A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Dependency Graph Generation Process for Client-side Web Applications
2015
International Journal of Information Engineering and Electronic Business
We conduct a dynamic analysis to make the JavaScript call graph to address the dynamic nature of JavaScript. ...
Our evaluation of the JavaScript call graph on six web applications demonstrates that the precision is high for the large applications and relatively low for small applications. ...
The contribution of the work is for the support of sophisticated development tools for the development phase. The call graph is generated for the IDE services for developers. ...
doi:10.5815/ijieeb.2015.02.06
fatcat:zf5yak3wdrg2bbo2fyxccjzqym
Build A Web-based Financial Graph of Share Market
2020
International Journal of Engineering Research and
This study represents and develops former exploration into financial graphs by registering the attributes and magnitudes of graph use and embarkment from representational impartiality. ...
The stock-specific network searches for the progression of data and equivalent index close values from different countries' stock exchanges are collected and analyzed. ...
Microsoft Visual Studio is an IDE used for developing computer programs for Microsoft Windows, it is also used for developing websites, web applications, web services, and mobile applications by using ...
doi:10.17577/ijertv9is010221
fatcat:wkupjo6n75dwnd6z2obkclwkti
Spectator: Detection and Containment of JavaScript Worms
2008
USENIX Annual Technical Conference
In this paper we demonstrate the effectiveness and efficiency of Spectator through both large-scale simulations as well as a case study that observes the behavior of a real-life JavaScript worm propagating ...
Based on our case study, we believe that Spectator is able to detect all JavaScript worms released to date while maintaining a low detection overhead for a range of workloads. ...
Acknowledgments We would like to express our profound gratitude to Karl Chen, Emre Kıcıman, David Molnar, Berend-Jan "SkyLined" Wever, and others for their help in refining the ideas contained here and ...
dblp:conf/usenix/LivshitsC08
fatcat:6qc3o4akb5fhln7ntarcim2dve
Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences
2018
IEICE transactions on information and systems
As a result of evaluating our method with 8,467 JavaScript samples executed in 20,272 malicious websites, we discovered previously unknown evasion techniques that abuse the differences among JavaScript ...
Attackers detect the honeyclient and evade analysis using sophisticated JavaScript code. ...
To construct a redirection graph, we use a method [19] for constructing link relationships using URLs in the Referer field or Location field of HTTP headers and URLs on HTTP bodies. ...
doi:10.1587/transinf.2017icp0005
fatcat:ayrbplq2tvajtpo3dlxttwvgdu
Using static analysis for Ajax intrusion detection
2009
Proceedings of the 18th international conference on World wide web - WWW '09
We present a static control-flow analysis for JavaScript programs running in a web browser. ...
We use our analysis to extract a model of expected client behavior as seen from the server, and build an intrusion-prevention proxy for the server: the proxy intercepts client requests and disables those ...
Figure 4 presents our algorithm to construct request graphs from control-flow graphs. ...
doi:10.1145/1526709.1526785
dblp:conf/www/GuhaKJ09
fatcat:oezj7uezxnalteu3txg7kor4gq
Formalizing Event-Driven Behavior of Serverless Applications
[article]
2019
arXiv
pre-print
Finally, we construct service call graphs for twelve serverless JavaScript applications, using a prototype of our call graph construction algorithm, and we evaluate their accuracy. ...
We use these semantics to define the notion of the service call graph for serverless applications that captures program flows through functions and services. ...
Call Graph Implementation and Evaluation We implement service call graph construction as an extension of the Type Analysis for JavaScript framework [21] . ...
arXiv:1912.03584v1
fatcat:xwet3whnmnfuvp57232qyscy3m
Cross-platform Identity-based Cryptography using WebAssembly
2019
Infocommunications journal
The explosive spread of the devices connected to the Internet has increased the need for efficient and portable cryptographic routines. ...
The main goal of this library is to provide an efficient and opensource IBC implementation for the desktop, the mobile, and the IoT platforms. ...
ACKNOWLEDGMENT We would like to thank the anonymous referees for their thoughtful comments and efforts towards improving our manuscript. ...
doi:10.36244/icj.2019.4.5
fatcat:tgu3fxp2hnh7zhilst6vtqcrb4
Performance analysis and monitoring of computational resources with a comparison between node.js. and as php and .net core platforms
2020
International journal of developmental research
Three applications were developed to compare the speed and operation of requests for each of them, in addition to the time for each request and the total time spent. ...
a single language, Javascript, both mobile devices, servers and Applications from the web. ...
