Filters








2,455 Hits in 7.0 sec

A Dependency Graph Generation Process for Client-side Web Applications

Tajkia R. Toma, Mohayeminul Islam, Mohammad Shoyaib, Shariful Islam
2015 International Journal of Information Engineering and Electronic Business  
We conduct a dynamic analysis to make the JavaScript call graph to address the dynamic nature of JavaScript.  ...  Our evaluation of the JavaScript call graph on six web applications demonstrates that the precision is high for the large applications and relatively low for small applications.  ...  The contribution of the work is for the support of sophisticated development tools for the development phase. The call graph is generated for the IDE services for developers.  ... 
doi:10.5815/ijieeb.2015.02.06 fatcat:zf5yak3wdrg2bbo2fyxccjzqym

Build A Web-based Financial Graph of Share Market

Shivangi Pathak, Rithik Sirohi, Riya Deshwal, Ravinder Kaur, Meerut Institute of Engineering and Technology
2020 International Journal of Engineering Research and  
This study represents and develops former exploration into financial graphs by registering the attributes and magnitudes of graph use and embarkment from representational impartiality.  ...  The stock-specific network searches for the progression of data and equivalent index close values from different countries' stock exchanges are collected and analyzed.  ...  Microsoft Visual Studio is an IDE used for developing computer programs for Microsoft Windows, it is also used for developing websites, web applications, web services, and mobile applications by using  ... 
doi:10.17577/ijertv9is010221 fatcat:wkupjo6n75dwnd6z2obkclwkti

Spectator: Detection and Containment of JavaScript Worms

V. Benjamin Livshits, Weidong Cui
2008 USENIX Annual Technical Conference  
In this paper we demonstrate the effectiveness and efficiency of Spectator through both large-scale simulations as well as a case study that observes the behavior of a real-life JavaScript worm propagating  ...  Based on our case study, we believe that Spectator is able to detect all JavaScript worms released to date while maintaining a low detection overhead for a range of workloads.  ...  Acknowledgments We would like to express our profound gratitude to Karl Chen, Emre Kıcıman, David Molnar, Berend-Jan "SkyLined" Wever, and others for their help in refining the ideas contained here and  ... 
dblp:conf/usenix/LivshitsC08 fatcat:6qc3o4akb5fhln7ntarcim2dve

Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences

Yuta TAKATA, Mitsuaki AKIYAMA, Takeshi YAGI, Takeo HARIU, Kazuhiko OHKUBO, Shigeki GOTO
2018 IEICE transactions on information and systems  
As a result of evaluating our method with 8,467 JavaScript samples executed in 20,272 malicious websites, we discovered previously unknown evasion techniques that abuse the differences among JavaScript  ...  Attackers detect the honeyclient and evade analysis using sophisticated JavaScript code.  ...  To construct a redirection graph, we use a method [19] for constructing link relationships using URLs in the Referer field or Location field of HTTP headers and URLs on HTTP bodies.  ... 
doi:10.1587/transinf.2017icp0005 fatcat:ayrbplq2tvajtpo3dlxttwvgdu

Using static analysis for Ajax intrusion detection

Arjun Guha, Shriram Krishnamurthi, Trevor Jim
2009 Proceedings of the 18th international conference on World wide web - WWW '09  
We present a static control-flow analysis for JavaScript programs running in a web browser.  ...  We use our analysis to extract a model of expected client behavior as seen from the server, and build an intrusion-prevention proxy for the server: the proxy intercepts client requests and disables those  ...  Figure 4 presents our algorithm to construct request graphs from control-flow graphs.  ... 
doi:10.1145/1526709.1526785 dblp:conf/www/GuhaKJ09 fatcat:oezj7uezxnalteu3txg7kor4gq

Formalizing Event-Driven Behavior of Serverless Applications [article]

Matthew Obetz, Stacy Patterson, Ana Milanova
2019 arXiv   pre-print
Finally, we construct service call graphs for twelve serverless JavaScript applications, using a prototype of our call graph construction algorithm, and we evaluate their accuracy.  ...  We use these semantics to define the notion of the service call graph for serverless applications that captures program flows through functions and services.  ...  Call Graph Implementation and Evaluation We implement service call graph construction as an extension of the Type Analysis for JavaScript framework [21] .  ... 
arXiv:1912.03584v1 fatcat:xwet3whnmnfuvp57232qyscy3m

Cross-platform Identity-based Cryptography using WebAssembly

Ádám Vécsi, Attila Bagossy, Attila Pethő
2019 Infocommunications journal  
The explosive spread of the devices connected to the Internet has increased the need for efficient and portable cryptographic routines.  ...  The main goal of this library is to provide an efficient and opensource IBC implementation for the desktop, the mobile, and the IoT platforms.  ...  ACKNOWLEDGMENT We would like to thank the anonymous referees for their thoughtful comments and efforts towards improving our manuscript.  ... 
doi:10.36244/icj.2019.4.5 fatcat:tgu3fxp2hnh7zhilst6vtqcrb4

Performance analysis and monitoring of computational resources with a comparison between node.js. and as php and .net core platforms

2020 International journal of developmental research  
Three applications were developed to compare the speed and operation of requests for each of them, in addition to the time for each request and the total time spent.  ...  a single language, Javascript, both mobile devices, servers and Applications from the web.  ...  To members of our family, for the love, encouragement and unconditional support, and to all who directly or indirectly they were part of my training, thank you very much.  ... 
doi:10.37118/ijdr.18695.05.2020 fatcat:py7lqrc7uvdmfjdp4uyxe3taai

