Munawar Hafiz

According to our database1, Munawar Hafiz authored at least 36 papers between 2005 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Growing a language: An empirical study on how (and why) developers use some recently-introduced and/or recently-evolving JavaScript features.
J. Syst. Softw., 2016

Game of detections: how are security vulnerabilities discovered in the wild?
Empir. Softw. Eng., 2016

Differential precondition checking: a language-independent, reusable analysis for refactoring engines.
Autom. Softw. Eng., 2016

Understanding and fixing multiple language interoperability issues: the C/Fortran case.
Proceedings of the 38th International Conference on Software Engineering, 2016

Energy profiles of Java collections classes.
Proceedings of the 38th International Conference on Software Engineering, 2016

POODLEs, More POODLEs, FREAK Attacks Too: How Server Administrators Responded to Three Serious Web Vulnerabilities.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

2015
Refactoring Myths.
IEEE Softw., 2015

2014
A foundation for refactoring C with macros.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Identifying the characteristics of vulnerable code changes: an empirical study.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

When Are OSS Developers More Likely to Introduce Vulnerable Code Changes? A Case Study.
Proceedings of the Open Source Software: Mobile Open Source Technologies, 2014

Discovering buffer overflow vulnerabilities in the wild: an empirical study.
Proceedings of the 2014 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, 2014

Automatically Fixing C Buffer Overflows Using Program Transformations.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

JavaScript: The Used Parts.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
A pattern language for developing privacy enhancing technologies.
Softw. Pract. Exp., 2013

OpenRefactory/C: an infrastructure for building correct and complex C transformations.
Proceedings of the 2013 ACM Workshop on Refactoring Tools, 2013

R2Fix: Automatically Generating Bug Fixes from Bug Reports.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Program transformations to fix C integers.
Proceedings of the 35th International Conference on Software Engineering, 2013

Systematic Testing of Refactoring Engines on Real Software Projects.
Proceedings of the ECOOP 2013 - Object-Oriented Programming, 2013

2012
OpenRefactory/C: an infrastructure for developing program transformations for C programs.
Proceedings of the SPLASH'12, 2012

Growing a pattern language (for security).
Proceedings of the ACM Symposium on New Ideas in Programming and Reflections on Software, 2012

The nature of order: from security patterns to a pattern language.
Proceedings of the SPLASH'12, 2012

2011
Patterns Transform Architectures.
Proceedings of the 9th Working IEEE/IFIP Conference on Software Architecture, 2011

An 'explicit type enforcement' program transformation tool for preventing integer vulnerabiliites.
Proceedings of the Companion to the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2011

REST and Web Services: In Theory and in Practice.
Proceedings of the REST: From Research to Practice, 2011

2010
Security on demand
PhD thesis, 2010

The Tower of Babel did not fail.
Proceedings of the 25th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2010

2009
Improving perimeter security with security-oriented program transformations.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations.
Proceedings of the Engineering Secure Software and Systems, 2009

Security-oriented program transformations.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2008
Evolution of the MTA architecture: the impact of security.
Softw. Pract. Exp., 2008

A security oriented program transformation to "add on" policies to prevent injection attacks.
Proceedings of the Second ACM Workshop on Refactoring Tools, 2008

Security oriented program transformations (or how to add security on demand).
Proceedings of the Companion to the 23rd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2008

2007
Organizing Security Patterns.
IEEE Softw., 2007

2006
Multiple design patterns for voice over IP (VoIP) security.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

AMPol: Adaptive Messaging Policy.
Proceedings of the Fourth IEEE European Conference on Web Services (ECOWS 2006), 2006

2005
Security patterns and evolution of MTA architecture.
Proceedings of the Companion to the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2005


  Loading...