Armijn HemelFollow


Many Java programs are distributed in binary form without source code being made available. This means that it is a lot harder to do audits of these programs for for example copyright infringement detection or security issue detection. By examining individual class files inside a Java program and comparing these to a database of class files from known programs it is possible to make an educated guess of which programs or program fragments are used in the program, and possibly detect copyright infringements or trojaned versions of programs.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.