Sciweavers

2062 search results - page 17 / 413
» Hardware Objects for Java
Sort
View
ACMMSP
2006
ACM
278views Hardware» more  ACMMSP 2006»
15 years 10 months ago
Atomicity via source-to-source translation
We present an implementation and evaluation of atomicity (also known as software transactions) for a dialect of Java. Our implementation is fundamentally different from prior work...
Benjamin Hindman, Dan Grossman
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
15 years 10 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
CARDIS
2008
Springer
165views Hardware» more  CARDIS 2008»
15 years 6 months ago
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
Wojciech Mostowski, Erik Poll