A survey of mobile malware in the wild AP Felt, M Finifter, E Chin, S Hanna, D Wagner Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011 | 1171 | 2011 |
A systematic analysis of xss sanitization in web application frameworks J Weinberger, P Saxena, D Akhawe, M Finifter, R Shin, D Song Computer Security–ESORICS 2011, 150-171, 2011 | 221* | 2011 |
An empirical study of vulnerability rewards programs M Finifter, D Akhawe, D Wagner 22nd USENIX Security Symposium (USENIX Security 13), 273-288, 2013 | 192 | 2013 |
How to ask for permission AP Felt, S Egelman, M Finifter, D Akhawe, D Wagner HotSec, 0, 2012 | 189 | 2012 |
An empirical study on the effectiveness of security code review A Edmundson, B Holtkamp, E Rivera, M Finifter, A Mettler, D Wagner Engineering Secure Software and Systems: 5th International Symposium, ESSoS …, 2013 | 105 | 2013 |
Verifiable functional purity in Java M Finifter, A Mettler, N Sastry, D Wagner Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 81 | 2008 |
Preventing capability leaks in secure javascript subsets M Finifter, J Weinberger, A Barth Proc. of Network and Distributed System Security Symposium, 2010 | 68 | 2010 |
Exploring the relationship between web application development tools and security M Finifter 2nd USENIX Conference on Web Application Development (WebApps 11), 2011 | 57 | 2011 |
Diesel: Applying privilege separation to database access AP Felt, M Finifter, J Weinberger, D Wagner Proceedings of the 6th ACM symposium on information, computer and …, 2011 | 33 | 2011 |
Jigsaw:Efficient, Low-effort Mashup Isolation J Mickens, M Finifter 3rd USENIX Conference on Web Application Development (WebApps 12), 13-25, 2012 | 10 | 2012 |
Product labels for mobile application markets D Akhawe, M Finifter Proceedings of Mobile Security Technologies Workshop 24, 2012 | 3 | 2012 |
Vulnerability Rewards Programs M Finifter, D Akhawe, D Wagner Towards Evidence-Based Assessment of Factors Contributing to the …, 0 | 1 | |
Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities MS Finifter University of California, Berkeley, 2013 | | 2013 |