Sciweavers

252 search results - page 43 / 51
» Information-Flow Security for Interactive Programs
Sort
View
OOPSLA
2009
Springer
15 years 4 months ago
Thorn: robust, concurrent, extensible scripting on the JVM
Scripting languages enjoy great popularity due their support for rapid and exploratory development. They typically have lightweight syntax, weak data privacy, dynamic typing, powe...
Bard Bloom, John Field, Nathaniel Nystrom, Johan &...
78
Voted
SP
2002
IEEE
109views Security Privacy» more  SP 2002»
14 years 9 months ago
Scalable atomistic simulation algorithms for materials research
A suite of scalable atomistic simulation programs has been developed for materials research based on space-time multiresolution algorithms. Design and analysis of parallel algorit...
Aiichiro Nakano, Rajiv K. Kalia, Priya Vashishta, ...
86
Voted
OOPSLA
2010
Springer
14 years 7 months ago
The two-state solution: native and serializable continuations accord
Continuation-based Web servers provide advantages over traditional Web application development through the increase of expressive power they allow. This leads to fewer errors and ...
Jay A. McCarthy
110
Voted
CCS
2010
ACM
14 years 9 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
190
Voted
POPL
2006
ACM
15 years 9 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann