Declarative policies for capability control

C Dimoulas, S Moore, A Askarov… - 2014 IEEE 27th …, 2014 - ieeexplore.ieee.org
In capability-safe languages, components can access a resource only if they possess a
capability for that resource. As a result, a programmer can prevent an untrusted component …

TreatJS: Higher-order contracts for JavaScript

M Keil, P Thiemann - arXiv preprint arXiv:1504.08110, 2015 - arxiv.org
TreatJS is a language embedded, higher-order contract system for JavaScript which
enforces contracts by run-time monitoring. Beyond providing the standard abstractions for …

A systematic analysis of the event-stream incident

I Arvanitis, G Ntousakis, S Ioannidis… - Proceedings of the 15th …, 2022 - dl.acm.org
On October 5, 2018, a GitHub user announced a critical security vulnerability in event-
stream, a JavaScript package meant to simplify working with data-streams. The vulnerability …

Transparent object proxies for JavaScript

M Keil, SN Guria, A Schlegel, M Geffken… - arXiv preprint arXiv …, 2015 - arxiv.org
Proxies are the swiss army knives of object adaptation. They introduce a level of indirection
to intercept select operations on a target object and divert them as method calls to a handler …

Symbolic solving of extended regular expression inequalities

M Keil, P Thiemann - arXiv preprint arXiv:1410.3227, 2014 - arxiv.org
This paper presents a new solution to the containment problem for extended regular
expressions that extends basic regular expressions with intersection and complement …

Efficient module-level dynamic analysis for dynamic languages with module recontextualization

N Vasilakis, G Ntousakis, V Heller… - Proceedings of the 29th …, 2021 - dl.acm.org
Dynamic program analysis is a long-standing technique for obtaining information about
program execution. We present module recontextualization, a new dynamic analysis …

Hedge algebra based type-2 fuzzy logic system and its application to predict survival time of myeloma patients

PA Phong, DK Dong, TD Khang - … International Conference on …, 2009 - ieeexplore.ieee.org
In this paper, we propose a method to construct hedge algebra based type-2 fuzzy logic
systems (HA-T2FLS). In these fuzzy logic systems, the footprints of uncertainty (FOU) of type …

Transaction-based sandboxing for JavaScript

M Keil, P Thiemann - arXiv preprint arXiv:1612.00669, 2016 - arxiv.org
Today's JavaScript applications are composed of scripts from different origins that are
loaded at run time. As not all of these origins are equally trusted, the execution of these …

On the proxy identity crisis

M Keil, P Thiemann - arXiv preprint arXiv:1312.5429, 2013 - arxiv.org
A proxy, in general, is an object mediating access to an arbitrary target object. The proxy is
then intended to be used in place of the target object. Ideally, a proxy is not distinguishable …

[PDF][PDF] Declaratively Specifying Security Policies For Web Applications

ALS Pupo, J Nicolay, EG Boix - Meta 2016: Workshop on Meta …, 2016 - soft.vub.ac.be
The complex architecture of browser technologies and dynamic characteristics of JavaScript
make it difficult to ensure security in client-side web applications. Browser-level policies …