Matthew Finifter

According to our database1, Matthew Finifter authored at least 11 papers between 2008 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities.
PhD thesis, 2013

An Empirical Study of Vulnerability Rewards Programs.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

An Empirical Study on the Effectiveness of Security Code Review.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013

2012
Jigsaw: Efficient, Low-effort Mashup Isolation.
Proceedings of the 3rd USENIX Conference on Web Application Development, 2012

How to Ask for Permission.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

2011
Exploring the Relationship Between Web Application Development Tools and Security.
Proceedings of the 2nd USENIX Conference on Web Application Development, 2011

A Systematic Analysis of XSS Sanitization in Web Application Frameworks.
Proceedings of the Computer Security - ESORICS 2011, 2011

Diesel: applying privilege separation to database access.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

A survey of mobile malware in the wild.
Proceedings of the SPSM'11, 2011

2010
Preventing Capability Leaks in Secure JavaScript Subsets.
Proceedings of the Network and Distributed System Security Symposium, 2010

2008
Verifiable functional purity in java.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008


  Loading...