Sciweavers

IJNSEC
2008
83views more  IJNSEC 2008»
13 years 4 months ago
Java Mobile Code Dynamic Verification by Bytecode Modification for Host Confidentiality
In this paper we present a novel dynamic verification approach to protect the local host confidentiality from malicious Java mobile code. In our approach we use Bytecode Modificat...
Dan Lu, Yoshitake Kobayashi, Ken Nakayama, Mamoru ...