Sciweavers

33 search results - page 5 / 7
» Automatically identifying critical input regions and code in...
Sort
View
HPCA
2011
IEEE
12 years 10 months ago
Dynamic parallelization of JavaScript applications using an ultra-lightweight speculation mechanism
As the web becomes the platform of choice for execution of more complex applications, a growing portion of computation is handed off by developers to the client side to reduce net...
Mojtaba Mehrara, Po-Chun Hsu, Mehrzad Samadi, Scot...
ACMSE
2006
ACM
14 years 6 days ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
SAC
2006
ACM
14 years 5 days ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...
RAID
2005
Springer
13 years 11 months ago
FLIPS: Hybrid Adaptive Intrusion Prevention
Intrusion detection systems are fundamentally passive and fail–open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intru...
Michael E. Locasto, Ke Wang, Angelos D. Keromytis,...
ICASSP
2011
IEEE
12 years 10 months ago
Collaborative sources identification in mixed signals via hierarchical sparse modeling
A collaborative framework for detecting the different sources in mixed signals is presented in this paper. The approach is based on CHiLasso, a convex collaborative hierarchical s...
Pablo Sprechmann, Ignacio Ramírez, Pablo Ca...