Sciweavers

10912 search results - page 2090 / 2183
» Object-Oriented Programming Languages
Sort
View
129
Voted
CCS
2011
ACM
14 years 2 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
COCO
2011
Springer
221views Algorithms» more  COCO 2011»
14 years 2 months ago
Non-uniform ACC Circuit Lower Bounds
The class ACC consists of circuit families with constant depth over unbounded fan-in AND, OR, NOT, and MODm gates, where m > 1 is an arbitrary constant. We prove: • NTIME[2n ...
Ryan Williams
137
Voted
CSFW
2011
IEEE
14 years 2 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
126
Voted
AOSD
2012
ACM
13 years 10 months ago
A closer look at aspect interference and cooperation
In this work we consider specification and compositional verification for interference detection when several aspects are woven together under joint-weaving semantics without re...
Cynthia Disenfeld, Shmuel Katz
CG
2005
Springer
15 years 2 months ago
Interpretive OpenGL for computer graphics
OpenGL is the industry-leading, cross-platform graphics application programming interface (API), and the only major API with support for virtually all operating systems. Many lang...
Bo Chen, Harry H. Cheng
« Prev « First page 2090 / 2183 Last » Next »