Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
Web services are in the midst of making the transition from being a promising technology to being widely used in the industry. However, most efforts to use Web services have been m...
Preeda Rajasekaran, John A. Miller, Kunal Verma, A...
Programming language specifications mandate static and dynamic analyses to preclude syntactic and semantic errors. Although individual languages are usually well-specified, comp...
Byeongcheol Lee, Ben Wiedermann, Martin Hirzel, Ro...