Benjamin Livshits
Benjamin Livshits
Reader (Associate Professor++) in Computer Science
Dirección de correo verificada de imperial.ac.uk - Página principal
Título
Citado por
Citado por
Año
Finding security vulnerabilities in Java applications with static analysis
B Livshits, MS Lam
Proceedings of the 14th conference on USENIX Security Symposium 14, 18-18, 2005
7352005
Finding application errors and security flaws using PQL: a program query language
M Martin, B Livshits, MS Lam
Conference on Object-Oriented Programming, Systems, Languages, and …, 2005
6142005
DynaMine: finding common error patterns by mining software revision histories
B Livshits, T Zimmermann
Symposium on the Foundations of Software Engineering (FSE) 30 (5), 296-305, 2005
4602005
Zozzle: Low-overhead mostly static JavaScript malware detection
C Curtsinger, B Livshits, B Zorn, C Seifert
Proceedings of the usenix security symposium, 3-3, 2011
407*2011
Nozzle: A defense against heap-spraying code injection attacks
P Ratanaworabhan, B Livshits, B Zorn
USENIX Security Symposium, 169-186, 2009
2932009
Gatekeeper: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code.
S Guarnieri, B Livshits
USENIX Security Symposium, 151-168, 2009
2822009
ConScript: Specifying and enforcing fine-grained security policies for JavaScript in the browser
LA Meyerovich, B Livshits
Security and Privacy (SP), 2010 IEEE Symposium on, 481-496, 2010
2492010
Jsmeter: comparing the behavior of javascript benchmarks with real web applications.
P Ratanaworabhan, B Livshits, BG Zorn
WebApps 10, 3-3, 2010
229*2010
Rozzle: De-cloaking internet malware
C Kolbitsch, B Livshits, B Zorn, C Seifert
2012 IEEE Symposium on Security and Privacy, 443-457, 2012
2202012
Context-sensitive program analysis as database queries
MS Lam, J Whaley, B Livshits, MC Martin, D Avots, M Carbin, C Unkel
Proceedings of the Symposium on Principles of Database Systems (PODS), 1-12, 2005
2152005
Reflection analysis for Java
B Livshits, J Whaley, MS Lam
Asian Symposium on Programming Languages and Systems, 139-160, 2005
1992005
In defense of soundiness: A manifesto
B Livshits, M Sridharan, Y Smaragdakis, O Lhoták, JN Amaral, ...
Communications of the ACM 58 (2), 44-46, 2015
1962015
Finding security errors in Java programs with static analysis
VB Livshits
Proc. 14th USENIX Security Symposium, 2005, 2005
1902005
Fast and precise sanitizer analysis with Bek
P Hooimeijer, B Livshits, D Molnar, P Saxena, M Veanes
Proceedings of the 20th USENIX conference on Security, 1-1, 2011
1792011
Merlin: specification inference for explicit information flow problems
B Livshits, AV Nori, SK Rajamani, A Banerjee
Conference on Programming Language Design and Implementation (PLDI) 44 (6 …, 2009
1672009
ScriptGard: Automatic context-sensitive sanitization for large-scale legacy web applications
P Saxena, D Molnar, B Livshits
Proceedings of the 18th ACM conference on Computer and communications …, 2011
160*2011
AjaxScope: A platform for remotely monitoring the client-side behavior of web 2.0 applications
E Kiciman, B Livshits
ACM Transactions on the Web (TWEB) 4 (4), 13, 2010
1602010
Symbolic finite state transducers: algorithms and applications
M Veanes, P Hooimeijer, B Livshits, D Molnar, N Bjorner
Symposium on the Principles of Programming Languages 47 (1), 137-150, 2012
1562012
PriVaricator: Deceiving fingerprinters with little white lies
N Nikiforakis, W Joosen, B Livshits
WWW, 2014
1492014
Securing web applications with static and dynamic information flow tracking
MS Lam, M Martin, B Livshits, J Whaley
Proceedings of the 2008 ACM SIGPLAN symposium on Partial evaluation and …, 2008
1492008
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20