Sciweavers

1210 search results - page 41 / 242
» Formal Techniques for Java Programs
Sort
View
POPL
2007
ACM
16 years 2 months ago
JavaScript instrumentation for browser security
It is well recognized that JavaScript can be exploited to launch browser-based security attacks. We propose to battle such attacks using program instrumentation. Untrusted JavaScr...
Dachuan Yu, Ajay Chander, Nayeem Islam, Igor Serik...
ESORICS
2010
Springer
15 years 3 months ago
Enforcing Secure Object Initialization in Java
Sun and the CERT recommend for secure Java development to not allow partially initialized objects to be accessed. The CERT considers the severity of the risks taken by not followin...
Laurent Hubert, Thomas P. Jensen, Vincent Monfort,...
ICST
2010
IEEE
15 years 15 days ago
Precisely Detecting Runtime Change Interactions for Evolving Software
Abstract—Developers often make multiple changes to software. These changes are introduced to work cooperatively or to accomplish separate goals. However, changes might not intera...
Raúl A. Santelices, Mary Jean Harrold, Ales...
CONCURRENCY
2004
124views more  CONCURRENCY 2004»
15 years 1 months ago
Checking ownership and confinement
Abstract. A number of formal proposals to manage aliasing in Java-like programming languages have been advanced over the last five years. Unfortunately, it is not clear how practic...
Alex Potanin, James Noble, Robert Biddle
APSEC
2001
IEEE
15 years 5 months ago
The Steam Boiler in a Unified Theory of Z and CSP
This paper presents a formalisation of the steamboiler problem using Circus, a unified theory of the formal specification languages Z and CSP. The aim of Circus is to provide powe...
Jim Woodcock, Ana Cavalcanti