{"title":"从Java卡字节码生成控制流图","authors":"A. Amine, M. Benattou, Jean-Louis Lanet","doi":"10.1109/CIST.2014.7016620","DOIUrl":null,"url":null,"abstract":"The verification process in industrial context of embedded software in smart card is considered difficult, extremely time-consuming, and costly, with very few tools and techniques available to aid in the verification process. The work proposed in this paper consist to define the main architecture of testing java card application and a specific test model which consists of reducing a given java-card application to one method which have one input and one output data which correspond with the real communication between the card and the off-card applications. The paper details the first step of testing constraint specifications which consist of modeling and generating control flow graph in inter and intra procedural level from the byte code of java-card applications.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Generating control flow graph from Java card byte code\",\"authors\":\"A. Amine, M. Benattou, Jean-Louis Lanet\",\"doi\":\"10.1109/CIST.2014.7016620\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The verification process in industrial context of embedded software in smart card is considered difficult, extremely time-consuming, and costly, with very few tools and techniques available to aid in the verification process. The work proposed in this paper consist to define the main architecture of testing java card application and a specific test model which consists of reducing a given java-card application to one method which have one input and one output data which correspond with the real communication between the card and the off-card applications. The paper details the first step of testing constraint specifications which consist of modeling and generating control flow graph in inter and intra procedural level from the byte code of java-card applications.\",\"PeriodicalId\":106483,\"journal\":{\"name\":\"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)\",\"volume\":\"219 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIST.2014.7016620\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIST.2014.7016620","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Generating control flow graph from Java card byte code
The verification process in industrial context of embedded software in smart card is considered difficult, extremely time-consuming, and costly, with very few tools and techniques available to aid in the verification process. The work proposed in this paper consist to define the main architecture of testing java card application and a specific test model which consists of reducing a given java-card application to one method which have one input and one output data which correspond with the real communication between the card and the off-card applications. The paper details the first step of testing constraint specifications which consist of modeling and generating control flow graph in inter and intra procedural level from the byte code of java-card applications.