The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

V. Benjamin Livshits: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. V. Benjamin Livshits, John Whaley, Monica S. Lam
    Reflection Analysis for Java. [Citation Graph (0, 0)][DBLP]
    APLAS, 2005, pp:139-160 [Conf]
  2. Dzintars Avots, Michael Dalton, V. Benjamin Livshits, Monica S. Lam
    Improving software security with a C pointer analysis. [Citation Graph (0, 0)][DBLP]
    ICSE, 2005, pp:332-341 [Conf]
  3. Thomas Zimmermann, Silvia Breu, Christian Lindig, V. Benjamin Livshits
    Mining additions of method calls in ArgoUML. [Citation Graph (0, 0)][DBLP]
    MSR, 2006, pp:169-170 [Conf]
  4. Michael C. Martin, V. Benjamin Livshits, Monica S. Lam
    Finding application errors and security flaws using PQL: a program query language. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 2005, pp:365-383 [Conf]
  5. Monica S. Lam, John Whaley, V. Benjamin Livshits, Michael C. Martin, Dzintars Avots, Michael Carbin, Christopher Unkel
    Context-sensitive program analysis as database queries. [Citation Graph (0, 0)][DBLP]
    PODS, 2005, pp:1-12 [Conf]
  6. V. Benjamin Livshits, Monica S. Lam
    Tracking pointers with path and context sensitivity for bug detection in C programs. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:317-326 [Conf]
  7. V. Benjamin Livshits, Thomas Zimmermann
    DynaMine: finding common error patterns by mining software revision histories. [Citation Graph (0, 0)][DBLP]
    ESEC/SIGSOFT FSE, 2005, pp:296-305 [Conf]
  8. Emre Kiciman, V. Benjamin Livshits
    AjaxScope: a platform for remotely monitoring the client-side behavior of web 2.0 applications. [Citation Graph (0, 0)][DBLP]
    SOSP, 2007, pp:17-30 [Conf]

  9. Ripley: automatically securing web 2.0 applications through replicated execution. [Citation Graph (, )][DBLP]


  10. Mining Additions of Method Calls in ArgoUML. [Citation Graph (, )][DBLP]


  11. End-to-End Web Application Security. [Citation Graph (, )][DBLP]


  12. FLUXO: A Simple Service Compiler. [Citation Graph (, )][DBLP]


  13. Securing web applications with static and dynamic information flow tracking. [Citation Graph (, )][DBLP]


  14. Using web application construction frameworks to protect against code injection attacks. [Citation Graph (, )][DBLP]


  15. Merlin: specification inference for explicit information flow problems. [Citation Graph (, )][DBLP]


  16. Doloto: code splitting for network-bound web 2.0 applications. [Citation Graph (, )][DBLP]


  17. ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser. [Citation Graph (, )][DBLP]


  18. Spectator: Detection and Containment of JavaScript Worms. [Citation Graph (, )][DBLP]


  19. Improving the responsiveness of internet services with automatic cache placement. [Citation Graph (, )][DBLP]


  20. Fluxo: a system for internet service programming by non-expert developers. [Citation Graph (, )][DBLP]


Search in 0.012secs, Finished in 0.013secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002