{"id":"https://openalex.org/W2556800963","doi":"https://doi.org/10.1109/vizsec.2016.7739575","title":"J-Viz: Finding algorithmic complexity attacks via graph visualization of Java bytecode","display_name":"J-Viz: Finding algorithmic complexity attacks via graph visualization of Java bytecode","publication_year":2016,"publication_date":"2016-10-01","ids":{"openalex":"https://openalex.org/W2556800963","doi":"https://doi.org/10.1109/vizsec.2016.7739575","mag":"2556800963"},"language":"en","primary_location":{"id":"doi:10.1109/vizsec.2016.7739575","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vizsec.2016.7739575","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Symposium on Visualization for Cyber Security (VizSec)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101592174","display_name":"Md. Jawaherul Alam","orcid":"https://orcid.org/0000-0002-7062-6792"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md. Jawaherul Alam","raw_affiliation_strings":["Dept. of Computer Science, University of California, Irvine, CA, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, University of California, Irvine, CA, USA","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034971300","display_name":"Michael T. Goodrich","orcid":"https://orcid.org/0000-0002-8943-191X"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael T. Goodrich","raw_affiliation_strings":["Dept. of Computer Science, University of California, Irvine, CA, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, University of California, Irvine, CA, USA","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109838121","display_name":"Timothy Johnson","orcid":null},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Timothy Johnson","raw_affiliation_strings":["Dept. of Computer Science, University of California, Irvine, CA, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, University of California, Irvine, CA, USA","institution_ids":["https://openalex.org/I204250578"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101592174"],"corresponding_institution_ids":["https://openalex.org/I204250578"],"apc_list":null,"apc_paid":null,"fwci":0.2522,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.55537692,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/java-bytecode","display_name":"Java bytecode","score":0.9347721338272095},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8414494395256042},{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.8349138498306274},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.740615725517273},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.6129893064498901},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5675843954086304},{"id":"https://openalex.org/keywords/java-applet","display_name":"Java applet","score":0.4778848886489868},{"id":"https://openalex.org/keywords/java-modeling-language","display_name":"Java Modeling Language","score":0.4459640085697174},{"id":"https://openalex.org/keywords/java-annotation","display_name":"Java annotation","score":0.3934765160083771}],"concepts":[{"id":"https://openalex.org/C2777472213","wikidata":"https://www.wikidata.org/wiki/Q137496","display_name":"Java bytecode","level":5,"score":0.9347721338272095},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8414494395256042},{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.8349138498306274},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.740615725517273},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6129893064498901},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5675843954086304},{"id":"https://openalex.org/C15524039","wikidata":"https://www.wikidata.org/wiki/Q865817","display_name":"Java applet","level":3,"score":0.4778848886489868},{"id":"https://openalex.org/C60945770","wikidata":"https://www.wikidata.org/wiki/Q2517517","display_name":"Java Modeling Language","level":5,"score":0.4459640085697174},{"id":"https://openalex.org/C168702491","wikidata":"https://www.wikidata.org/wiki/Q567345","display_name":"Java annotation","level":4,"score":0.3934765160083771}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vizsec.2016.7739575","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vizsec.2016.7739575","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Symposium on Visualization for Cyber Security (VizSec)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6200000047683716}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W7042436","https://openalex.org/W241117969","https://openalex.org/W1494717881","https://openalex.org/W1507046749","https://openalex.org/W1522840240","https://openalex.org/W1524145331","https://openalex.org/W1582415544","https://openalex.org/W1930907635","https://openalex.org/W1982889224","https://openalex.org/W1997952588","https://openalex.org/W2077255408","https://openalex.org/W2082318969","https://openalex.org/W2097145526","https://openalex.org/W2126536832","https://openalex.org/W2130413583","https://openalex.org/W2140430779","https://openalex.org/W2155576607","https://openalex.org/W2159642793","https://openalex.org/W2162553820","https://openalex.org/W2198202036","https://openalex.org/W2216444195","https://openalex.org/W2538108907","https://openalex.org/W2953089209","https://openalex.org/W4285719527","https://openalex.org/W6679330946","https://openalex.org/W6688716199"],"related_works":["https://openalex.org/W2080399439","https://openalex.org/W1970806266","https://openalex.org/W2186011611","https://openalex.org/W2016474211","https://openalex.org/W1606351121","https://openalex.org/W1532887546","https://openalex.org/W2169629723","https://openalex.org/W2505352121","https://openalex.org/W1505646244","https://openalex.org/W2048348930"],"abstract_inverted_index":{"We":[0,87],"describe":[1],"a":[2,30,80],"security":[3,110],"visualization":[4],"tool":[5],"for":[6,107,112],"finding":[7],"algorithmic":[8,113],"complexity":[9,114],"attacks":[10],"in":[11,103],"Java":[12,26,55,72,85],"bytecode.":[13,86],"Our":[14],"tool,":[15],"which":[16,34],"we":[17,35,45],"call":[18,36],"J-Viz,":[19],"visualizes":[20],"connected":[21],"directed":[22],"graphs":[23,44],"derived":[24,48],"from":[25,49],"bytecode":[27,73],"according":[28],"to":[29,54],"canonical":[31,99],"node":[32],"ordering,":[33],"the":[37,64,71,98],"sibling-first":[38],"recursive":[39],"(SFR)":[40],"numbering.":[41],"The":[42],"particular":[43],"consider":[46],"are":[47],"applying":[50],"Shiver's":[51],"k-CFA":[52],"framework":[53],"bytecode,":[56],"and":[57,70],"our":[58],"visualizer":[59],"includes":[60],"helpful":[61],"links":[62],"between":[63],"nodes":[65],"of":[66,83],"an":[67],"input":[68],"graph":[69],"that":[74,84,97],"produced":[75],"it,":[76],"as":[77,79],"well":[78],"decompiled":[81],"version":[82],"show":[88],"through":[89],"experiments":[90],"involving":[91],"test":[92],"cases":[93],"provided":[94],"by":[95],"DARPA":[96],"drawing":[100],"paradigm":[101],"used":[102],"J-Viz":[104],"is":[105],"effective":[106],"identifying":[108],"potential":[109],"vulnerabilities":[111],"attacks.":[115]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
