Matthew S. Finifter
Matthew S. Finifter
Uber Technologies, Inc.
Email verificata su uber.com - Home page
Titolo
Citata da
Citata da
Anno
A survey of mobile malware in the wild
AP Felt, M Finifter, E Chin, S Hanna, D Wagner
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
9672011
A systematic analysis of xss sanitization in web application frameworks
J Weinberger, P Saxena, D Akhawe, M Finifter, R Shin, D Song
Computer Security–ESORICS 2011, 150-171, 2011
176*2011
How to Ask for Permission.
AP Felt, S Egelman, M Finifter, D Akhawe, DA Wagner
HotSec 12, 7-7, 2012
1382012
An empirical study of vulnerability rewards programs
M Finifter, D Akhawe, D Wagner
22nd {USENIX} Security Symposium ({USENIX} Security 13), 273-288, 2013
1052013
Preventing capability leaks in secure javascript subsets
M Finifter, J Weinberger, A Barth
Proc. of Network and Distributed System Security Symposium, 2010
642010
Verifiable functional purity in java
M Finifter, A Mettler, N Sastry, D Wagner
Proceedings of the 15th ACM conference on Computer and communications …, 2008
632008
An empirical study on the effectiveness of security code review
A Edmundson, B Holtkamp, E Rivera, M Finifter, A Mettler, D Wagner
International Symposium on Engineering Secure Software and Systems, 197-212, 2013
522013
Exploring the relationship between web application development tools and security
M Finifter, D Wagner
USENIX conference on Web application development, 2011
442011
Diesel: Applying privilege separation to database access
AP Felt, M Finifter, J Weinberger, D Wagner
Proceedings of the 6th ACM symposium on information, computer and …, 2011
262011
{SDDR}: Light-Weight, Secure Mobile Encounters
M Lentz, V Erdélyi, P Aditya, E Shi, P Druschel, B Bhattacharjee
23rd {USENIX} Security Symposium ({USENIX} Security 14), 925-940, 2014
212014
Jigsaw: Efficient, Low-effort Mashup Isolation
J Mickens, M Finifter
Presented as part of the 3rd {USENIX} Conference on Web Application …, 2012
102012
Vulnerability Rewards Programs
M Finifter, D Akhawe, D Wagner
Towards Evidence-Based Assessment of Factors Contributing to the …, 0
1
Product labels for mobile application markets
D Akhawe, M Finifter
Proceedings of Mobile Security Technologies Workshop 24, 0
1
Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities
MS Finifter
UC Berkeley, 2013
2013
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–14