Sciweavers

96 search results - page 6 / 20
» Exploiting and Protecting Dynamic Code Generation
Sort
View
102
Voted
SIGSAND
2008
14 years 11 months ago
Relational Model Driven Application Design
Abstract: A closer look at typical information systems shows that relatively simple routines often contribute significantly to the overall expenses of the software development proc...
Michael Guckert, René Gerlach
AINA
2006
IEEE
15 years 4 months ago
Remote Trust with Aspect-Oriented Programming
Given a client/server application, how can the server entrust the integrity of the remote client, albeit the latter is running on an un-trusted machine? To address this research p...
Paolo Falcarin, Riccardo Scandariato, Mario Baldi
88
Voted
CCS
2009
ACM
15 years 10 months ago
Lightweight self-protecting JavaScript
This paper introduces a method to control JavaScript execution. The aim is to prevent or modify inappropriate behaviour caused by e.g. malicious injected scripts or poorly designe...
Phu H. Phung, David Sands, Andrey Chudnov
91
Voted
CGO
2010
IEEE
15 years 5 months ago
Exploiting statistical correlations for proactive prediction of program behaviors
This paper presents a finding and a technique on program behavior prediction. The finding is that surprisingly strong statistical correlations exist among the behaviors of diffe...
Yunlian Jiang, Eddy Z. Zhang, Kai Tian, Feng Mao, ...
103
Voted
MICRO
2007
IEEE
164views Hardware» more  MICRO 2007»
15 years 4 months ago
A Practical Approach to Exploiting Coarse-Grained Pipeline Parallelism in C Programs
The emergence of multicore processors has heightened the need for effective parallel programming practices. In addition to writing new parallel programs, the next generation of pr...
William Thies, Vikram Chandrasekhar, Saman P. Amar...