Obserwuj
Matthew S. Finifter
Matthew S. Finifter
Uber Technologies, Inc.
Zweryfikowany adres z uber.com - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
A survey of mobile malware in the wild
AP Felt, M Finifter, E Chin, S Hanna, D Wagner
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
11152011
A systematic analysis of xss sanitization in web application frameworks
J Weinberger, P Saxena, D Akhawe, M Finifter, R Shin, D Song
Computer Security–ESORICS 2011, 150-171, 2011
205*2011
How to Ask for Permission.
AP Felt, S Egelman, M Finifter, D Akhawe, DA Wagner
HotSec 12, 7-7, 2012
1732012
An empirical study of vulnerability rewards programs.
M Finifter, D Akhawe, DA Wagner
USENIX Security Symposium, 273-288, 2013
1592013
An empirical study on the effectiveness of security code review
A Edmundson, B Holtkamp, E Rivera, M Finifter, A Mettler, D Wagner
Engineering Secure Software and Systems: 5th International Symposium, ESSoS …, 2013
862013
Verifiable functional purity in Java
M Finifter, A Mettler, N Sastry, D Wagner
Proceedings of the 15th ACM conference on Computer and communications …, 2008
702008
Preventing capability leaks in secure javascript subsets
M Finifter, J Weinberger, A Barth
Proc. of Network and Distributed System Security Symposium, 2010
662010
Exploring the relationship between web application development tools and security
M Finifter, D Wagner
USENIX conference on Web application development, 2011
582011
Diesel: Applying privilege separation to database access
AP Felt, M Finifter, J Weinberger, D Wagner
Proceedings of the 6th ACM symposium on information, computer and …, 2011
312011
Jigsaw: Efficient, Low-effort Mashup Isolation.
J Mickens, M Finifter
WebApps, 13-25, 2012
102012
Product labels for mobile application markets
D Akhawe, M Finifter
Proceedings of Mobile Security Technologies Workshop 24, 2012
22012
Vulnerability Rewards Programs
M Finifter, D Akhawe, D Wagner
Towards Evidence-Based Assessment of Factors Contributing to the …, 0
1
Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities
MS Finifter
University of California, Berkeley, 2013
2013
usenix conference policies
M Finifter, D Akhawe, D Wagner
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–14