Skip to main content
A commonly held belief is that the friend construct in C++ is a violation of encapsulation. However, little empirical analysis of its use has taken place to provide evidence to support this claim. This paper presents a study which... more
    • by 
    •   3  
      Information SystemsComputer ScienceObject Oriented Programming
    • by 
    •   4  
      Object Oriented ProgrammingLanguage-based securityAspect Oriented ProgrammingObject-oriented languages
    • by 
    •   2  
      Service Oriented ArchitectureEnterprise Application Integration
    • by 
    • by 
    •   3  
      Service Oriented ArchitectureTransaction ProcessingSecurity Model
    • by 
    • by 
    • by 
    •   10  
      Grid ComputingFile SharingPattern LanguageCommunication Protocol
    • by 
    • by 
    • by 
    •   5  
      Mobile Ad Hoc NetworkAd hoc On-Demand Distance VectorRoute DiscoveryKey Agreement
This thesis presents an innovative approach to implementing a security enforcement mechanism in the contexts of untrusted software systems, where a piece of code in a base system may come from an untrusted third party. The key point of... more
    • by 
    •   7  
      EngineeringComputer ScienceSoftware EngineeringComputer Security
The emerging cloud computing models for Internet-of-Things have fostered the development of lightweight applications using cloud services for monitoring and optimizing devices and equipment hosted in distributed facilities. Such... more
    • by 
    •   3  
      Computer ScienceTechnologyImmigration Policy and Enforcement
Mixed Flash and JavaScript content has become increasingly prevalent; its purveyance of dynamic features unique to each platform has popularized it for myriad web development projects. Although Flash and JavaScript security has been... more
    • by 
    •   7  
      Computer ScienceDistributed ComputingSoftware EngineeringComputer Engineering
The large majority of websites nowadays embeds third-party JavaScript into their pages, coming from external partners. Ideally, these scripts are benign and come from trusted sources, but over time, these third-party scripts can start to... more
    • by 
    •   7  
      Computer ScienceComputer SecurityWeb Application SecurityScripting Language
Compilers perform static analysis prior to applying an optimization. The analysis results are typically not very precise, however, as a compiler operates with a strict time budget, which constrains reasoning. In this paper, we explore a... more
    • by 
    •   3  
      Computer ScienceParallel ComputingStatic program analysis
Modern malware evolves various detection avoidance techniques to bypass the state-of-the-art detection methods. An emerging trend to deal with this issue is the combination of image transformation and machine learning models to classify... more
    • by 
    •   2  
      Computer ScienceArtificial Intelligence
We introduce a novel approach to protecting the privacy of web users. We propose to monitor the behaviors of JavaScript code within a web origin based on the source of the code, i.e., code origin, to detect and prevent malicious actions... more
    • by 
    •   5  
      Computer ScienceComputer SecurityWeb Application SecurityPrivacy Protection
Web-based or hybrid mobile applications (apps) are widely used and supported by various modern hybrid app development frameworks. In this architecture, any JavaScript code, local or remote, can access available APIs, including JavaScript... more
    • by 
    • Computer Science
Memory errors such as buffer overruns are notorious security vulnerabilities. There has been considerable interest in having a compiler to ensure the safety of compiled code either through static verification or through instrumented... more
    • by 
    • Computer Science