Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ripley: automatically securing web 2.0 applications through replicated execution., , and . ACM Conference on Computer and Communications Security, page 173-186. ACM, (2009)Spectator: Detection and Containment of JavaScript Worms., and . USENIX Annual Technical Conference, page 335-348. USENIX Association, (2008)ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser., and . IEEE Symposium on Security and Privacy, page 481-496. IEEE Computer Society, (2010)Merlin: specification inference for explicit information flow problems., , , and . PLDI, page 75-86. ACM, (2009)AjaxScope: a platform for remotely monitoring the client-side behavior of web 2.0 applications., and . SOSP, page 17-30. ACM, (2007)AjaxScope: A Platform for Remotely Monitoring the Client-Side Behavior of Web 2.0 Applications., and . TWEB, 4 (4): 13:1-13:52 (2010)Fluxo: a system for internet service programming by non-expert developers., , , and . SoCC, page 107-118. ACM, (2010)Doloto: code splitting for network-bound web 2.0 applications., and . SIGSOFT FSE, page 350-360. ACM, (2008)Improving software security with a C pointer analysis., , , and . ICSE, page 332-341. ACM, (2005)GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code., and . USENIX Security Symposium, page 151-168. USENIX Association, (2009)