Sciweavers

332 search results - page 52 / 67
» Towards an Automatic Analysis of Web Service Security
Sort
View
WWW
2009
ACM
14 years 9 months ago
Rated aspect summarization of short comments
Web 2.0 technologies have enabled more and more people to freely comment on different kinds of entities (e.g. sellers, products, services). The large scale of information poses th...
Yue Lu, ChengXiang Zhai, Neel Sundaresan
SEKE
2010
Springer
13 years 7 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
SP
2010
IEEE
222views Security Privacy» more  SP 2010»
14 years 17 days ago
A Symbolic Execution Framework for JavaScript
—As AJAX applications gain popularity, client-side JavaScript code is becoming increasingly complex. However, few automated vulnerability analysis tools for JavaScript exist. In ...
Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng...
SAMT
2007
Springer
108views Multimedia» more  SAMT 2007»
14 years 2 months ago
Document Layout Substructure Discovery
Abstract. In this paper we present a system, DoLSuD, for the automatic discovery of relevant substructures in a document layout. DoLSuD, Document Layout Substructure Discovery, ext...
Claudio Andreatta
WWW
2005
ACM
14 years 9 months ago
Object-level ranking: bringing order to Web objects
In contrast with the current Web search methods that essentially do document-level ranking and retrieval, we are exploring a new paradigm to enable Web search at the object level....
Zaiqing Nie, Yuanzhi Zhang, Ji-Rong Wen, Wei-Ying ...