A survey of mobile malware in the wild AP Felt, M Finifter, E Chin, S Hanna, D Wagner Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011 | 1115 | 2011 |
A systematic analysis of xss sanitization in web application frameworks J Weinberger, P Saxena, D Akhawe, M Finifter, R Shin, D Song Computer Security–ESORICS 2011, 150-171, 2011 | 205* | 2011 |
How to Ask for Permission. AP Felt, S Egelman, M Finifter, D Akhawe, DA Wagner HotSec 12, 7-7, 2012 | 173 | 2012 |
An empirical study of vulnerability rewards programs. M Finifter, D Akhawe, DA Wagner USENIX Security Symposium, 273-288, 2013 | 159 | 2013 |
An empirical study on the effectiveness of security code review A Edmundson, B Holtkamp, E Rivera, M Finifter, A Mettler, D Wagner Engineering Secure Software and Systems: 5th International Symposium, ESSoS …, 2013 | 86 | 2013 |
Verifiable functional purity in Java M Finifter, A Mettler, N Sastry, D Wagner Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 70 | 2008 |
Preventing capability leaks in secure javascript subsets M Finifter, J Weinberger, A Barth Proc. of Network and Distributed System Security Symposium, 2010 | 66 | 2010 |
Exploring the relationship between web application development tools and security M Finifter, D Wagner USENIX conference on Web application development, 2011 | 58 | 2011 |
Diesel: Applying privilege separation to database access AP Felt, M Finifter, J Weinberger, D Wagner Proceedings of the 6th ACM symposium on information, computer and …, 2011 | 31 | 2011 |
Jigsaw: Efficient, Low-effort Mashup Isolation. J Mickens, M Finifter WebApps, 13-25, 2012 | 10 | 2012 |
Product labels for mobile application markets D Akhawe, M Finifter Proceedings of Mobile Security Technologies Workshop 24, 2012 | 2 | 2012 |
Vulnerability Rewards Programs M Finifter, D Akhawe, D Wagner Towards Evidence-Based Assessment of Factors Contributing to the …, 0 | 1 | |
Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities MS Finifter University of California, Berkeley, 2013 | | 2013 |
usenix conference policies M Finifter, D Akhawe, D Wagner | | |