Sciweavers

41 search results - page 6 / 9
» Points-to analysis for JavaScript
Sort
View
JOT
2010
113views more  JOT 2010»
13 years 5 months ago
SOA Web Security and Applications
entional vulnerability detection fails to extend its generic form to an abstract level in coping with particular type of string validation. Consequently the security bypasses key ...
Raymond Wu, Masayuki Hisada
DOCENG
2008
ACM
13 years 9 months ago
PrintMonkey: giving users a grip on printing the web
Web content is notoriously difficult to capture on a printed page due to inconsistent and undesired results. Items that users may not want to print, such as media, navigation menu...
Jennifer Baldwin, James A. Rowson, Yvonne Coady
VL
2010
IEEE
247views Visual Languages» more  VL 2010»
13 years 5 months ago
Cleanroom: Edit-Time Error Detection with the Uniqueness Heuristic
Many dynamic programming language features, such as implicit declaration, reflection, and code generation, make it difficult to verify the existence of identifiers through standar...
Andrew J. Ko, Jacob O. Wobbrock
USS
2010
13 years 5 months ago
VEX: Vetting Browser Extensions for Security Vulnerabilities
The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have...
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, ...
CHI
2011
ACM
12 years 11 months ago
Feedlack detects missing feedback in web applications
While usability methods such as user studies and inspections can reveal a wide range of problems, they do so for only a subset of an application’s features and states. We presen...
Andrew J. Ko, Xing Zhang