Sciweavers

386 search results - page 14 / 78
» Providing Fine-grained Access Control for Java Programs
Sort
View
GG
2004
Springer
15 years 5 months ago
Translating Java Code to Graph Transformation Systems
We propose a faithful encoding of Java programs (written in a suitable fragment of the language) to Graph Transformation Systems. Every program is translated to a set of rules incl...
Andrea Corradini, Fernando Luís Dotti, Luci...
109
Voted
OOPSLA
2009
Springer
15 years 6 months ago
Parallel programming with object assemblies
We present Chorus, a high-level parallel programming model suitable for irregular, heap-manipulating applications like mesh refinement and epidemic simulations, and JChorus, an i...
Roberto Lublinerman, Swarat Chaudhuri, Pavol Cern&...
SP
2003
IEEE
15 years 5 months ago
Using Memory Errors to Attack a Virtual Machine
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...
Sudhakar Govindavajhala, Andrew W. Appel
104
Voted
ISSRE
2006
IEEE
15 years 5 months ago
A State Exploration-Based Approach to Testing Java Monitors
A Java monitor is a Java class that defines one or more synchronized methods. Unlike a regular object, a Java monitor object is intended to be accessed by multiple threads simulta...
Yu Lei, Richard H. Carver, David Chenho Kung, Vidu...
94
Voted
CL
2010
Springer
14 years 11 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr