Sciweavers

1528 search results - page 155 / 306
» Performance Assertion Checking
Sort
View
102
Voted
OSDI
2006
ACM
16 years 2 months ago
BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML
Vulnerability-driven filtering of network data can offer a fast and easy-to-deploy alternative or intermediary to software patching, as exemplified in Shield [43]. In this paper, ...
Charles Reis, John Dunagan, Helen J. Wang, Opher D...
ESORICS
2002
Springer
16 years 2 months ago
Formal Security Analysis with Interacting State Machines
We introduce the ISM approach, a framework for modeling and verifying reactive systems in a formal, even machine-checked, way. The framework has been developed for applications in ...
David von Oheimb, Volkmar Lotz
126
Voted
POPL
2010
ACM
15 years 12 months ago
Integrating Typed and Untyped Code in a Scripting Language
Many large software systems originate from untyped scripting language code. While good for initial development, the lack of static type annotations can impact code-quality and per...
Francesco Zappa Nardelli, Jan Vitek, Johan Ös...
97
Voted
CGO
2010
IEEE
15 years 9 months ago
Dynamic interpretation for dynamic scripting languages
Dynamic scripting languages offer programmers increased flexibility by allowing properties of programs to be defined at run-time. Typically, program execution begins with an int...
Kevin Williams, Jason McCandless, David Gregg
ASM
2010
ASM
15 years 9 months ago
Secrecy UML Method for Model Transformations
Abstract. This paper introduces the subject of secrecy models development by transformation, with formal validation. In an enterprise, constructing a secrecy model is a participato...
Waël Hassan, Nadera Slimani, Kamel Adi, Luigi...