Benjamin Livshits
Benjamin Livshits
Reader (Associate Professor++) in Computer Science
Verified email at imperial.ac.uk - Homepage
Title
Cited by
Cited by
Year
Finding security vulnerabilities in Java applications with static analysis
B Livshits, MS Lam
Proceedings of the 14th conference on USENIX Security Symposium 14, 18-18, 2005
7942005
Finding application errors and security flaws using PQL: a program query language
M Martin, B Livshits, MS Lam
Conference on Object-Oriented Programming, Systems, Languages, and …, 2005
6302005
DynaMine: finding common error patterns by mining software revision histories
B Livshits, T Zimmermann
Symposium on the Foundations of Software Engineering (FSE) 30 (5), 296-305, 2005
4862005
Zozzle: Low-overhead mostly static javascript malware detection
CCB Livshits, B Zorn, C Seifert
USENIX Security Symposium, 2010
426*2010
Nozzle: A defense against heap-spraying code injection attacks
P Ratanaworabhan, B Livshits, B Zorn
USENIX Security Symposium, 169-186, 2009
2992009
Gatekeeper: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code.
S Guarnieri, B Livshits
USENIX Security Symposium, 151-168, 2009
2952009
ConScript: Specifying and enforcing fine-grained security policies for JavaScript in the browser
LA Meyerovich, B Livshits
Security and Privacy (SP), 2010 IEEE Symposium on, 481-496, 2010
2732010
In defense of soundiness: A manifesto
B Livshits, M Sridharan, Y Smaragdakis, O Lhoták, JN Amaral, ...
Communications of the ACM 58 (2), 44-46, 2015
2462015
Rozzle: De-cloaking internet malware
C Kolbitsch, B Livshits, B Zorn, C Seifert
2012 IEEE Symposium on Security and Privacy, 443-457, 2012
2332012
Jsmeter: comparing the behavior of javascript benchmarks with real web applications.
P Ratanaworabhan, B Livshits, BG Zorn
WebApps 10, 3-3, 2010
232*2010
Context-sensitive program analysis as database queries
MS Lam, J Whaley, B Livshits, MC Martin, D Avots, M Carbin, C Unkel
Proceedings of the Symposium on Principles of Database Systems (PODS), 1-12, 2005
2182005
Reflection analysis for Java
B Livshits, J Whaley, MS Lam
Asian Symposium on Programming Languages and Systems, 139-160, 2005
2092005
Finding security errors in Java programs with static analysis
VB Livshits
Proc. 14th USENIX Security Symposium, 2005, 2005
1932005
Fast and precise sanitizer analysis with Bek
P Hooimeijer, B Livshits, D Molnar, P Saxena, M Veanes
Proceedings of the 20th USENIX conference on Security, 1-1, 2011
1822011
Merlin: specification inference for explicit information flow problems
B Livshits, AV Nori, SK Rajamani, A Banerjee
Conference on Programming Language Design and Implementation (PLDI) 44 (6 …, 2009
1782009
PriVaricator: Deceiving fingerprinters with little white lies
N Nikiforakis, W Joosen, B Livshits
WWW, 2014
1712014
ScriptGard: Automatic context-sensitive sanitization for large-scale legacy web applications
P Saxena, D Molnar, B Livshits
Proceedings of the 18th ACM conference on Computer and communications …, 2011
165*2011
Symbolic finite state transducers: algorithms and applications
M Veanes, P Hooimeijer, B Livshits, D Molnar, N Bjorner
Symposium on the Principles of Programming Languages 47 (1), 137-150, 2012
1642012
AjaxScope: A platform for remotely monitoring the client-side behavior of web 2.0 applications
E Kiciman, B Livshits
ACM Transactions on the Web (TWEB) 4 (4), 13, 2010
1632010
Combining personalization and privacy locally on devices
B Livshits, AJ Davidson
US Patent 9,589,149, 2017
1612017
The system can't perform the operation now. Try again later.
Articles 1–20