Sciweavers

1943 search results - page 245 / 389
» Web application security engineering
Sort
View
133
Voted
COMPSAC
2001
IEEE
15 years 7 months ago
Utilizing Object-Oriented Databases for Concurrency Control in Virtual Environments
Virtual Reality Modeling Language (VRML) is widely used to represent, create, and display virtual reality objects and their environment. Some VRML applications require concurrent ...
Damla Turgut, Nevin Aydin, Ramez Elmasri, Begumhan...
143
Voted
SIGIR
2010
ACM
15 years 7 months ago
The demographics of web search
How does the web search behavior of “rich” and “poor” people differ? Do men and women tend to click on different results for the same query? What are some queries almost...
Ingmar Weber, Carlos Castillo
142
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
120
Voted
SIGSOFT
2008
ACM
16 years 4 months ago
Deriving input syntactic structure from execution
Program input syntactic structure is essential for a wide range of applications such as test case generation, software debugging and network security. However, such important info...
Zhiqiang Lin, Xiangyu Zhang
170
Voted
ACSAC
2010
IEEE
15 years 1 months ago
G-Free: defeating return-oriented programming through gadget-less binaries
Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still repr...
Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide...