Baitkood (Estonian Wikipedia)

Analysis of information sources in references of the Wikipedia article "Baitkood" in Estonian language version.

refsWebsite
Global rank Estonian rank
1st place
1st place
low place
low place
2nd place
16th place
low place
low place
3,314th place
low place
850th place
439th place
low place
low place
488th place
582nd place
low place
266th place
3,329th place
1,615th place
low place
low place
low place
low place
low place
low place
low place
low place
2,697th place
low place
low place
low place
low place
low place

2ality.com

blackhat.com

columbia.edu

www1.cs.columbia.edu

dartlang.org

developers.google.com

doi.org

  • Yunhe Shi, David Gregg, Andrew Beatty, M. Anton Ertl (2005). "Virtual Machine Showdown: Stack Versus Registers" (inglise) (VEE '05: Proceedings of the 1st ACM/USENIX international conference on Virtual execution environments ed.). Chicago, Illinois, USA: ACM: 153–163. DOI:10.1145/1064979.1065001. ISBN 1-59593-047-7. {{cite journal}}: viitemall journal nõuab parameetrit |journal= (juhend)
  • Ando Saabas, Tarmo Uustalu (2007). "Type systems for optimizing stack-based code" (PDF) (Electronic Notes in Theoretical Computer Science ed.). Lk 103-119. DOI:10.1016/j.entcs.2007.02.063. Originaali (PDF) arhiivikoopia seisuga 26. mai 2016.: «virtual stack or virtual register VMs can be executed more efficiently using an interpreter. Virtual register machines can be an attractive alternative to stack architectures because they allow the number of executed VM instructions to be substantially reduced.»

fortiguard.com

fu-berlin.de

inf.fu-berlin.de

  • Mark Dowd (X-Force Researcher IBM Internet Security Systems), Leveraging the ActionScript Virtual Machine[alaline kõdulink], IBM 2008 «if there was a way to execute AS3 instructions that had never been verified, it would be quite dangerous. Unverified instructions would be able to manipulate the native runtime stack … The attack works by manipulating a data structure used by the AVM2 verifier such that it doesn’t correctly verify the ActionScript instructions for a given method»

google.ru

books.google.ru

ijarcsse.com

  • Verification of Bytecode in a Virtual machine Arhiiviversioon seisuga 30. aprill 2013 // International Journal of Advanced Research in Computer Science and Software Engineering Vol.3 Issue 3 March 2013, ISSN 2277-128X: «Java byte code verification has been studied extensively from a correctness perspective, and several vulnerabilities have been found and eliminated in this process»

ioc.ee

cs.ioc.ee

  • Ando Saabas, Tarmo Uustalu (2007). "Type systems for optimizing stack-based code" (PDF) (Electronic Notes in Theoretical Computer Science ed.). Lk 103-119. DOI:10.1016/j.entcs.2007.02.063. Originaali (PDF) arhiivikoopia seisuga 26. mai 2016.: «virtual stack or virtual register VMs can be executed more efficiently using an interpreter. Virtual register machines can be an attractive alternative to stack architectures because they allow the number of executed VM instructions to be substantially reduced.»

osp.ru

purdue.edu

cs.purdue.edu

recon.cx

  • Haifei Li (Microsoft), Inside AVM // REcon 2012, Montreal «Most Flash vulnerabilities are ActionScript-related … Faults on verification cause highly-dangerous JIT type confusion vulnerabilities. • highly-dangerous means perfect exploitation: bypassing ASLR+DEP, with%100 reliability, no heapSpray, no JITSpray. • JIT type confusion bugs are due to faults in the verification of AVM!»

safaribooksonline.com

threedee.com

web.archive.org