ACM DL

Computing Surveys (CSUR)

Menu

Search Issue
enter search term and/or author name below:

Archive


ACM Computing Surveys (CSUR), Volume 44 Issue 3, June 2012

Control-flow analysis of functional programs
Jan Midtgaard
Article No.: 10
DOI: 10.1145/2187671.2187672

We present a survey of control-flow analysis of functional programs, which has been the subject of extensive investigation throughout the past 30 years. Analyses of the control flow of functional programs have been formulated in multiple settings...

Mitigating program security vulnerabilities: Approaches and challenges
Hossain Shahriar, Mohammad Zulkernine
Article No.: 11
DOI: 10.1145/2187671.2187673

Programs are implemented in a variety of languages and contain serious vulnerabilities which might be exploited to cause security breaches. These vulnerabilities have been exploited in real life and caused damages to related stakeholders such as...

A vocabulary of program slicing-based techniques
Josep Silva
Article No.: 12
DOI: 10.1145/2187671.2187674

This article surveys previous work on program slicing-based techniques. For each technique, we describe its features, its main applications, and a common example of slicing using such a technique. After discussing each technique separately, all of...

Recent thermal management techniques for microprocessors
Joonho Kong, Sung Woo Chung, Kevin Skadron
Article No.: 13
DOI: 10.1145/2187671.2187675

Microprocessor design has recently encountered many constraints such as power, energy, reliability, and temperature. Among these challenging issues, temperature-related issues have become especially important within the past several years. We...

A review of recent advances in 3D ear- and expression-invariant face biometrics
Syed M. S. Islam, Mohammed Bennamoun, Robyn A. Owens, Rowan Davies
Article No.: 14
DOI: 10.1145/2187671.2187676

Biometric-based human recognition is rapidly gaining popularity due to breaches of traditional security systems and the lowering cost of sensors. The current research trend is to use 3D data and to combine multiple traits to improve accuracy and...

Processing flows of information: From data stream to complex event processing
Gianpaolo Cugola, Alessandro Margara
Article No.: 15
DOI: 10.1145/2187671.2187677

A large number of distributed applications requires continuous and timely processing of information as it flows from the periphery to the center of the system. Examples include intrusion detection systems which analyze network traffic in real-time...

Behavioral interface specification languages
John Hatcliff, Gary T. Leavens, K. Rustan M. Leino, Peter Müller, Matthew Parkinson
Article No.: 16
DOI: 10.1145/2187671.2187678

Behavioral interface specification languages provide formal code-level annotations, such as preconditions, postconditions, invariants, and assertions that allow programmers to express the intended behavior of program modules. Such specifications...

Runtime countermeasures for code injection attacks against C and C++ programs
Yves Younan, Wouter Joosen, Frank Piessens
Article No.: 17
DOI: 10.1145/2187671.2187679

The lack of memory safety in C/C++ often leads to vulnerabilities. Code injection attacks exploit these vulnerabilities to gain control over the execution flow of applications. These attacks have played a key role in many major security...