Benjamin Livshits
Benjamin Livshits
Reader (Associate Professor++) in Computer Science
Email verificata su - Home page
Citata da
Citata da
Finding security vulnerabilities in Java applications with static analysis
B Livshits, MS Lam
Proceedings of the 14th conference on USENIX Security Symposium 14, 18-18, 2005
Finding application errors and security flaws using PQL: a program query language
M Martin, B Livshits, MS Lam
Conference on Object-Oriented Programming, Systems, Languages, andá…, 2005
DynaMine: finding common error patterns by mining software revision histories
B Livshits, T Zimmermann
Symposium on the Foundations of Software Engineering (FSE) 30 (5), 296-305, 2005
Zozzle: Low-overhead mostly static javascript malware detection
C Curtsinger, B Livshits, B Zorn, C Seifert
Proceedings of the usenix security symposium, 3-3, 2011
Nozzle: A defense against heap-spraying code injection attacks
P Ratanaworabhan, B Livshits, B Zorn
USENIX Security Symposium, 169-186, 2009
Gatekeeper: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code.
S Guarnieri, B Livshits
USENIX Security Symposium, 151-168, 2009
ConScript: Specifying and enforcing fine-grained security policies for JavaScript in the browser
LA Meyerovich, B Livshits
Security and Privacy (SP), 2010 IEEE Symposium on, 481-496, 2010
Jsmeter: comparing the behavior of javascript benchmarks with real web applications.
P Ratanaworabhan, B Livshits, BG Zorn
WebApps 10, 3-3, 2010
Context-sensitive program analysis as database queries
MS Lam, J Whaley, B Livshits, MC Martin, D Avots, M Carbin, C Unkel
Proceedings of the Symposium on Principles of Database Systems (PODS), 1-12, 2005
Rozzle: De-cloaking internet malware
C Kolbitsch, B Livshits, B Zorn, C Seifert
2012 IEEE Symposium on Security and Privacy, 443-457, 2012
Reflection analysis for Java
B Livshits, J Whaley, MS Lam
Asian Symposium on Programming Languages and Systems, 139-160, 2005
Finding security errors in Java programs with static analysis
VB Livshits
Proc. 14th USENIX Security Symposium, 2005, 2005
In defense of soundiness: a manifesto
B Livshits, M Sridharan, Y Smaragdakis, O Lhotßk, JN Amaral, ...
Communications of the ACM 58 (2), 44-46, 2015
Fast and precise sanitizer analysis with Bek
P Hooimeijer, B Livshits, D Molnar, P Saxena, M Veanes
Proceedings of the 20th USENIX conference on Security, 1-1, 2011
Merlin: specification inference for explicit information flow problems
B Livshits, AV Nori, SK Rajamani, A Banerjee
Conference on Programming Language Design and Implementation (PLDI) 44 (6á…, 2009
ScriptGard: Automatic context-sensitive sanitization for large-scale legacy web applications
P Saxena, D Molnar, B Livshits
Proceedings of the 18th ACM conference on Computer and communicationsá…, 2011
AjaxScope: A platform for remotely monitoring the client-side behavior of web 2.0 applications
E Kiciman, B Livshits
ACM Transactions on the Web (TWEB) 4 (4), 13, 2010
Symbolic finite state transducers: algorithms and applications
M Veanes, P Hooimeijer, B Livshits, D Molnar, N Bjorner
Symposium on the Principles of Programming Languages 47 (1), 137-150, 2012
Securing web applications with static and dynamic information flow tracking
MS Lam, M Martin, B Livshits, J Whaley
Proceedings of the 2008 ACM SIGPLAN symposium on Partial evaluation andá…, 2008
RePriv: Re-Imagining Content Personalization and In-Browser Privacy
M Fredrikson, B Livshits
Security and Privacy (SP), 2011 IEEE Symposium on, 131-146, 2011
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20