The Research archive provides access to all Research articles published in past issues of Communications of the ACM.
Static program analysis techniques cannot know certain values, such as the value of user input or network state, at analysis time. While such unknown values need to be treated…
A system is secure only if the entire system is secure. While this may sound obvious, achieving total security throughout a system is rarely trivial when you consider many real-world systems are constantly evolving.
You are given a program. Will it crash? Is it subject to a spoofing, buffer overflow, or injection attack? Is this part of it dead code? Can I replace that code fragment with…
Lightweight, embedded Web servers are soon about to outnumber regular Internet Web servers. We reveal a series of attacks that target Web server logic and are based on a new…