Matthew S. Finifter
Matthew S. Finifter
Uber Technologies, Inc.
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα - Αρχική σελίδα
Παρατίθεται από
Παρατίθεται από
A survey of mobile malware in the wild
AP Felt, M Finifter, E Chin, S Hanna, D Wagner
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
A systematic analysis of xss sanitization in web application frameworks
J Weinberger, P Saxena, D Akhawe, M Finifter, R Shin, D Song
Computer Security–ESORICS 2011, 150-171, 2011
How to Ask for Permission.
AP Felt, S Egelman, M Finifter, D Akhawe, DA Wagner
HotSec 12, 7-7, 2012
An empirical study of vulnerability rewards programs
M Finifter, D Akhawe, D Wagner
22nd {USENIX} Security Symposium ({USENIX} Security 13), 273-288, 2013
Verifiable functional purity in Java
M Finifter, A Mettler, N Sastry, D Wagner
Proceedings of the 15th ACM conference on Computer and communications …, 2008
An empirical study on the effectiveness of security code review
A Edmundson, B Holtkamp, E Rivera, M Finifter, A Mettler, D Wagner
International Symposium on Engineering Secure Software and Systems, 197-212, 2013
Preventing capability leaks in secure javascript subsets
M Finifter, J Weinberger, A Barth
Proc. of Network and Distributed System Security Symposium, 2010
Exploring the relationship between web application development tools and security
M Finifter, D Wagner
USENIX conference on Web application development, 2011
Diesel: Applying privilege separation to database access
AP Felt, M Finifter, J Weinberger, D Wagner
Proceedings of the 6th ACM symposium on information, computer and …, 2011
{SDDR}: Light-Weight, Secure Mobile Encounters
M Lentz, V Erdélyi, P Aditya, E Shi, P Druschel, B Bhattacharjee
23rd {USENIX} Security Symposium ({USENIX} Security 14), 925-940, 2014
Jigsaw: Efficient, Low-effort Mashup Isolation
J Mickens, M Finifter
3rd {USENIX} Conference on Web Application Development (WebApps 12), 13-25, 2012
Product labels for mobile application markets
D Akhawe, M Finifter
Proceedings of Mobile Security Technologies Workshop 24, 2012
Vulnerability Rewards Programs
M Finifter, D Akhawe, D Wagner
Towards Evidence-Based Assessment of Factors Contributing to the …, 0
Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities
MS Finifter
University of California, Berkeley, 2013
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–14