{FIE} on firmware: Finding vulnerabilities in embedded systems using symbolic execution D Davidson, B Moench, T Ristenpart, S Jha 22nd USENIX Security Symposium (USENIX Security 13), 463-478, 2013 | 299 | 2013 |
Controlling {UAVs} with sensor input spoofing attacks D Davidson, H Wu, R Jellinek, V Singh, T Ristenpart 10th USENIX workshop on offensive technologies (WOOT 16), 2016 | 215 | 2016 |
Cimplifier: automatically debloating containers V Rastogi, D Davidson, L De Carli, S Jha, P McDaniel Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 110 | 2017 |
Automatic generation of remediation procedures for malware infections R Paleari, L Martignoni, E Passerini, D Davidson, M Fredrikson, J Giffin, ... 19th USENIX Security Symposium (USENIX Security 10), 2010 | 56 | 2010 |
Morepriv: Mobile os support for application personalization and privacy D Davidson, M Fredrikson, B Livshits Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 48 | 2014 |
Defending against package typosquatting M Taylor, R Vaidya, D Davidson, L De Carli, V Rastogi Network and System Security: 14th International Conference, NSS 2020 …, 2020 | 46 | 2020 |
Security issues in language-based software ecosystems RK Vaidya, L De Carli, D Davidson, V Rastogi arXiv preprint arXiv:1903.02613, 2019 | 36 | 2019 |
Wolf at the door: Preventing install-time attacks in npm with latch E Wyss, A Wittman, D Davidson, L De Carli Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 35 | 2022 |
Spellbound: Defending against package typosquatting M Taylor, RK Vaidya, D Davidson, L De Carli, V Rastogi arXiv preprint arXiv:2003.03471, 2020 | 30 | 2020 |
What the fork? finding hidden code clones in npm E Wyss, L De Carli, D Davidson Proceedings of the 44th International Conference on Software Engineering …, 2022 | 24 | 2022 |
Secure integration of web content and applications on commodity mobile operating systems D Davidson, Y Chen, F George, L Lu, S Jha Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 21 | 2017 |
Mismesh: Security issues and challenges in service meshes DA Hahn, D Davidson, AG Bardas Security and Privacy in Communication Networks: 16th EAI International …, 2020 | 17 | 2020 |
An analysis of first-party cookie exfiltration due to cname redirections T Ren, A Wittman, L De Carli, D Davidson Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb), 2021 | 14 | 2021 |
Beyond typosquatting: an in-depth look at package confusion S Neupane, G Holmes, E Wyss, D Davidson, L De Carli 32nd USENIX Security Symposium (USENIX Security 23), 3439-3456, 2023 | 12 | 2023 |
Protocol normalization using attribute grammars D Davidson, R Smith, N Doyle, S Jha Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 11 | 2009 |
Digital home-lessness: Exploring the links between public Internet access, technological capital, and social inequality M Comi, S Smith, WA Goettlich, P Alexander, D Davidson, WG Staples Current Sociology 72 (1), 65-82, 2024 | 8 | 2024 |
Assessing Adaptive Attacks Against Trained JavaScript Classifiers N Hansen, L De Carli, D Davidson Security and Privacy in Communication Networks: 16th EAI International …, 2020 | 7 | 2020 |
Towards least privilege containers with cimplifier V Rastogi, D Davidson, L De Carli, S Jha, P McDaniel arXiv preprint arXiv:1602.08410, 2016 | 5 | 2016 |
(Nothing But) Many Eyes Make All Bugs Shallow E Wyss, L De Carli, D Davidson Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research …, 2023 | 2 | 2023 |
Enhancing Android security through app splitting D Davidson, V Rastogi, M Christodorescu, S Jha Security and Privacy in Communication Networks: 13th International …, 2018 | 2 | 2018 |