{"id":"https://openalex.org/W2900301613","doi":"https://doi.org/10.1109/icmcs.2018.8525962","title":"Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs","display_name":"Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2900301613","doi":"https://doi.org/10.1109/icmcs.2018.8525962","mag":"2900301613"},"language":"en","primary_location":{"id":"doi:10.1109/icmcs.2018.8525962","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmcs.2018.8525962","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058867763","display_name":"Safaa Achour","orcid":null},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Safaa Achour","raw_affiliation_strings":["LASTID Laboratory, Ibn Tofail University, K\u00e9nitra, Morocco"],"affiliations":[{"raw_affiliation_string":"LASTID Laboratory, Ibn Tofail University, K\u00e9nitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088541702","display_name":"Mohammed Benattou","orcid":"https://orcid.org/0000-0002-9659-5138"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mohammed Benattou","raw_affiliation_strings":["LASTID Laboratory, Ibn Tofail University, K\u00e9nitra, Morocco"],"affiliations":[{"raw_affiliation_string":"LASTID Laboratory, Ibn Tofail University, K\u00e9nitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5058867763"],"corresponding_institution_ids":["https://openalex.org/I3121676899"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18642264,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8706554174423218},{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.8146481513977051},{"id":"https://openalex.org/keywords/java-bytecode","display_name":"Java bytecode","score":0.7938947677612305},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.7571873664855957},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.6708856225013733},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.6286244988441467},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5117349624633789},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.4875938296318054},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4726991653442383},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4628452658653259},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.45300567150115967},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.36604583263397217},{"id":"https://openalex.org/keywords/java-applet","display_name":"Java applet","score":0.26863348484039307},{"id":"https://openalex.org/keywords/java-annotation","display_name":"Java annotation","score":0.19684523344039917},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08226412534713745}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8706554174423218},{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.8146481513977051},{"id":"https://openalex.org/C2777472213","wikidata":"https://www.wikidata.org/wiki/Q137496","display_name":"Java bytecode","level":5,"score":0.7938947677612305},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.7571873664855957},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.6708856225013733},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6286244988441467},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5117349624633789},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.4875938296318054},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4726991653442383},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4628452658653259},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.45300567150115967},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.36604583263397217},{"id":"https://openalex.org/C15524039","wikidata":"https://www.wikidata.org/wiki/Q865817","display_name":"Java applet","level":3,"score":0.26863348484039307},{"id":"https://openalex.org/C168702491","wikidata":"https://www.wikidata.org/wiki/Q567345","display_name":"Java annotation","level":4,"score":0.19684523344039917},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08226412534713745},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icmcs.2018.8525962","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmcs.2018.8525962","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1160404560","https://openalex.org/W1539039010","https://openalex.org/W1577504098","https://openalex.org/W2005274700","https://openalex.org/W2036526036","https://openalex.org/W2040807797","https://openalex.org/W2041687550","https://openalex.org/W2047694629","https://openalex.org/W2054193570","https://openalex.org/W2073792277","https://openalex.org/W2099724188","https://openalex.org/W2115787393","https://openalex.org/W2153919898","https://openalex.org/W2322640037","https://openalex.org/W2466388701","https://openalex.org/W2625545128","https://openalex.org/W2779411928","https://openalex.org/W6632261613","https://openalex.org/W6660368934","https://openalex.org/W6675021193","https://openalex.org/W6677355485","https://openalex.org/W6719362670"],"related_works":["https://openalex.org/W1509153591","https://openalex.org/W2027642766","https://openalex.org/W20625830","https://openalex.org/W2130413583","https://openalex.org/W2537112085","https://openalex.org/W1840808535","https://openalex.org/W2884975599","https://openalex.org/W1536265389","https://openalex.org/W2160283408","https://openalex.org/W1590648473"],"abstract_inverted_index":{"The":[0],"verification":[1,23],"process":[2],"of":[3,6,25,27,34,73],"software":[4],"is":[5,17],"growing":[7],"importance":[8],"as":[9],"it":[10],"helps":[11],"to":[12,51,63,94,110],"assure":[13],"that":[14,100],"an":[15,21,28],"application":[16,29,75],"correctly":[18],"built.":[19],"However,":[20],"efficient":[22],"method":[24,104],"implementation":[26],"should":[30],"also":[31],"reject":[32],"cases":[33],"invalid":[35,97],"data":[36],"which":[37],"provide":[38],"valid":[39,106],"results.":[40],"Thus,":[41],"we":[42,85],"propose":[43,62],"in":[44,54,69,105,114],"this":[45],"paper":[46],"a":[47],"constraint-based":[48],"analysis":[49],"technique":[50],"detect":[52,111],"vulnerabilities":[53],"Java":[55],"applications":[56],"at":[57],"the":[58,66,70,74,77,81,88,96,102,115],"executable":[59],"level.":[60],"We":[61],"exploit":[64],"both":[65],"information":[67,78],"contained":[68],"Bytecode":[71,116],"structure":[72],"and":[76,108],"given":[79],"by":[80],"user":[82,89],"specification.":[83],"Indeed,":[84],"show":[86],"how":[87],"specifications":[90],"can":[91],"be":[92],"used":[93],"deduce":[95],"input":[98],"state":[99],"put":[101],"testing":[103],"post-state":[107],"then":[109],"some":[112],"defections":[113],"programs.":[117]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
