Follow
Benjamin Livshits
Benjamin Livshits
Reader (Associate Professor++) in Computer Science
Verified email at imperial.ac.uk - Homepage
Title
Cited by
Cited by
Year
Finding security vulnerabilities in Java applications with static analysis
B Livshits, MS Lam
Proceedings of the 14th conference on USENIX Security Symposium 14, 18-18, 2005
9022005
Privacy in pharmacogenetics: An {End-to-End} case study of personalized warfarin dosing
M Fredrikson, E Lantz, S Jha, S Lin, D Page, T Ristenpart
23rd USENIX security symposium (USENIX Security 14), 17-32, 2014
8902014
Finding application errors and security flaws using PQL: a program query language
M Martin, B Livshits, MS Lam
Conference on Object-Oriented Programming, Systems, Languages, and …, 2005
6702005
DynaMine: finding common error patterns by mining software revision histories
B Livshits, T Zimmermann
Symposium on the Foundations of Software Engineering (FSE) 30 (5), 296-305, 2005
5102005
Zozzle: Low-overhead mostly static javascript malware detection
CCB Livshits, B Zorn, C Seifert
USENIX Security Symposium, 2010
469*2010
Nozzle: A defense against heap-spraying code injection attacks
P Ratanaworabhan, B Livshits, B Zorn
USENIX Security Symposium, 169-186, 2009
3182009
Gatekeeper: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code.
S Guarnieri, B Livshits
USENIX Security Symposium, 151-168, 2009
3062009
In defense of soundiness: A manifesto
B Livshits, M Sridharan, Y Smaragdakis, O Lhoták, JN Amaral, ...
Communications of the ACM 58 (2), 44-46, 2015
3012015
ConScript: Specifying and enforcing fine-grained security policies for JavaScript in the browser
LA Meyerovich, B Livshits
Security and Privacy (SP), 2010 IEEE Symposium on, 481-496, 2010
2912010
Rozzle: De-cloaking internet malware
C Kolbitsch, B Livshits, B Zorn, C Seifert
2012 IEEE Symposium on Security and Privacy, 443-457, 2012
2512012
JSMeter: comparing the behavior of JavaScript benchmarks with real web applications.
P Ratanaworabhan, B Livshits, BG Zorn
WebApps 10, 3-3, 2010
240*2010
Context-sensitive program analysis as database queries
MS Lam, J Whaley, B Livshits, MC Martin, D Avots, M Carbin, C Unkel
Proceedings of the Symposium on Principles of Database Systems (PODS), 1-12, 2005
2352005
Combining personalization and privacy locally on devices
B Livshits, AJ Davidson
US Patent 9,589,149, 2017
2292017
Reflection analysis for Java
B Livshits, J Whaley, MS Lam
Asian Symposium on Programming Languages and Systems, 139-160, 2005
2232005
PriVaricator: Deceiving fingerprinters with little white lies
N Nikiforakis, W Joosen, B Livshits
WWW, 2014
2062014
Fast and precise sanitizer analysis with Bek
P Hooimeijer, B Livshits, D Molnar, P Saxena, M Veanes
Proceedings of the 20th USENIX conference on Security, 1-1, 2011
2042011
Finding security errors in Java programs with static analysis
VB Livshits
Proc. 14th USENIX Security Symposium, 2005, 2005
1982005
Merlin: specification inference for explicit information flow problems
B Livshits, AV Nori, SK Rajamani, A Banerjee
Conference on Programming Language Design and Implementation (PLDI) 44 (6 …, 2009
1942009
Symbolic finite state transducers: algorithms and applications
M Veanes, P Hooimeijer, B Livshits, D Molnar, N Bjorner
Symposium on the Principles of Programming Languages 47 (1), 137-150, 2012
1852012
ScriptGard: Automatic context-sensitive sanitization for large-scale legacy web applications
P Saxena, D Molnar, B Livshits
Proceedings of the 18th ACM conference on Computer and communications …, 2011
183*2011
The system can't perform the operation now. Try again later.
Articles 1–20