Sign In

Communications of the ACM

Research Archive


Archives

The Research archive provides access to all Research articles published in past issues of Communications of the ACM.

September 2011


From Communications of the ACM

Vetting Browser Extensions for Security Vulnerabilities with VEX

Vetting Browser Extensions for Security Vulnerabilities with VEX

The browser has become the de facto platform for everyday computation and a popular target for attackers of computer systems. Among the many potential attacks that target browsers, vulnerabilities in browser extensions have received…


From Communications of the ACM

Abstracting Abstract Machines: A Systematic Approach to Higher-Order Program Analysis

Abstracting Abstract Machines

Predictive models are fundamental to engineering reliable software systems. However, designing conservative, computable approximations for the behavior of programs remains a difficult and error-prone process for modern high-level…


From Communications of the ACM

Technical Perspective: Making Browser Extensions Secure

Vulnerabilities in browsers and their extensions have become the primary venue through which cyber criminals compromise the security of Web users and, ultimately, earn money…


From Communications of the ACM

Technical Perspective: Abstracting Abstract Machines

Semanticss-based program analysis requires one to (1) start from a "friendly" semantics; (2) design a "congenial" lattice of runtime properties; (3) associate a "relevant"…