Sciweavers

41 search results - page 3 / 9
» On the Limits of Information Flow Techniques for Malware Ana...
Sort
View
POPL
2012
ACM
12 years 1 months ago
Multiple facets for dynamic information flow
JavaScript has become a central technology of the web, but it is also the source of many security problems, including cross-site scripting attacks and malicious advertising code. ...
Thomas H. Austin, Cormac Flanagan
CN
2008
84views more  CN 2008»
13 years 6 months ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari
WWW
2005
ACM
14 years 6 months ago
On the lack of typical behavior in the global Web traffic network
We offer the first large-scale analysis of Web traffic based on network flow data. Using data collected on the Internet2 network, we constructed a weighted bipartite clientserver ...
Mark Meiss, Filippo Menczer, Alessandro Vespignani
VIS
2004
IEEE
131views Visualization» more  VIS 2004»
14 years 7 months ago
Visualization of Intricate Flow Structures for Vortex Breakdown Analysis
Vortex breakdowns and flow recirculation are essential phenomena in aeronautics where they appear as a limiting factor in the design of modern aircrafts. Because of the inherent i...
Charles D. Hansen, Christoph Garth, Eduard Deines,...
PLDI
2009
ACM
14 years 29 days ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...