Author of the publication

DynaMine: finding common error patterns by mining software revision histories.

, and . ESEC/SIGSOFT FSE, page 296-305. ACM, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ripley: automatically securing web 2.0 applications through replicated execution., , and . ACM Conference on Computer and Communications Security, page 173-186. ACM, (2009)Spectator: Detection and Containment of JavaScript Worms., and . USENIX Annual Technical Conference, page 335-348. USENIX Association, (2008)Merlin: specification inference for explicit information flow problems., , , and . PLDI, page 75-86. ACM, (2009)ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser., and . IEEE Symposium on Security and Privacy, page 481-496. IEEE Computer Society, (2010)AjaxScope: A Platform for Remotely Monitoring the Client-Side Behavior of Web 2.0 Applications., and . TWEB, 4 (4): 13:1-13:52 (2010)AjaxScope: a platform for remotely monitoring the client-side behavior of web 2.0 applications., and . SOSP, page 17-30. ACM, (2007)Doloto: code splitting for network-bound web 2.0 applications., and . SIGSOFT FSE, page 350-360. ACM, (2008)Improving software security with a C pointer analysis., , , and . ICSE, page 332-341. ACM, (2005)Fluxo: a system for internet service programming by non-expert developers., , , and . SoCC, page 107-118. ACM, (2010)GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code., and . USENIX Security Symposium, page 151-168. USENIX Association, (2009)