Sign In

Communications of the ACM

Research Archive


Archives

The Research archive provides access to all Research articles published in past issues of Communications of the ACM.

September 2011


From Communications of the ACM

Vetting Browser Extensions for Security Vulnerabilities with VEX

Vetting Browser Extensions for Security Vulnerabilities with VEX

The browser has become the de facto platform for everyday computation and a popular target for attackers of computer systems. Among the many potential attacks that target browsers, vulnerabilities in browser extensions have received…


From Communications of the ACM

Abstracting Abstract Machines: A Systematic Approach to Higher-Order Program Analysis

Abstracting Abstract Machines

Predictive models are fundamental to engineering reliable software systems. However, designing conservative, computable approximations for the behavior of programs remains a difficult and error-prone process for modern high-level…


From Communications of the ACM

Technical Perspective: Making Browser Extensions Secure

Vulnerabilities in browsers and their extensions have become the primary venue through which cyber criminals compromise the security of Web users and, ultimately, earn money…


From Communications of the ACM

Technical Perspective: Abstracting Abstract Machines

Semanticss-based program analysis requires one to (1) start from a "friendly" semantics; (2) design a "congenial" lattice of runtime properties; (3) associate a "relevant"…

Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo