Securing web applications from injection and logic vulnerabilities: Approaches and challenges

G Deepa, PS Thilagam - Information and Software Technology, 2016 - Elsevier
Context: Web applications are trusted by billions of users for performing day-to-day activities.
Accessibility, availability and omnipresence of web applications have made them a prime …

Mitigating program security vulnerabilities: Approaches and challenges

H Shahriar, M Zulkernine - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Programs are implemented in a variety of languages and contain serious vulnerabilities
which might be exploited to cause security breaches. These vulnerabilities have been …

Clonecloud: elastic execution between mobile device and cloud

BG Chun, S Ihm, P Maniatis, M Naik… - Proceedings of the sixth …, 2011 - dl.acm.org
Mobile applications are becoming increasingly ubiquitous and provide ever richer
functionality on mobile devices. At the same time, such devices often enjoy strong …

[PDF][PDF] Airavat: Security and privacy for MapReduce.

I Roy, STV Setty, A Kilzer, V Shmatikov, E Witchel - NSDI, 2010 - usenix.org
Airavat: Security and Privacy for MapReduce Page 1 Airavat: Security and Privacy for
MapReduce Indrajit Roy, Srinath TV Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The …

Using ARM TrustZone to build a trusted language runtime for mobile applications

N Santos, H Raj, S Saroiu, A Wolman - Proceedings of the 19th …, 2014 - dl.acm.org
This paper presents the design, implementation, and evaluation of the Trusted Language
Runtime (TLR), a system that protects the confidentiality and integrity of. NET mobile …

Merlin: A language for provisioning network resources

R Soulé, S Basu, PJ Marandi, F Pedone… - Proceedings of the 10th …, 2014 - dl.acm.org
This paper presents Merlin, a new framework for managing resources in software-defined
networks. With Merlin, administrators express high-level policies using programs in a …

NOYB: Privacy in online social networks

S Guha, K Tang, P Francis - Proceedings of the first workshop on Online …, 2008 - dl.acm.org
Increasingly, Internet users trade privacy for service. Facebook, Google, and others mine
personal information to target advertising. This paper presents a preliminary and partial …

Sedic: privacy-aware data intensive computing on hybrid clouds

K Zhang, X Zhou, Y Chen, XF Wang… - Proceedings of the 18th …, 2011 - dl.acm.org
The emergence of cost-effective cloud services offers organizations great opportunity to
reduce their cost and increase productivity. This development, however, is hampered by …

Dynamic vs. static flow-sensitive security analysis

A Russo, A Sabelfeld - 2010 23rd IEEE Computer Security …, 2010 - ieeexplore.ieee.org
This paper seeks to answer fundamental questions about trade-offs between static and
dynamic security analysis. It has been previously shown that flow-sensitive static information …

Staged information flow for JavaScript

R Chugh, JA Meister, R Jhala, S Lerner - Proceedings of the 30th ACM …, 2009 - dl.acm.org
Modern websites are powered by JavaScript, a flexible dynamic scripting language that
executes in client browsers. A common paradigm in such websites is to include third-party …