Sciweavers

96 search results - page 16 / 20
» Exploiting and Protecting Dynamic Code Generation
Sort
View
70
Voted
IJPP
2006
82views more  IJPP 2006»
14 years 10 months ago
Supporting Microthread Scheduling and Synchronisation in CMPs
Chip multiprocessors hold great promise for achieving scalability in future systems. Microthreaded chip multiprocessors add a means of exploiting legacy code in such systems. Usin...
Ian Bell, Nabil Hasasneh, Chris R. Jesshope
DSN
2005
IEEE
15 years 5 days ago
SoftArch: An Architecture Level Tool for Modeling and Analyzing Soft Errors
Soft errors are a growing concern for processor reliability. Recent work has motivated architecture-level studies of soft errors since the architecture can mask many raw errors an...
Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. ...
WWW
2009
ACM
15 years 11 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
111
Voted
INFOCOM
2006
IEEE
15 years 4 months ago
MobiStream: Error-Resilient Video Streaming in Wireless WANs Using Virtual Channels
—We present MobiStream— a video streaming system that exploits the perceptual value in video content and the characteristics of the link layer and physical layer channels to en...
Rajiv Chakravorty, Suman Banerjee, Samrat Ganguly
92
Voted
WWW
2009
ACM
15 years 11 months ago
Using static analysis for Ajax intrusion detection
We present a static control-flow analysis for JavaScript programs running in a web browser. Our analysis tackles numerous challenges posed by modern web applications including asy...
Arjun Guha, Shriram Krishnamurthi, Trevor Jim