Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2020
AutoNav: Evaluation and Automatization of Web Navigation Policies
WWW '20: Proceedings of The Web Conference 2020Pages 1320–1331https://doi.org/10.1145/3366423.3380207Undesired navigation in browsers powers a significant class of attacks on web applications. In a move to mitigate risks associated with undesired navigation, the security community has proposed a standard that gives control to web pages to restrict ...
- research-articleDecember 2017
Cloud Multi-Tenancy: Issues and Developments
UCC '17 Companion: Companion Proceedings of the10th International Conference on Utility and Cloud ComputingPages 209–214https://doi.org/10.1145/3147234.3148095Cloud Computing (CC) is a computational paradigm that provides pay-per use services to customers from a pool of networked computing resources that are provided on demand. Customers therefore does not need to worry about infrastructure or storage. Cloud ...
- research-articleOctober 2014
SenseDSL: Automating the Integration of Sensors for MCU-Based Robots and Cyber-Physical Systems
DSM '14: Proceedings of the 14th Workshop on Domain-Specific ModelingPages 41–46https://doi.org/10.1145/2688447.2688455Context: Cyber-physical systems like robotic platforms use sensors to perceive their surroundings. Multiple sensors like infrared, ultrasonic, and incremental encoders help these robots to orient act safely in their environment. Objective: However, ...
- research-articleSeptember 2014
Formalisation of the integration of behavior trees
ASE '14: Proceedings of the 29th ACM/IEEE International Conference on Automated Software EngineeringPages 779–784https://doi.org/10.1145/2642937.2642945In this paper, we present a formal definition of the integration of the requirements modeling language Behavior Trees (BTs). We first provide the semantic integration of two interrelated BTs using an extended version of Communicating Sequential ...
- research-articleNovember 2013
deDacota: toward preventing server-side XSS via automatic code and data separation
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 1205–1216https://doi.org/10.1145/2508859.2516708Web applications are constantly under attack. They are popular, typically accessible from anywhere on the Internet, and they can be abused as malware delivery systems.
Cross-site scripting flaws are one of the most common types of vulnerabilities that ...
- research-articleJune 2013
Implementing generalized alternative construct for erasmus language
CBSE '13: Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineeringPages 101–110https://doi.org/10.1145/2465449.2465464In this paper we describe the design and implementation of the generalized alternative construct for the Erasmus programming language. The alternative construct is a generalization of the familiar if-then-else statement that allows a process to non-...
- research-articleJuly 2012
Exploring and evolving process-oriented control for real and virtual fire fighting robots
GECCO '12: Proceedings of the 14th annual conference on Genetic and evolutionary computationPages 105–112https://doi.org/10.1145/2330163.2330179Current research in evolutionary robotics is largely focused on creating controllers by either evolving neural networks or refining genetic programs based on grammar trees. We propose the use of the parallel, dataflow languages for the construction of ...
- posterJuly 2011
Comparing the performance of evolutionary algorithms for permutation constraint satisfaction
GECCO '11: Proceedings of the 13th annual conference companion on Genetic and evolutionary computationPages 57–58https://doi.org/10.1145/2001858.2001892This paper presents a systematic comparison of canonical versions of two evolutionary algorithms, namely Particle Swarm Optimization (PSO) and Genetic Algorithm (GA), for permutation constraint satisfaction (permut-CSP). Permut-CSP is first ...
- research-articleMay 2011
A CSP-based framework for the specification, verification, and implementation of adaptive systems
SEAMS '11: Proceedings of the 6th International Symposium on Software Engineering for Adaptive and Self-Managing SystemsPages 158–167https://doi.org/10.1145/1988008.1988030The process algebra CSP is tailored for the specification and verification of reactive systems. Such systems react upon external stimuli by adjusting their internal behavior, e.g., to recover from errors. Adaptive systems can be regarded as a subclass ...
- ArticleMay 2009
Bounding the Phase Transition on Edge Matching Puzzles
ISMVL '09: Proceedings of the 2009 39th International Symposium on Multiple-Valued LogicPages 80–85https://doi.org/10.1109/ISMVL.2009.55Edge matching puzzles have been, for a very long time, a common toy for children. Their simplicity hides a subtle and complex problem structure that results, in certain cases, in very hard problems. Those hard cases are being commercially exploited, ...
- research-articleOctober 2008
A formal security policy for xenon
FMSE '08: Proceedings of the 6th ACM workshop on Formal methods in security engineeringPages 43–52https://doi.org/10.1145/1456396.1456401The up-front choice of security policy and formalism used to model it is critical to the success of projects that seek to enforce information-flow security. This paper reports on the Xenon project's choice of policy and formalism. Xenon is a high-...
- research-articleSeptember 2008
Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol
MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and securityPages 205–214https://doi.org/10.1145/1411328.1411363In this paper we provide a novel approach to the analysis of buyer-seller watermarking protocols by tailoring an existing formal technique that has not previously been used in this context. We accurately represent a buyer-seller watermarking protocol as ...