@article{(Open Science Index):https://publications.waset.org/pdf/14104,
	  title     = {The Vulnerability Analysis of Java Bytecode Based on Points-to Dataflow},
	  author    = {Tang Hong and  Zhang Lufeng and  Chen Hua and  Zhang Jianbo},
	  country	= {},
	  institution	= {},
	  abstract     = {Today many developers use the Java components
collected from the Internet as external LIBs to design and
develop their own software. However, some unknown security
bugs may exist in these components, such as SQL injection bug
may comes from the components which have no specific check
for the input string by users. To check these bugs out is very
difficult without source code. So a novel method to check the
bugs in Java bytecode based on points-to dataflow analysis is in
need, which is different to the common analysis techniques base
on the vulnerability pattern check. It can be used as an assistant
tool for security analysis of Java bytecode from unknown
softwares which will be used as extern LIBs.},
	    journal   = {International Journal of Computer and Information Engineering},
	  volume    = {3},
	  number    = {6},
	  year      = {2009},
	  pages     = {1540 - 1543},
	  ee        = {https://publications.waset.org/pdf/14104},
	  url   	= {https://publications.waset.org/vol/30},
	  bibsource = {https://publications.waset.org/},
	  issn  	= {eISSN: 1307-6892},
	  publisher = {World Academy of Science, Engineering and Technology},
	  index 	= {Open Science Index 30, 2009},
	}