-
4
-
-
0345757358
-
Practical byzantine fault tolerance and proactive recovery
-
Nov
-
M. Castro and B. Liskov. Practical byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems, 20(4):398-461, Nov. 2002.
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
5
-
-
84872154806
-
-
CGI Security
-
CGI Security. The cross-site scripting FAQ. http://www.cgisecurity.net/ articles/xss-faq.shtml.
-
The cross-site scripting FAQ
-
-
-
7
-
-
70450092979
-
Secure web applications via automatic partitioning
-
Oct
-
S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, and X. Zheng. Secure web applications via automatic partitioning. In Proceedings of the Symposium on Operating Systems Principles, pages 31-44, Oct. 2007.
-
(2007)
Proceedings of the Symposium on Operating Systems Principles
, pp. 31-44
-
-
Chong, S.1
Liu, J.2
Myers, A.C.3
Qi, X.4
Vikram, K.5
Zheng, L.6
Zheng, X.7
-
9
-
-
84978401615
-
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In In Proceedings of the Symposium on Operating Systems Design and Implementation, pages 211-224, Dec. 2002.
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In In Proceedings of the Symposium on Operating Systems Design and Implementation, pages 211-224, Dec. 2002.
-
-
-
-
13
-
-
85013748296
-
-
S. Fogie, J. Grossman, R. Hansen, A. Rager, and P. D. Petkov. XSS Attacks: Cross Site Scripting Exploits and Defense. Syngress, 2007.
-
S. Fogie, J. Grossman, R. Hansen, A. Rager, and P. D. Petkov. XSS Attacks: Cross Site Scripting Exploits and Defense. Syngress, 2007.
-
-
-
-
14
-
-
58049135849
-
-
Google Gears. http://gears.google.com.
-
Google Gears
-
-
-
22
-
-
84856138620
-
MashupOS: Operating system abstractions for client mashups
-
May
-
J. Howell, C. Jackson, H. J. Wang, and X. Fan. MashupOS: Operating system abstractions for client mashups. In Proceedings of the USENIX Workshop on Hot topics in operating systems, pages 1-7, May 2007.
-
(2007)
Proceedings of the USENIX Workshop on Hot topics in operating systems
, pp. 1-7
-
-
Howell, J.1
Jackson, C.2
Wang, H.J.3
Fan, X.4
-
23
-
-
19944365247
-
Securing Web application code by static analysis and runtime protection
-
May
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing Web application code by static analysis and runtime protection. In Proceedings of the International Conference on World Wide Web, pages 40-52, May 2004.
-
(2004)
Proceedings of the International Conference on World Wide Web
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
29
-
-
74049095792
-
At the forge: Firebug
-
R. Lerner. At the forge: Firebug. Linux J., 2007(157):8, 2007.
-
(2007)
Linux J
, vol.2007
, Issue.157
, pp. 8
-
-
Lerner, R.1
-
33
-
-
50549102800
-
Volta: Developing distributed applications by recompiling
-
Oct
-
D. Manolescu, B. Beckman, and B. Livshits. Volta: Developing distributed applications by recompiling. IEEE Software, 25(5):53-59, Oct. 2008.
-
(2008)
IEEE Software
, vol.25
, Issue.5
, pp. 53-59
-
-
Manolescu, D.1
Beckman, B.2
Livshits, B.3
-
34
-
-
36448963891
-
SecuriFly: Runtime vulnerability protection for Web applications
-
Technical report, Stanford University
-
M. Martin, B. Livshits, and M. S. Lam. SecuriFly: Runtime vulnerability protection for Web applications. Technical report, Stanford University, 2006.
-
(2006)
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
36
-
-
74049117326
-
-
Microsoft Corporation. Microsoft Live Labs Volta. http: //research.microsoft.com/~emeijer/CloudProgrammability.html, 2007.
-
(2007)
-
-
-
37
-
-
74049133751
-
-
Microsoft Corporation. Silverlight. http://silverlight.net, 2007.
-
(2007)
Silverlight
-
-
-
38
-
-
67650081259
-
Capo: A software-hardware interface for practical deterministic multiprocessor replay
-
Mar
-
P. Montesinos, M. Hicks, S. T. King, and J. Torrellas. Capo: a software-hardware interface for practical deterministic multiprocessor replay. In Proceeding of International Conference on Architectural Support for Rrogramming Languages and Operating Systems, pages 73-84, Mar. 2009.
-
(2009)
Proceeding of International Conference on Architectural Support for Rrogramming Languages and Operating Systems
, pp. 73-84
-
-
Montesinos, P.1
Hicks, M.2
King, S.T.3
Torrellas, J.4
-
39
-
-
27544515395
-
Bugnet: Continuously recording program execution for deterministic replay debugging
-
May
-
S. Narayanasamy, G. Pokam, and B. Calder. Bugnet: Continuously recording program execution for deterministic replay debugging. SIGARCH Computer Architecture News, 33(2):284-295, May 2005.
-
(2005)
SIGARCH Computer Architecture News
, vol.33
, Issue.2
, pp. 284-295
-
-
Narayanasamy, S.1
Pokam, G.2
Calder, B.3
-
40
-
-
84871349041
-
Automatically hardening Web applications using precise tainting
-
June
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening Web applications using precise tainting. In Proceedings of the IFIP International Information Security Conference, pages 372-382, June 2005.
