explore javascript-code



GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code .
free download

The advent of Web 2.0 has lead to the proliferation of client-side code that is typically written in JavaScript. This code is often combined or mashed-up with other code and content from disparate, mutually untrusting parties, leading to undesirable security and reliability

Automatic Simplification of Obfuscated JavaScript Code : A Semantics-Based Approach.
free download

JavaScript is a scripting language that is commonly used to create sophisticated interactive clientside web applications. With the popularity growth in those Web 2.0 sites, browsing the Internet without JavaScript support is impractical. However, JavaScript code can also be

JSZap: compressing JavaScript code
free download

JavaScript is widely used in web-based applications, and gigabytes of JavaScript code are transmitted over the Internet every day. Current efforts to compress JavaScript to reduce network delays and server bandwidth requirements rely on syntactic changes to the source

Reactive programming with RxJS: untangle your asynchronous JavaScript code
free download

SanchezGreat feature coverage of Rx. 4 of 4 people found the following review helpful

A case for persistent caching of compiled javascript code in mobile web browsers
free download

Over the past decade webpages have grown an order of magnitude in computational complexity. Modern webpages provide rich and complex interactive behaviors for differentiated user experiences. Many of these new capabilities are delivered via JavaScript

Jsobfusdetector: A binary pso-based one-class classifier ensemble to detect obfuscated javascript code
free download

JavaScript code obfuscation has become a major technique used by malware writers to evade static analysis techniques. Over the past years, a number of dynamic analysis techniques have been proposed to detect obfuscated malicious JavaScript code at runtime

NOFUS: Automatically Detecting+ String. fromCharCode (32)+ ObFuSCateD. toLowerCase ()+ JavaScript Code
free download

Searching for Indicators of Device Fingerprinting in the JavaScript Code of Popular Websites
free download

Over the years a number of studies have investigated online tracking using cookies. Individuals and organizations are becoming aware of this form of tracking and are taking steps to protect their privacy by deleting and blocking cookies. In response, some

Automated unit testing of JavaScript code through symbolic executor SymJS
free download

JavaScript is expected to be a programming language of even wider use, considering demands for more interactive web/mobile applications and deployment in server-side software. While reliability of JavaScript code will be of more importance, testing techniques

Polymorphic Malicious JavaScript Code Detection for APT Attack Defence.
free download

The majority of existing malware detection techniques detects malicious codes by identifying malicious behavior patterns. However, they have difficulty identifying new or modified malicious behaviors; consequently, new techniques that can effectively and accurately

Run-time Generation of JavaScript Code by Perl CGI Programs
free download

Run-time generation of JavaScript code by Perl CGI programs is a technique that has been used with considerable success at the Aerodynamics Laboratory of the Institute for Aerospace Research, National Research Council of Canada. After a brief introduction to the

An extensible approach for taming the challenges of JavaScript dead code elimination
free download

Today, it is common practice to reuse existing JavaScript code , usually in the form of third-party libraries and frameworks. If on one side this practice helps in speeding up development time, on the other side it comes with the

Revolver: Detecting Evasion Attacks in Malicious JavaScript Code
free download

In recent years, attacks targeting web clients, in particular, web browsers and their plugins, have become a prevalent threat. Attackers deploy web pages that contain exploit code, typically written in HTML and JavaScript, and use them to compromise unsuspecting victims

Bachelor Thesis On the Security of the SOP-DOM Using HTML and JavaScript Code
free download

The Same-Origin Policy (SOP) has been subject of a lot of security researches . Many bugs have been discovered, reported and fixed . Since its introduction 1996, the SOP is being extended and improved to cover new technologies and larger parts of the

Detection of Browser Fingerprinting by Static JavaScript Code Classification
free download

Page 1. Detection of Browser Fingerprinting by Static JavaScript Code Classification Sjors Haanen Tim van Zalingen UvA February 6, 2018 Supervisors (KPMG): Aidan Barrington Ruben de Vries Research Project 82 Sjors Haanen Tim van Zalingen (UvA) RP82: Browser Fingerprinting

A Critical Review of Information Flow Analysis Tools Aiming at Detecting Potential Vulnerabilities in JavaScript Code
free download

Information flow analysis (IFA) tools have proved its effectiveness towards tracing information flow in order to prevent private information from being exposed to public attackers. This paper critically reviews and evaluates the latest information flow analysis

Writing robust JavaScript code or
free download

Page 1. Writing robust JavaScript code or JavaScript: the Good, the Bad, the Strict and the Secure Parts Tom Van Cutsem Page 2. Talk OutlinePart I: JavaScript, the Good and the Bad parts Part II: ECMAScript 5 and Strict ModePart III: a glance at upcoming ECMAScript 6 features

VHDL Code Generator based on Component Diagrams with JavaScript and Object Serialization
free download

Visualization Tool programmed in Java. The Page 3. following JavaScript code provides this connection for the example of the parameterized bitwidth. templates.put( BIT_WIDTH , properties.get(0).getValue()); As you can see in

JavaScript Documentation Generation Through Semantic Code Analysis
free download

5.2 AST Reduction Given the initial AST produced by Acorn, we reconstruct a separate reduced AST containing only the minimum essen- tial nodes representing the original JavaScript code to sim- plify the fingerprinting process. There are two main steps to this reconstruction



IEEE PROJECTS
COMMENT computer science



 

FREE IEEE PAPER