Benjamin Livshits, Ph.D.

Affiliations: 
2006 Stanford University, Palo Alto, CA 
Google:
"Benjamin Livshits"

Parents

Sign in to add mentor
Monica Lam grad student 2006 Stanford
 (Improving software security with precise static and runtime analysis.)

Collaborators

Sign in to add collaborator
Jiahua Xu collaborator 2018-
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Avent B, Korolova A, Zeber D, et al. (2019) BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model Arxiv: Cryptography and Security. 9
D'Antoni L, Veanes M, Livshits B, et al. (2015) Fast: A transducer-based language for tree manipulation Acm Transactions On Programming Languages and Systems. 38
Livshits B, Sridharan M, Smaragdakis Y, et al. (2015) In defense of soundiness: A manifesto Communications of the Acm. 58: 44-46
Madsen M, Livshits B, Fanning M. (2013) Practical static analysis of JavaScript applications in the presence of frameworks and libraries 2013 9th Joint Meeting of the European Software Engineering Conference and the Acm Sigsoft Symposium On the Foundations of Software Engineering, Esec/Fse 2013 - Proceedings. 499-509
Fournet C, Swamy N, Chen J, et al. (2013) Fully abstract compilation to JavaScript Conference Record of the Annual Acm Symposium On Principles of Programming Languages. 371-383
Kiciman E, Livshits B. (2010) AjaxScope: A platform for remotely monitoring the client-side behavior of Web 2.0 applications Acm Transactions On the Web. 4
Meyerovich LA, Livshits B. (2010) CONSCRIPT: Specifying and enforcing fine-grained security policies for JavaScript in the browser Proceedings - Ieee Symposium On Security and Privacy. 481-496
Chong S, Livshits B. (2010) APLWACA 2010 - Proceedings of the 2010 Workshop on Analysis and Programming Languages for Web Applications and Cloud Applications: Foreword Aplwaca 2010 - Proceedings of the 2010 Workshop On Analysis and Programming Languages For Web Applications and Cloud Applications. iii
Vikram K, Prateek A, Livshits B. (2009) Ripley: Automatically securing web 2.0 applications through replicated execution Proceedings of the Acm Conference On Computer and Communications Security. 173-186
Livshits B, Nori AV, Rajamani SK, et al. (2009) Merlin: Specification inference for explicit information flow problems Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 75-86
See more...