Benjamin Livshits

According to our database1, Benjamin Livshits authored at least 96 papers between 2003 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2020
Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking.
Proc. ACM Meas. Anal. Comput. Syst., 2020

THEMIS: Decentralized and Trustless Ad Platform with Reporting Integrity.
CoRR, 2020

Improving Web Content Blocking With Event-Loop-Turn Granularity JavaScript Signatures.
CoRR, 2020

Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.
CoRR, 2020

We Know What They've Been Put Through: Revisiting High-scalability Blockchain Transactions.
CoRR, 2020

The Decentralized Financial Crisis: Attacking DeFi.
CoRR, 2020

Filter List Generation for Underserved Regions.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Keeping out the Masses: Understanding the Popularity and Implications of Internet Paywalls.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

PERCIVAL: Making In-Browser Perceptual Ad Blocking Practical with Deep Learning.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

Broken Metre: Attacking Resource Metering in EVM.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Privacy-Preserving Bandits.
Proceedings of Machine Learning and Systems 2020, 2020

The Decentralized Financial Crisis.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2020

Evaluating the End-User Experience of Private Browsing Mode.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
ZKSENSE: a Privacy-Preserving Mechanism for Bot Detection in Mobile Devices.
CoRR, 2019

VPN0: A Privacy-Preserving Decentralized Virtual Private Network.
CoRR, 2019

The Blind Men and the Internet: Multi-Vantage Point Web Measurements.
CoRR, 2019

Another Brick in the Paywall: The Popularity and Privacy Implications of Paywalls.
CoRR, 2019

Smart Contract Vulnerabilities: Does Anyone Care?
CoRR, 2019

SpeedReader: Reader Mode Made Fast and Private.
Proceedings of the World Wide Web Conference, 2019

The Anatomy of a Cryptocurrency Pump-and-Dump Scheme.
Proceedings of the 28th USENIX Security Symposium, 2019

When the Signal is in the Noise: Exploiting Diffix's Sticky Noise.
Proceedings of the 28th USENIX Security Symposium, 2019

BatteryLab, a distributed power monitoring platform for mobile devices: demo abstract.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019

BatteryLab, A Distributed Power Monitoring Platform For Mobile Devices.
Proceedings of the 18th ACM Workshop on Hot Topics in Networks, 2019

Static Analysis for Asynchronous JavaScript Programs.
Proceedings of the 33rd European Conference on Object-Oriented Programming, 2019

2018
A Puff of Steem: Security Analysis of Decentralized Content Curation.
CoRR, 2018

AdGraph: A Machine Learning Approach to Automatic and Effective Adblocking.
CoRR, 2018

Toward an Evidence-based Design for Reactive Security Policies and Mechanisms.
CoRR, 2018

SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE.JS.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

EthIR: A Framework for High-Level Analysis of Ethereum Bytecode.
Proceedings of the Automated Technology for Verification and Analysis, 2018

2017
Prepose: Privacy, Security, and Reliability for Gesture-Based Programming.
IEEE Secur. Priv., 2017

BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model.
Proceedings of the 26th USENIX Security Symposium, 2017

Toward full elasticity in distributed static analysis: the case of callgraph analysis.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Just-in-time static analysis.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

Cheetah: just-in-time taint analysis for Android apps.
Proceedings of the 39th International Conference on Software Engineering, 2017

2016
Kizzle: A Signature Compiler for Detecting Exploit Kits.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2015
Fast: A Transducer-Based Language for Tree Manipulation.
ACM Trans. Program. Lang. Syst., 2015

In defense of soundiness: a manifesto.
Commun. ACM, 2015

PriVaricator: Deceiving Fingerprinters with Little White Lies.
Proceedings of the 24th International Conference on World Wide Web, 2015

SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

InterPoll: Crowd-Sourced Internet Polls.
Proceedings of the 1st Summit on Advances in Programming Languages, 2015

Detecting JavaScript races that matter.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Data-Parallel String-Manipulating Programs.
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015

Program Boosting: Program Synthesis via Crowd-Sourcing.
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015

2014
Preface.
J. Comput. Secur., 2014

ZØ: An Optimizing Distributing Zero-Knowledge Compiler.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

I Know It When I See It: Observable Races in JavaScript Applications.
Proceedings of the Workshop on Dynamic Languages and Applications, 2014

Automated migration of build scripts using dynamic analysis and search-based refactoring.
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, 2014

Saving Money While Polling with InterPoll Using Power Analysis.
Proceedings of the Seconf AAAI Conference on Human Computation and Crowdsourcing, 2014

Let's do it at my place instead?: attitudinal and behavioral study of privacy in client-side personalization.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

MoRePriv: mobile OS support for application personalization and privacy.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Practical static analysis of JavaScript applications in the presence of frameworks and libraries.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Towards fully automatic placement of security sanitizers and declassifiers.
Proceedings of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2013

Fully abstract compilation to JavaScript.
Proceedings of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2013

Verifying higher-order programs with the dijkstra monad.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2013

Operating System Support for Augmented Reality Applications.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

2012
Browser Security Case Study: Appearances Can Be Deceiving.
ACM Queue, 2012

Web Application Security (Dagstuhl Seminar 12401).
Dagstuhl Reports, 2012

Rozzle: De-cloaking Internet Malware.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Symbolic finite state transducers: algorithms and applications.
Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2012

Private Client-Side Profiling with Random Forests and Hidden Markov Models.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Finding Malware on a Web Scale.
Proceedings of the Computer Network Security, 2012

2011
Fast and Precise Sanitizer Analysis with BEK.
Proceedings of the 20th USENIX Security Symposium, 2011

ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection.
Proceedings of the 20th USENIX Security Symposium, 2011

Verified Security for Browser Extensions.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

RePriv: Re-imagining Content Personalization and In-browser Privacy.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Towards ensuring client-side computational integrity.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

2010
AjaxScope: A Platform for Remotely Monitoring the Client-Side Behavior of Web 2.0 Applications.
ACM Trans. Web, 2010

JSMeter: Comparing the Behavior of JavaScript Benchmarks with Real Web Applications.
Proceedings of the USENIX Conference on Web Application Development, 2010

ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Fluxo: a system for internet service programming by non-expert developers.
Proceedings of the 1st ACM Symposium on Cloud Computing, 2010

2009
NOZZLE: A Defense Against Heap-spraying Code Injection Attacks.
Proceedings of the 18th USENIX Security Symposium, 2009

GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code.
Proceedings of the 18th USENIX Security Symposium, 2009

CatchAndRetry: extending exceptions to handle distributed system failures and recovery.
Proceedings of the Fifth Workshop on Programming Languages and Operating Systems, 2009

Merlin: specification inference for explicit information flow problems.
Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, 2009

FLUXO: A Simple Service Compiler.
Proceedings of HotOS'09: 12th Workshop on Hot Topics in Operating Systems, 2009

Improving the responsiveness of internet services with automatic cache placement.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009

09141 Executive Summary - Web Application Security.
Proceedings of the Web Application Security, 29.03. - 03.04.2009, 2009

09141 Abstracts Collection - Web Application Security.
Proceedings of the Web Application Security, 29.03. - 03.04.2009, 2009

Ripley: automatically securing web 2.0 applications through replicated execution.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Volta: Developing Distributed Applications by Recompiling.
IEEE Softw., 2008

Spectator: Detection and Containment of JavaScript Worms.
Proceedings of the 2008 USENIX Annual Technical Conference, 2008

Doloto: code splitting for network-bound web 2.0 applications.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

Securing web applications with static and dynamic information flow tracking.
Proceedings of the 2008 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation, 2008

2007
Using web application construction frameworks to protect against code injection attacks.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007

End-to-End Web Application Security.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

2006
Mining Additions of Method Calls in ArgoUML.
Proceedings of the Aspects For Legacy Applications, 26.07. - 29.07.2006, 2006

2005
Finding Security Vulnerabilities in Java Applications with Static Analysis.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

DynaMine: finding common error patterns by mining software revision histories.
Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005

Context-sensitive program analysis as database queries.
Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2005

Finding application errors and security flaws using PQL: a program query language.
Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2005

Improving software security with a C pointer analysis.
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005

Reflection Analysis for Java.
Proceedings of the Programming Languages and Systems, Third Asian Symposium, 2005

2003
Tracking pointers with path and context sensitivity for bug detection in C programs.
Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, 2003


  Loading...