Devdatta Akhawe

According to our database1, Devdatta Akhawe authored at least 20 papers between 2010 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Hopper: Modeling and Detecting Lateral Movement (Extended Report).
CoRR, 2021

Hopper: Modeling and Detecting Lateral Movement.
Proceedings of the 30th USENIX Security Symposium, 2021

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2018
Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers.
Proc. Priv. Enhancing Technol., 2018

2016
pASSWORD tYPOS and How to Correct Them Securely.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
ASPIRE: Iterative Specification Synthesis for Security.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

2014
Towards High Assurance HTML5 Applications.
PhD thesis, 2014

Clickjacking Revisited: A Perceptual View of UI Security.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

The Emperor's New Password Manager: Security Analysis of Web-based Password Managers.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

ShadowCrypt: Encrypted Web Applications for Everyone.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Here's my cert, so trust me, maybe?: understanding TLS errors on the web.
Proceedings of the 22nd International World Wide Web Conference, 2013

An Empirical Study of Vulnerability Rewards Programs.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Data-Confined HTML5 Applications.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
How to Ask for Permission.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

Privilege Separation in HTML5 Applications.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

2011
Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

A Systematic Analysis of XSS Sanitization in Web Application Frameworks.
Proceedings of the Computer Security - ESORICS 2011, 2011

2010
A Symbolic Execution Framework for JavaScript.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Towards a Formal Foundation of Web Security.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010


  Loading...