Sciweavers

3706 search results - page 2 / 742
» The Transformational Approach to Program Development
Sort
View
ESSOS
2009
Springer
13 years 9 months ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
CHI
2007
ACM
13 years 9 months ago
Aligning development tools with the way programmers think about code changes
Software developers must modify their programs to keep up with changing requirements and designs. Often, a conceptually simple change can require numerous edits that are similar b...
Marat Boshernitsan, Susan L. Graham, Marti A. Hear...
ICFP
2006
ACM
14 years 4 months ago
Modular development of certified program verifiers with a proof assistant
I report on an experience using the Coq proof assistant to develop a program verification tool with a machine-checkable proof of full correctness. The verifier is able to prove me...
Adam J. Chlipala
SSS
2009
Springer
163views Control Systems» more  SSS 2009»
13 years 11 months ago
Developing Autonomic and Secure Virtual Organisations with Chemical Programming
This paper studies the development of autonomic and secure Virtual Organisations (VOs) when following the chemical-programming paradigm. We have selected the Higher-Order Chemical ...
Alvaro E. Arenas, Jean-Pierre Banâtre, Thier...
PEPM
2004
ACM
13 years 10 months ago
Program transformations for portable CPU accounting and control in Java
In this paper we introduce a novel scheme for portable CPU accounting and control in Java, which is based on program transformation techniques at the bytecode level and can be use...
Jarle Hulaas, Walter Binder