Results 91 to 100 of about 2,510 (186)
A Platform for Virtual Reality Applications [PDF]
Vynález webu (World Wide Web) vyvolal převrat ve způsobu, jakým lidstvo sdílí informace. Přes jeho úspěch obsahuje web mnoho hluboce zakořeněných nedostatků.
Jakub Hlusička
core
WebAssembly Approach to Client-side Web Development using Blazor Framework [PDF]
V současné době je mnoho aplikací tvořených jako webové aplikace, které se snaží poskytnout uživateli stejný nebo lepší zážitek jako desktopové aplikace.
Matěj Lang
core
Containerizing WebAssembly : Considering WebAssembly Containers on IoT Devices as Edge Solution
This paper will explore the speed of execution, memory foot-print and the maturity of WebAssembly Runtimes (WasmRT).For this study, the WasmRT will be Wasmer1and Wasmtime.2Initially, benchmarks were run on a Raspberry Pi 3 model Bto simulate a more hardware capable IoT-device.
Eriksson, Fredrik, Grunditz, Sebastian
openaire +1 more source
TEEm: Supporting Large Memory for Trusted Applications in ARM TrustZone
Trusted Execution Environments (TEEs), like ARM TrustZone, are increasingly crucial in fields like machine learning, blockchain, WebAssembly, and databases due to their robust security features.
Jun Li +3 more
doaj +1 more source
Potential of WebAssembly for Embedded Systems
Application virtual machines provide strong isolation properties and are established in the context of software portability. Those opportunities make them interesting for scalable and secure IoT deployments.
Dumitriu, Dan Mihai +2 more
core +1 more source
Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection
The emergence of WebAssembly allows attackers to hide the malicious functionalities of JavaScript malware in cross-language interoperations, termed JavaScript-WebAssembly multilingual malware (JWMM). However, existing anti-virus solutions based on static
He, Ping +5 more
core
WASMixer: Binary Obfuscation for WebAssembly
WebAssembly (Wasm) is an emerging binary format that draws great attention from our community. However, Wasm binaries are weakly protected, as they can be read, edited, and manipulated by adversaries using either the officially provided readable text format (i.e., wat) or some advanced binary analysis tools.
Cao, Shangtong +3 more
openaire +2 more sources
Browser Fingerprinting Using WebAssembly
Web client fingerprinting has become a widely used technique for uniquely identifying users, browsers, operating systems, and devices with high accuracy. While it is beneficial for applications such as fraud detection and personalized experiences, it also raises privacy concerns by enabling persistent tracking and detailed user profiling.
Guri, Mordechai, Fibert, Dor
openaire +2 more sources
Taint Tracking for WebAssembly
WebAssembly seeks to provide an alternative to running large and untrusted binaries within web browsers by implementing a portable, performant, and secure bytecode format for native web computation. However, WebAssembly is largely unstudied from a security perspective.
Szanto, Aron +2 more
openaire +2 more sources
Mixed-Runtime Pod Networking for Kubernetes-Based Edge Computing
In recent years, microservice-based applications have shifted towards cloud-edge computing, taking advantage of green energy, lower latencies, and local computational resources.
Tom Goethals +4 more
doaj +1 more source