A scalable architecture for the HTML5/X3D integration model X3DOM

J. Behr, Y. Jung, J. Keil, T. Drevensek, M. Zoellner, P. Eschler, D. Fellner
2010 Proceedings of the 15th International Conference on Web 3D Technology - Web3D '10  
This includes native browser implementations and X3D-plugins as well as a WebGL-based scene-graph, which allows running the content without the need for installing additional plugins on all browsers that  ...  Figure 1: Screenshots showing third party applications realized with X3DOM: Simulation of the planets and 100000 of the known 480000 asteroids of the Solar System (left), 3D visualization of social networks  ...  The IDs are also necessary for handling updates of the X3D graph.  ... 
doi:10.1145/1836049.1836077 dblp:conf/vrml/BehrJKDZEF10 fatcat:ousgjxxo4jamtfkema726xq5mm

PyCG: Practical Call Graph Generation in Python [article]

Vitalis Salis, Thodoris Sotiropoulos, Panos Louridas, Diomidis Spinellis, Dimitris Mitropoulos
2021 arXiv   pre-print
We propose a pragmatic, static approach for call graph generation in Python.  ...  Our results indicate that PyCG can efficiently handle thousands of lines of code in less than a second (0.38 seconds for 1k LoC on average).  ...  We thank the anonymous reviewers for their insightful comments and constructive feedback.  ... 
arXiv:2103.00587v1 fatcat:czfwwtqf6rfqdhfdd24hpdqlpq

RTX-KG2: a system for building a semantically standardized knowledge graph for translational biomedicine [article]

E. C. Wood, Amy K. Glen, Lindsey G. Kvarfordt, Finn Womack, Liliana Acevedo, Timothy S. Yoon, Chunyu Ma, Veronica Flores, Meghamala Sinha, Jared C. Roach, Luis Mendoza, Andrew S. Hoffman (+3 others)
2021 bioRxiv   pre-print
JavaScript Object Notation (JSON) serializations of RTX-KG2 are available for download of RTX-KG2 in both the pre-canonicalized form and in canonicalized form (in which synonym concepts are merged).  ...  Within that project and within the field more broadly, there is an urgent need for an open-source framework that can efficiently and reproducibly build an integrated, standards-compliant, and comprehensive  ...  David Wishart and Carin Li for providing a download link for the SMPDB PubMed annotations and Noel Southall and NCATS for help with hosting RTX-KG2 on GitHub.  ... 
doi:10.1101/2021.10.17.464747 fatcat:2maw4bch2rcv7bwsf7id2tknhy

Pointer Analysis (Dagstuhl Seminar 13162)

Ondrej Lhotak, Yannis Smaragdakis, Manu Sridharan, Marc Herbstritt
2013 Dagstuhl Reports  
The seminar participants presented recent research results, and identified key open problems and future directions for the field.  ...  This report presents abstracts of the participants' talks and summaries of the breakout sessions from the seminar.  ...  As a flow-sensitive analysis it combines control flow analysis, call graph construction, SSA-construction and points-to analysis.  ... 
doi:10.4230/dagrep.3.4.91 dblp:journals/dagstuhl-reports/LhotakSS13 fatcat:no7xgil6kzgyfnwqfe773wlnza

Extracting URLs from JavaScript via program analysis

Qi Wang, Jingyu Zhou, Yuting Chen, Yizhou Zhang, Jianjun Zhao
2013 Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2013  
This poses significant challenges for search engines, because more web URLs are now hidden inside JavaScript code and most web crawlers are script-agnostic, significantly reducing the coverage of search  ...  Experiments on large sets of popular web pages show that our approach is effective and efficient in practice.  ...  Constructing Call Graph Again, we utilize Closure Compiler to construct call graphs.  ... 
doi:10.1145/2491411.2494583 dblp:conf/sigsoft/WangZCZZ13 fatcat:wdgv64ob5fa67kilqhufdrcylm

Automatic Discovery and Inferencing of Complex Bioinformatics Web Interfaces

Anne H. H. Ngu, Daniel Rocco, Terence Critchlow, David Buttler
2005 World wide web (Bussum)  
We propose a service class description (SCD)-a meta-data approach for classifying Web data sources that takes into account both the capability and the conversational semantics of the source.  ...  A correct classification of any kind of Web data source must address both the capability of the source and the conversation/interaction semantics inherent in the design of the data source.  ...  The shortcomings of this approach are then discussed, which leads to the more robust and efficient approach called PageDiff for identification of indirection pages.  ... 
doi:10.1007/s11280-005-0509-5 fatcat:lzojor4l2vfxpadnwitj2irpsq

The bigwig Project

Claus Brabrand, Anders Møller, Michael I. Schwartzbach
2002 BRICS Report Series  
The development of systems for constructing such dynamic Web services has emerged as a whole new research area.  ...  The core of the design consists of a session-centered service model together with a flexible template-based mechanism for dynamic Web page construction.  ...  We also appreciate the efforts made by the participants of the WIG Projects course in Spring 1998. Finally, we are grateful for the insightful comments we have received from the anonymous reviewers.  ... 
doi:10.7146/brics.v9i1.21718 fatcat:fnzmrsudlfc2diwhwp2voeugzy
« Previous Showing results 1 — 15 out of 2,455 results