Drew Davidson

Orcid: 0000-0002-5096-1446

According to our database1, Drew Davidson authored at least 23 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Beyond Typosquatting: An In-depth Look at Package Confusion.
Proceedings of the 32nd USENIX Security Symposium, 2023

(Nothing But) Many Eyes Make All Bugs Shallow.
Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2023

2022
What the Fork? Finding Hidden Code Clones in npm.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Wolf at the Door: Preventing Install-Time Attacks in npm with Latch.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Parcae: A Blockchain-Based PRF Service for Everyone.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

2020
Security Issues and Challenges in Service Meshes - An Extended Study.
CoRR, 2020

SpellBound: Defending Against Package Typosquatting.
CoRR, 2020

Assessing Adaptive Attacks Against Trained JavaScript Classifiers.
Proceedings of the Security and Privacy in Communication Networks, 2020

MisMesh: Security Issues and Challenges in Service Meshes.
Proceedings of the Security and Privacy in Communication Networks, 2020

Identity Armour: User Controlled Browser Security.
Proceedings of the Security and Privacy in Communication Networks, 2020

Defending Against Package Typosquatting.
Proceedings of the Network and System Security - 14th International Conference, 2020

2019
Security Issues in Language-based Sofware Ecosystems.
CoRR, 2019

2017
Cimplifier: automatically debloating containers.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Enhancing Android Security Through App Splitting.
Proceedings of the Security and Privacy in Communication Networks, 2017

Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Towards Least Privilege Containers with Cimplifier.
CoRR, 2016

Controlling UAVs with Sensor Input Spoofing Attacks.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

2014
MoRePriv: mobile OS support for application personalization and privacy.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2010
Automatic Generation of Remediation Procedures for Malware Infections.
Proceedings of the 19th USENIX Security Symposium, 2010

2009
Protocol Normalization Using Attribute Grammars.
Proceedings of the Computer Security, 2009

2008
Well Played: Interpreting Prince of Persia: The Sands of Time.
Games Cult., 2008

2003
Interactivity in Ico: initial involvement, immersion, investment.
Proceedings of the Second International Conference on Entertainment Computing, 2003


  Loading...