Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,762,360 papers from all fields of science
Search
Sign In
Create Free Account
Taint checking
Known as:
Taint
, Taint check
Taint checking is a feature in some computer programming languages, such as Perl and Ruby, designed to increase security by preventing malicious…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
Amavis
Buffer overflow
Client-side
DynamoRIO
Expand
Broader (2)
Computer programming
Static program analysis
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Notice of RetractionA Static Analysis Tool for Detecting Web Application Injection Vulnerabilities for ASP Program
Xin-hua Zhang
,
Zhi-jian Wang
2nd International Conference on E-business and…
2010
Corpus ID: 13930469
Publicly reported vulnerability in recent years strong growth of the Web Application , Cross-site scripting (XSS) and SQL…
Expand
2010
2010
Input-driven dynamic execution prediction of streaming applications
Farhana Aleen
,
Monirul I. Sharif
,
S. Pande
ACM SIGPLAN Symposium on Principles & Practice of…
2010
Corpus ID: 15666419
Streaming applications are promising targets for effectively utilizing multicores because of their inherent amenability to…
Expand
2009
2009
Control flow obfuscation with information flow tracking
Haibo Chen
,
Liwei Yuan
,
Xi Wu
,
B. Zang
,
Bo Huang
,
P. Yew
Micro
2009
Corpus ID: 9643507
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various…
Expand
Review
2007
Review
2007
Guidelines for assessing the knowledge management maturity of organizations
C. J. Kruger
,
Maritha E Snyman
2007
Corpus ID: 51857111
In a recent article Kruger and Snyman hypothesized that progressions in knowledge management maturity (from a strategic…
Expand
2004
2004
Preface: A "Hive of Subtlety": Aesthetics and the End(s) of Cultural Studies
Christopher Castiglia
,
R. Castronovo
2004
Corpus ID: 161627692
A talking head on the evening news in spring 2004, describing the Democratic primaries underway at the time, claimed that there…
Expand
Highly Cited
2003
Highly Cited
2003
MECA: an extensible, expressive system and language for statically checking security properties
Junfeng Yang
,
Theodore Kremenek
,
Yichen Xie
,
D. Engler
Conference on Computer and Communications…
2003
Corpus ID: 252049
This paper describes a system and annotation language, MECA, for checking security rules. MECA is expressive and designed for…
Expand
Highly Cited
1999
Highly Cited
1999
Long-term algal control in a reservoir using barley straw
P. R. F. Barrett
,
J. Littlejohn
,
J. Curnow
Hydrobiologia
1999
Corpus ID: 35466104
Populations of cyanobacteria, diatoms and unicellular green algae in a potable supply reservoir have been suppressed continuously…
Expand
Highly Cited
1994
Highly Cited
1994
A multisensor system for beer flavour monitoring using an array of conducting polymers and predictive classifiers
J. Gardner
,
T. Pearce
,
Sharon Friel
,
P. Bartlett
,
N. Blair
1994
Corpus ID: 96977763
1994
1994
Channels of propaganda
1994
Corpus ID: 151122723
Highly Cited
1985
Highly Cited
1985
Constraining models of word recognition
Mark S. Seidenberg
Cognition
1985
Corpus ID: 53151087
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE