Sciweavers

553 search results - page 49 / 111
» Verified, Executable Parsing
Sort
View
IPPS
2010
IEEE
13 years 6 months ago
Runtime checking of serializability in software transactional memory
Abstract--Ensuring the correctness of complex implementations of software transactional memory (STM) is a daunting task. Attempts have been made to formally verify STMs, but these ...
Arnab Sinha, Sharad Malik
TOPNOC
2010
13 years 3 months ago
On-the-Fly Auditing of Business Processes
Information systems supporting business process are mostly very complex. If we have to ensure that certain business rules are enforced in a business process, it is often easier to ...
Kees M. van Hee, Jan Hidders, Geert-Jan Houben, Ja...
WWW
2010
ACM
14 years 3 months ago
Regular expressions considered harmful in client-side XSS filters
Cross-site scripting flaws have now surpassed buffer overflows as the world’s most common publicly-reported security vulnerability. In recent years, browser vendors and resea...
Daniel Bates, Adam Barth, Collin Jackson
ACSAC
2007
IEEE
14 years 3 months ago
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection
With the recent rapid increase in interactive web applications that employ back-end database services, an SQL injection attack has become one of the most serious security threats....
Yuji Kosuga, Kenji Kono, Miyuki Hanaoka, Miho Hish...
VL
2006
IEEE
106views Visual Languages» more  VL 2006»
14 years 2 months ago
A Linguistic Analysis of How People Describe Software Problems
There is little understanding of how people describe software problems, but a variety of tools solicit, manage, and analyze these descriptions in order to streamline software deve...
Andrew J. Ko, Brad A. Myers, Duen Horng Chau