Benjamin Livshits, Ph.D.
Affiliations: | 2006 | Stanford University, Palo Alto, CA |
Google:
"Benjamin Livshits"Parents
Sign in to add mentorMonica Lam | grad student | 2006 | Stanford | |
(Improving software security with precise static and runtime analysis.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Avent B, Korolova A, Zeber D, et al. (2019) BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model Arxiv: Cryptography and Security. 9 |
D'Antoni L, Veanes M, Livshits B, et al. (2015) Fast: A transducer-based language for tree manipulation Acm Transactions On Programming Languages and Systems. 38 |
Livshits B, Sridharan M, Smaragdakis Y, et al. (2015) In defense of soundiness: A manifesto Communications of the Acm. 58: 44-46 |
Madsen M, Livshits B, Fanning M. (2013) Practical static analysis of JavaScript applications in the presence of frameworks and libraries 2013 9th Joint Meeting of the European Software Engineering Conference and the Acm Sigsoft Symposium On the Foundations of Software Engineering, Esec/Fse 2013 - Proceedings. 499-509 |
Fournet C, Swamy N, Chen J, et al. (2013) Fully abstract compilation to JavaScript Conference Record of the Annual Acm Symposium On Principles of Programming Languages. 371-383 |
Kiciman E, Livshits B. (2010) AjaxScope: A platform for remotely monitoring the client-side behavior of Web 2.0 applications Acm Transactions On the Web. 4 |
Meyerovich LA, Livshits B. (2010) CONSCRIPT: Specifying and enforcing fine-grained security policies for JavaScript in the browser Proceedings - Ieee Symposium On Security and Privacy. 481-496 |
Chong S, Livshits B. (2010) APLWACA 2010 - Proceedings of the 2010 Workshop on Analysis and Programming Languages for Web Applications and Cloud Applications: Foreword Aplwaca 2010 - Proceedings of the 2010 Workshop On Analysis and Programming Languages For Web Applications and Cloud Applications. iii |
Vikram K, Prateek A, Livshits B. (2009) Ripley: Automatically securing web 2.0 applications through replicated execution Proceedings of the Acm Conference On Computer and Communications Security. 173-186 |
Livshits B, Nori AV, Rajamani SK, et al. (2009) Merlin: Specification inference for explicit information flow problems Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 75-86 |