Year |
Citation |
Score |
2019 |
Avent B, Korolova A, Zeber D, Hovden T, Livshits B. BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model Arxiv: Cryptography and Security. 9. DOI: 10.29012/Jpc.680 |
0.355 |
|
2015 |
D'Antoni L, Veanes M, Livshits B, Molnar D. Fast: A transducer-based language for tree manipulation Acm Transactions On Programming Languages and Systems. 38. DOI: 10.1145/2791292 |
0.355 |
|
2015 |
Livshits B, Sridharan M, Smaragdakis Y, Lhoták O, Amaral JN, Chang BYE, Guyer SZ, Khedker UP, Møler A, Vardoulakis D. In defense of soundiness: A manifesto Communications of the Acm. 58: 44-46. DOI: 10.1145/2644805 |
0.391 |
|
2013 |
Madsen M, Livshits B, Fanning M. Practical static analysis of JavaScript applications in the presence of frameworks and libraries 2013 9th Joint Meeting of the European Software Engineering Conference and the Acm Sigsoft Symposium On the Foundations of Software Engineering, Esec/Fse 2013 - Proceedings. 499-509. DOI: 10.1145/2491411.2491417 |
0.311 |
|
2013 |
Fournet C, Swamy N, Chen J, Dagand PE, Strub PY, Livshits B. Fully abstract compilation to JavaScript Conference Record of the Annual Acm Symposium On Principles of Programming Languages. 371-383. DOI: 10.1145/2429069.2429114 |
0.339 |
|
2010 |
Kiciman E, Livshits B. AjaxScope: A platform for remotely monitoring the client-side behavior of Web 2.0 applications Acm Transactions On the Web. 4. DOI: 10.1145/1841909.1841910 |
0.39 |
|
2010 |
Meyerovich LA, Livshits B. CONSCRIPT: Specifying and enforcing fine-grained security policies for JavaScript in the browser Proceedings - Ieee Symposium On Security and Privacy. 481-496. DOI: 10.1109/SP.2010.36 |
0.306 |
|
2010 |
Chong S, Livshits B. APLWACA 2010 - Proceedings of the 2010 Workshop on Analysis and Programming Languages for Web Applications and Cloud Applications: Foreword Aplwaca 2010 - Proceedings of the 2010 Workshop On Analysis and Programming Languages For Web Applications and Cloud Applications. iii. |
0.332 |
|
2009 |
Vikram K, Prateek A, Livshits B. Ripley: Automatically securing web 2.0 applications through replicated execution Proceedings of the Acm Conference On Computer and Communications Security. 173-186. DOI: 10.1145/1653662.1653685 |
0.31 |
|
2009 |
Livshits B, Nori AV, Rajamani SK, Banerjee A. Merlin: Specification inference for explicit information flow problems Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 75-86. DOI: 10.1145/1542476.1542485 |
0.377 |
|
2008 |
Lam MS, Martin M, Livshits B, Whaley J. Securing web applications with static and dynamic information flow tracking Proceedings of the Acm Sigplan Symposium On Partial Evaluation and Semantics-Based Program Manipulation. 3-12. DOI: 10.1145/1328408.1328410 |
0.479 |
|
2008 |
Manolescu D, Beckman B, Livshits B. Volta: Developing distributed applications by recompiling Ieee Software. 25: 53-59. DOI: 10.1109/Ms.2008.131 |
0.413 |
|
2007 |
Livshits B, Erlingsson U. Using web application construction frameworks to protect against code injection attacks Plas'07 - Proceedings of the 2007 Acm Sigplan Workshop On Programming Languages and Analysis For Security. 95-104. DOI: 10.1145/1255329.1255346 |
0.32 |
|
2005 |
Martin M, Livshits B, Lam MS. Finding application errors and security flaws using PQL: A program query language Proceedings of the Conference On Object-Oriented Programming Systems, Languages, and Applications, Oopsla. 365-383. DOI: 10.1145/1103845.1094840 |
0.402 |
|
2005 |
Livshits B, Whaley J, Lam MS. Reflection analysis for java Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3780: 139-160. DOI: 10.1007/11575467_11 |
0.474 |
|
Show low-probability matches. |