generation ; Otomatik Birim Test Oluşturmak İçin Opcode Ayrıştırma Yaklaşımının Geliştirilmesi
GENÇ, Sevdanur
Kuantum Teknolojileri ve Enformatik Araştırmaları Dergisi; Vol. 2 No. 1 (2024): Journal of Quantum Technologies and Informatics Research; 15-29 ; Kuantum Teknolojileri ve Enformatik Araştırmaları Dergisi; Cilt 2 Sayı 1 (2024): Kuantum Teknolojileri ve Enformatik Araştırmaları Dergisi; 15-29 ; 3023-4735

Opcode Ayrıştırma Yöntem... Birim Test Üretimi Bytecode Java Agent Yazılım Testi The Opcode Parsing Metho...
*Academic Journal*
18

Java Bytecode Normalization for Code Similarity Analysis (Artifact)
Schott, Stefan ; Ponta, Serena Elisa ; Fischer, Wolfram ; et al.

Bytecode Java Compiler Code Similarity Analysis
*Academic Journal*
19

Bytecode-based approach for Ethereum smart contract classification
Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG
网络与信息安全学报, Vol 8, Iss 5, Pp 111-120 (2022)

blockchain smart contract bytecode classification Electronic computers. Co... QA75.5-76.95
*Academic Journal*
20

Jadeite: A novel image-behavior-based approach for Java malware detection using deep learning
Obaidat, Islam ; Sridhar, Meera ; Pham, Khue M. ; et al.
In Computers & Security February 2022 113

*Academic Journal*

*Filter*