Skip to Main Content
Java is widely used because its security and platform independence. Although Java's security model is designed for protecting users from untrusted sources, Java's security is not under fully control at the application level. A large number of Java classes or Java class libraries have been used in network iquest application development, whose source is unknown and trust unassured. Analyzing the vulnerability of Java bytecode is helpful for assessing the security of untrusted Java components. The data-flow based methods suit to vulnerability analysis because their data propagation character. The paper is about using data-flow based methods to analyze the vulnerability of Java program in bytecode.