Sciweavers

696 search results - page 23 / 140
» Isolated Program Execution: An Application Transparent Appro...
Sort
View
IPPS
2003
IEEE
14 years 21 days ago
Transparent Distributed Threads for Java
Remote method invocation in Java RMI allows the flow of control to pass across local Java threads and thereby span multiple virtual machines. However, the resulting distributed t...
Bernhard Haumacher, Thomas Moschny, Jürgen Re...
NDSS
2009
IEEE
14 years 2 months ago
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense
Cross-site scripting (or XSS) has been the most dominant class of web vulnerabilities in 2007. The main underlying reason for XSS vulnerabilities is that web markup and client-sid...
Yacin Nadji, Prateek Saxena, Dawn Song
IJISEC
2006
106views more  IJISEC 2006»
13 years 7 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
HVC
2005
Springer
112views Hardware» more  HVC 2005»
14 years 26 days ago
Dynamic Deadlock Analysis of Multi-threaded Programs
This paper presents a dynamic program analysis algorithm that can detect deadlock potentials in a multi-threaded program by examining a single execution trace, obtained by running ...
Saddek Bensalem, Klaus Havelund
CSE
2011
IEEE
12 years 7 months ago
Parallel Execution of AES-CTR Algorithm Using Extended Block Size
—Data encryption and decryption are common operations in a network based application programs with security. In order to keep pace with the input data rate in such applications, ...
Nhat-Phuong Tran, Myungho Lee, Sugwon Hong, Seung-...