Suivre
Matthew S. Finifter
Matthew S. Finifter
Uber Technologies, Inc.
Adresse e-mail validée de uber.com - Page d'accueil
Titre
Citée par
Citée par
Année
A survey of mobile malware in the wild
AP Felt, M Finifter, E Chin, S Hanna, D Wagner
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
10802011
A systematic analysis of xss sanitization in web application frameworks
J Weinberger, P Saxena, D Akhawe, M Finifter, R Shin, D Song
Computer Security–ESORICS 2011, 150-171, 2011
201*2011
How to Ask for Permission.
AP Felt, S Egelman, M Finifter, D Akhawe, DA Wagner
HotSec 12, 7-7, 2012
1652012
An empirical study of vulnerability rewards programs
M Finifter, D Akhawe, D Wagner
22nd USENIX Security Symposium (USENIX Security 13), 273-288, 2013
1462013
An empirical study on the effectiveness of security code review
A Edmundson, B Holtkamp, E Rivera, M Finifter, A Mettler, D Wagner
International Symposium on Engineering Secure Software and Systems, 197-212, 2013
752013
Verifiable functional purity in Java
M Finifter, A Mettler, N Sastry, D Wagner
Proceedings of the 15th ACM conference on Computer and communications …, 2008
692008
Preventing capability leaks in secure javascript subsets
M Finifter, J Weinberger, A Barth
Proc. of Network and Distributed System Security Symposium, 2010
682010
Exploring the relationship between web application development tools and security
M Finifter
2nd USENIX Conference on Web Application Development (WebApps 11), 2011
542011
Diesel: Applying privilege separation to database access
AP Felt, M Finifter, J Weinberger, D Wagner
Proceedings of the 6th ACM symposium on information, computer and …, 2011
302011
Jigsaw:{Efficient}, Low-effort Mashup Isolation
J Mickens, M Finifter
3rd USENIX Conference on Web Application Development (WebApps 12), 13-25, 2012
102012
Product labels for mobile application markets
D Akhawe, M Finifter
Proceedings of Mobile Security Technologies Workshop 24, 2012
22012
Vulnerability Rewards Programs
M Finifter, D Akhawe, D Wagner
Towards Evidence-Based Assessment of Factors Contributing to the …, 0
1
Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities
MS Finifter
University of California, Berkeley, 2013
2013
Acknowledgement
HF WEINBERGER, B Carver, D Wagner, D Akhawe, A Barth, J Chen, ...
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–14