To members of our family, for the love, encouragement and unconditional support, and to all who directly or indirectly they were part of my training, thank you very much. ...
doi:10.37118/ijdr.18695.05.2020
fatcat:py7lqrc7uvdmfjdp4uyxe3taai
A scalable architecture for the HTML5/X3D integration model X3DOM
2010
Proceedings of the 15th International Conference on Web 3D Technology - Web3D '10
This includes native browser implementations and X3D-plugins as well as a WebGL-based scene-graph, which allows running the content without the need for installing additional plugins on all browsers that ...
Figure 1: Screenshots showing third party applications realized with X3DOM: Simulation of the planets and 100000 of the known 480000 asteroids of the Solar System (left), 3D visualization of social networks ...
The IDs are also necessary for handling updates of the X3D graph. ...
doi:10.1145/1836049.1836077
dblp:conf/vrml/BehrJKDZEF10
fatcat:ousgjxxo4jamtfkema726xq5mm
PyCG: Practical Call Graph Generation in Python
[article]
2021
arXiv
pre-print
We propose a pragmatic, static approach for call graph generation in Python. ...
Our results indicate that PyCG can efficiently handle thousands of lines of code in less than a second (0.38 seconds for 1k LoC on average). ...
We thank the anonymous reviewers for their insightful comments and constructive feedback. ...
arXiv:2103.00587v1
fatcat:czfwwtqf6rfqdhfdd24hpdqlpq
RTX-KG2: a system for building a semantically standardized knowledge graph for translational biomedicine
[article]
2021
bioRxiv
pre-print
JavaScript Object Notation (JSON) serializations of RTX-KG2 are available for download of RTX-KG2 in both the pre-canonicalized form and in canonicalized form (in which synonym concepts are merged). ...
Within that project and within the field more broadly, there is an urgent need for an open-source framework that can efficiently and reproducibly build an integrated, standards-compliant, and comprehensive ...
David Wishart and Carin Li for providing a download link for the SMPDB PubMed annotations and Noel Southall and NCATS for help with hosting RTX-KG2 on GitHub. ...
doi:10.1101/2021.10.17.464747
fatcat:2maw4bch2rcv7bwsf7id2tknhy
Pointer Analysis (Dagstuhl Seminar 13162)
2013
Dagstuhl Reports
The seminar participants presented recent research results, and identified key open problems and future directions for the field. ...
This report presents abstracts of the participants' talks and summaries of the breakout sessions from the seminar. ...
As a flow-sensitive analysis it combines control flow analysis, call graph construction, SSA-construction and points-to analysis. ...
doi:10.4230/dagrep.3.4.91
dblp:journals/dagstuhl-reports/LhotakSS13
fatcat:no7xgil6kzgyfnwqfe773wlnza
Extracting URLs from JavaScript via program analysis
2013
Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2013
This poses significant challenges for search engines, because more web URLs are now hidden inside JavaScript code and most web crawlers are script-agnostic, significantly reducing the coverage of search ...
Experiments on large sets of popular web pages show that our approach is effective and efficient in practice. ...
Constructing Call Graph Again, we utilize Closure Compiler to construct call graphs. ...
doi:10.1145/2491411.2494583
dblp:conf/sigsoft/WangZCZZ13
fatcat:wdgv64ob5fa67kilqhufdrcylm
Automatic Discovery and Inferencing of Complex Bioinformatics Web Interfaces
2005
World wide web (Bussum)
We propose a service class description (SCD)-a meta-data approach for classifying Web data sources that takes into account both the capability and the conversational semantics of the source. ...
A correct classification of any kind of Web data source must address both the capability of the source and the conversation/interaction semantics inherent in the design of the data source. ...
The shortcomings of this approach are then discussed, which leads to the more robust and efficient approach called PageDiff for identification of indirection pages. ...
doi:10.1007/s11280-005-0509-5
fatcat:lzojor4l2vfxpadnwitj2irpsq
The bigwig Project
2002
BRICS Report Series
The development of systems for constructing such dynamic Web services has emerged as a whole new research area. ...
The core of the design consists of a session-centered service model together with a flexible template-based mechanism for dynamic Web page construction. ...
We also appreciate the efforts made by the participants of the WIG Projects course in Spring 1998. Finally, we are grateful for the insightful comments we have received from the anonymous reviewers. ...
doi:10.7146/brics.v9i1.21718
fatcat:fnzmrsudlfc2diwhwp2voeugzy
« Previous
Showing results 1 — 15 out of 2,455 results