V. Benjamin Livshits

According to our database1, V. Benjamin Livshits authored at least 22 papers between 2003 and 2010.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Fluxo: a system for internet service programming by non-expert developers.
Proceedings of the 1st ACM Symposium on Cloud Computing, 2010

2009
NOZZLE: A Defense Against Heap-spraying Code Injection Attacks.
Proceedings of the 18th USENIX Security Symposium, 2009

GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code.
Proceedings of the 18th USENIX Security Symposium, 2009

Merlin: specification inference for explicit information flow problems.
Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, 2009

FLUXO: A Simple Service Compiler.
Proceedings of HotOS'09: 12th Workshop on Hot Topics in Operating Systems, 2009

Improving the responsiveness of internet services with automatic cache placement.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009

Ripley: automatically securing web 2.0 applications through replicated execution.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Spectator: Detection and Containment of JavaScript Worms.
Proceedings of the 2008 USENIX Annual Technical Conference, 2008

Doloto: code splitting for network-bound web 2.0 applications.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

Securing web applications with static and dynamic information flow tracking.
Proceedings of the 2008 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation, 2008

2007
AjaxScope: a platform for remotely monitoring the client-side behavior of web 2.0 applications.
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007

Using web application construction frameworks to protect against code injection attacks.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007

End-to-End Web Application Security.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

2006
Mining Additions of Method Calls in ArgoUML.
Proceedings of the Aspects For Legacy Applications, 26.07. - 29.07.2006, 2006

2005
Finding Security Vulnerabilities in Java Applications with Static Analysis.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

DynaMine: finding common error patterns by mining software revision histories.
Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005

Context-sensitive program analysis as database queries.
Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2005

Finding application errors and security flaws using PQL: a program query language.
Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2005

Improving software security with a C pointer analysis.
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005

Reflection Analysis for Java.
Proceedings of the Programming Languages and Systems, Third Asian Symposium, 2005

2003
Tracking pointers with path and context sensitivity for bug detection in C programs.
Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, 2003


  Loading...