Follow
Benjamin Livshits
Benjamin Livshits
Reader (Associate Professor++) in Computer Science
Verified email at imperial.ac.uk - Homepage
Title
Cited by
Cited by
Year
Privacy in pharmacogenetics: An {End-to-End} case study of personalized warfarin dosing
M Fredrikson, E Lantz, S Jha, S Lin, D Page, T Ristenpart
23rd USENIX security symposium (USENIX Security 14), 17-32, 2014
11132014
Finding security vulnerabilities in Java applications with static analysis
B Livshits, MS Lam
Proceedings of the 14th conference on USENIX Security Symposium 14, 18-18, 2005
9612005
Finding application errors and security flaws using PQL: a program query language
M Martin, B Livshits, MS Lam
Conference on Object-Oriented Programming, Systems, Languages, and …, 2005
6882005
DynaMine: finding common error patterns by mining software revision histories
B Livshits, T Zimmermann
Symposium on the Foundations of Software Engineering (FSE) 30 (5), 296-305, 2005
5272005
Zozzle: Low-overhead mostly static javascript malware detection
CCB Livshits, B Zorn, C Seifert
USENIX Security Symposium, 2010
500*2010
In defense of soundiness: A manifesto
B Livshits, M Sridharan, Y Smaragdakis, O Lhoták, JN Amaral, ...
Communications of the ACM 58 (2), 44-46, 2015
3422015
Nozzle: A defense against heap-spraying code injection attacks
P Ratanaworabhan, B Livshits, B Zorn
USENIX Security Symposium, 169-186, 2009
3262009
Gatekeeper: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code.
S Guarnieri, B Livshits
USENIX Security Symposium, 151-168, 2009
3112009
ConScript: Specifying and enforcing fine-grained security policies for JavaScript in the browser
LA Meyerovich, B Livshits
Security and Privacy (SP), 2010 IEEE Symposium on, 481-496, 2010
2982010
Attacking the DeFi ecosystem with flash loans for fun and profit
K Qin, L Zhou, B Livshits, A Gervais
Financial Cryptography and Data Security: 25th International Conference (FC …, 2021
2692021
Combining personalization and privacy locally on devices
B Livshits, AJ Davidson
US Patent 9,589,149, 2017
2642017
Rozzle: De-cloaking internet malware
C Kolbitsch, B Livshits, B Zorn, C Seifert
2012 IEEE Symposium on Security and Privacy, 443-457, 2012
2642012
JSMeter: comparing the behavior of JavaScript benchmarks with real web applications.
P Ratanaworabhan, B Livshits, BG Zorn
WebApps 10, 3-3, 2010
251*2010
Context-sensitive program analysis as database queries
MS Lam, J Whaley, B Livshits, MC Martin, D Avots, M Carbin, C Unkel
Proceedings of the Symposium on Principles of Database Systems (PODS), 1-12, 2005
2452005
Reflection analysis for Java
B Livshits, J Whaley, MS Lam
Asian Symposium on Programming Languages and Systems, 139-160, 2005
2342005
Smart contract vulnerabilities: Vulnerable does not imply exploited
D Perez, B Livshits
30th USENIX Security Symposium (USENIX Security 21), 1325-1341, 2021
226*2021
PriVaricator: Deceiving fingerprinters with little white lies
N Nikiforakis, W Joosen, B Livshits
WWW, 2014
2192014
Fast and precise sanitizer analysis with Bek
P Hooimeijer, B Livshits, D Molnar, P Saxena, M Veanes
Proceedings of the 20th USENIX conference on Security, 1-1, 2011
2122011
Merlin: specification inference for explicit information flow problems
B Livshits, AV Nori, SK Rajamani, A Banerjee
Conference on Programming Language Design and Implementation (PLDI) 44 (6 …, 2009
2072009
Finding security errors in Java programs with static analysis
VB Livshits
Proc. 14th USENIX Security Symposium, 2005, 2005
1982005
The system can't perform the operation now. Try again later.
Articles 1–20