Sciweavers

114 search results - page 9 / 23
» Using Verification Technology to Specify and Detect Malware
Sort
View
ECOWS
2006
Springer
13 years 11 months ago
Formal Modelling and Verification of an Asynchronous Extension of SOAP
Current web services are largely based on a synchronous request-response model that uses the Simple Object Access Protocol SOAP. Next-generation telecommunication networks, on the...
Maurice H. ter Beek, Stefania Gnesi, Franco Mazzan...
WWW
2010
ACM
14 years 2 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
KES
2006
Springer
13 years 7 months ago
Automatic Detection of SLS Violation Using Knowledge Based Systems
Self-Management of multiservice network domains must include automatic detection of service quality violations in order to perform appropriate and timely responses, fostering the f...
Pedro Alípio, José Neves, Paulo Carv...
SIGSOFT
2010
ACM
13 years 5 months ago
Phantm: PHP analyzer for type mismatch
We present Phantm, a static analyzer that uses a flowsensitive analysis to detect type errors in PHP applications. Phantm can infer types for nested arrays, and can leverage runti...
Etienne Kneuss, Philippe Suter, Viktor Kuncak
WWW
2003
ACM
14 years 8 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski