Benjamin Livshits
Benjamin Livshits
Reader (Associate Professor++) in Computer Science
Verified email at imperial.ac.uk - Homepage
Title
Cited by
Cited by
Year
Finding security vulnerabilities in Java applications with static analysis
B Livshits, MS Lam
Proceedings of the 14th conference on USENIX Security Symposium 14, 18-18, 2005
6912005
Finding application errors and security flaws using PQL: a program query language
M Martin, B Livshits, MS Lam
Conference on Object-Oriented Programming, Systems, Languages, and …, 2005
5752005
DynaMine: finding common error patterns by mining software revision histories
B Livshits, T Zimmermann
Symposium on the Foundations of Software Engineering (FSE) 30 (5), 296-305, 2005
4252005
Zozzle: Low-overhead mostly static javascript malware detection
C Curtsinger, B Livshits, B Zorn, C Seifert
Proceedings of the usenix security symposium, 3-3, 2011
354*2011
Nozzle: A defense against heap-spraying code injection attacks
P Ratanaworabhan, B Livshits, B Zorn
USENIX Security Symposium, 169-186, 2009
2772009
Gatekeeper: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code.
S Guarnieri, B Livshits
USENIX Security Symposium, 151-168, 2009
2622009
ConScript: Specifying and enforcing fine-grained security policies for JavaScript in the browser
LA Meyerovich, B Livshits
Security and Privacy (SP), 2010 IEEE Symposium on, 481-496, 2010
2342010
Jsmeter: comparing the behavior of javascript benchmarks with real web applications.
P Ratanaworabhan, B Livshits, BG Zorn
WebApps 10, 3-3, 2010
210*2010
Context-sensitive program analysis as database queries
MS Lam, J Whaley, B Livshits, MC Martin, D Avots, M Carbin, C Unkel
Proceedings of the Symposium on Principles of Database Systems (PODS), 1-12, 2005
2032005
Rozzle: De-cloaking internet malware
C Kolbitsch, B Livshits, B Zorn, C Seifert
2012 IEEE Symposium on Security and Privacy, 443-457, 2012
1982012
Finding security errors in Java programs with static analysis
VB Livshits
Proc. 14th USENIX Security Symposium, 2005, 2005
1842005
Reflection analysis for Java
B Livshits, J Whaley, MS Lam
Asian Symposium on Programming Languages and Systems, 139-160, 2005
1832005
In defense of soundiness: A manifesto
B Livshits, M Sridharan, Y Smaragdakis, O Lhoták, JN Amaral, ...
Communications of the ACM 58 (2), 44-46, 2015
1672015
Fast and precise sanitizer analysis with Bek
P Hooimeijer, B Livshits, D Molnar, P Saxena, M Veanes
Proceedings of the 20th USENIX conference on Security, 1-1, 2011
1622011
Merlin: specification inference for explicit information flow problems
B Livshits, AV Nori, SK Rajamani, A Banerjee
Conference on Programming Language Design and Implementation (PLDI) 44 (6 …, 2009
1532009
AjaxScope: A platform for remotely monitoring the client-side behavior of web 2.0 applications
E Kiciman, B Livshits
ACM Transactions on the Web (TWEB) 4 (4), 13, 2010
1502010
ScriptGard: Automatic context-sensitive sanitization for large-scale legacy web applications
P Saxena, D Molnar, B Livshits
Proceedings of the 18th ACM conference on Computer and communications …, 2011
143*2011
Securing web applications with static and dynamic information flow tracking
MS Lam, M Martin, B Livshits, J Whaley
Proceedings of the 2008 ACM SIGPLAN symposium on Partial evaluation and …, 2008
1392008
Symbolic finite state transducers: algorithms and applications
M Veanes, P Hooimeijer, B Livshits, D Molnar, N Bjorner
Symposium on the Principles of Programming Languages 47 (1), 137-150, 2012
1382012
RePriv: Re-Imagining Content Personalization and In-Browser Privacy
M Fredrikson, B Livshits
Security and Privacy (SP), 2011 IEEE Symposium on, 131-146, 2011
126*2011
The system can't perform the operation now. Try again later.
Articles 1–20