-
(2005)
Proceedings of the IFIP International Information Security Conference
, pp. 372-382
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
44
-
-
0025564050
-
Implementing fault-tolerant services using the state machine approach: A tutorial
-
Dec
-
F. B. Schneider. Implementing fault-tolerant services using the state machine approach: a tutorial. ACM Compututing Surveys, 22(4):299-319, Dec. 1990.
-
(1990)
ACM Compututing Surveys
, vol.22
, Issue.4
, pp. 299-319
-
-
Schneider, F.B.1
-
45
-
-
74049114374
-
-
S. Segan. For Skyfire's mobile Web, the secret's in the server. http: //www.pcmag.com/print-article2/0,1217,a%253D223932,00.asp, Jan. 2008.
-
S. Segan. For Skyfire's mobile Web, the secret's in the server. http: //www.pcmag.com/print-article2/0,1217,a%253D223932,00.asp, Jan. 2008.
-
-
-
-
46
-
-
34248365617
-
Hop: A language for programming the web 2.0
-
Oct
-
M. Serrano, E. Gallesio, and F. Loitsch. Hop: a language for programming the web 2.0. In Companion to the Conference on Object-oriented Programming Systems, Languages, and Applications, pages 975-985, Oct. 2006.
-
(2006)
Companion to the Conference on Object-oriented Programming Systems, Languages, and Applications
, pp. 975-985
-
-
Serrano, M.1
Gallesio, E.2
Loitsch, F.3
-
48
-
-
74049132559
-
-
C. Stockwell. What's Coming in IE8. http: //blogs.msdn.com/ie/archive/ 2008/08/26/ie8-performance.aspx, 2008.
-
C. Stockwell. What's Coming in IE8. http: //blogs.msdn.com/ie/archive/ 2008/08/26/ie8-performance.aspx, 2008.
-
-
-
-
49
-
-
84978374045
-
Self-securing storage: Protecting data in compromised system
-
Oct
-
J. D. Strunk, G. R. Goodson, M. L. Scheinholtz, C. A. N. Soules, and G. R. Ganger. Self-securing storage: protecting data in compromised system. In Proceedings of the Conference on Symposium on Operating System Design and Implementation, pages 12-12, Oct. 2000.
-
(2000)
Proceedings of the Conference on Symposium on Operating System Design and Implementation
, pp. 12-12
-
-
Strunk, J.D.1
Goodson, G.R.2
Scheinholtz, M.L.3
Soules, C.A.N.4
Ganger, G.R.5
-
51
-
-
0000990322
-
A survey of program slicing techniques
-
F. Tip. A survey of program slicing techniques. Journal of programming languages, 3:121-189, 1995.
-
(1995)
Journal of programming languages
, vol.3
, pp. 121-189
-
-
Tip, F.1
-
54
-
-
33749596990
-
Hilda: A high-level language for data-driven Web applications
-
Apr
-
F. Yang, J. Shanmugasundaram, M. Riedewald, and J. Gehrke. Hilda: A high-level language for data-driven Web applications. In Proceedings of the International Conference on Data Engineering, pages 32-43, Apr. 2006.
-
(2006)
Proceedings of the International Conference on Data Engineering
, pp. 32-43
-
-
Yang, F.1
Shanmugasundaram, J.2
Riedewald, M.3
Gehrke, J.4
-
55
-
-
57349151451
-
Better abstractions for secure server-side scripting
-
Apr
-
D. Yu, A. Chander, H. Inamura, and I. Serikov. Better abstractions for secure server-side scripting. In Proceeding of the International Conference on World Wide Web, pages 507-516, Apr. 2008.
-
(2008)
Proceeding of the International Conference on World Wide Web
, pp. 507-516
-
-
Yu, D.1
Chander, A.2
Inamura, H.3
Serikov, I.4
-
56
-
-
34548253921
-
JavaScript instrumentation for browser security
-
Jan
-
D. Yu, A. Chander, N. Islam, and I. Serikov. JavaScript instrumentation for browser security. In Proceedings of the Symposium on Principles of Programming Languages, pages 237-249, Jan. 2007.
-
(2007)
Proceedings of the Symposium on Principles of Programming Languages
, pp. 237-249
-
-
Yu, D.1
Chander, A.2
Islam, N.3
Serikov, I.4
-
58
-
-
0036036793
-
Untrusted hosts and confidentiality: Secure program partitioning
-
S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers. Untrusted hosts and confidentiality: Secure program partitioning. In Proceedings of Symposium on Operating System Principles, pages 1-14, 2001.
-
(2001)
Proceedings of Symposium on Operating System Principles
, pp. 1-14
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.C.4
-
59
-
-
0038825029
-
Using replication and partitioning to build secure distributed systems
-
May
-
L. Zheng, S. Chong, A. C. Myers, and S. Zdancewic. Using replication and partitioning to build secure distributed systems. In Proceedings of the IEEE Symposium on Security and Privacy, pages 236-250, May 2003.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 236-250
-
-
Zheng, L.1
Chong, S.2
Myers, A.C.3
Zdancewic, S.4
|