FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution. D Davidson, B Moench, T Ristenpart, S Jha USENIX Security Symposium, 463-478, 2013 | 237 | 2013 |
Controlling UAVs with Sensor Input Spoofing Attacks. D Davidson, H Wu, R Jellinek, V Singh, T Ristenpart WOOT, 2016 | 155 | 2016 |
Cimplifier: automatically debloating containers V Rastogi, D Davidson, L De Carli, S Jha, P McDaniel Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 78 | 2017 |
Automatic Generation of Remediation Procedures for Malware Infections. R Paleari, L Martignoni, E Passerini, D Davidson, M Fredrikson, JT Giffin, ... USENIX Security Symposium, 419-434, 2010 | 52 | 2010 |
Morepriv: Mobile os support for application personalization and privacy D Davidson, M Fredrikson, B Livshits Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 48 | 2014 |
Security issues in language-based software ecosystems RK Vaidya, L De Carli, D Davidson, V Rastogi arXiv preprint arXiv:1903.02613, 2019 | 26 | 2019 |
Defending against package typosquatting M Taylor, R Vaidya, D Davidson, L De Carli, V Rastogi Network and System Security: 14th International Conference, NSS 2020 …, 2020 | 21 | 2020 |
Secure integration of web content and applications on commodity mobile operating systems D Davidson, Y Chen, F George, L Lu, S Jha Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 18 | 2017 |
Spellbound: Defending against package typosquatting M Taylor, RK Vaidya, D Davidson, L De Carli, V Rastogi arXiv preprint arXiv:2003.03471, 2020 | 15 | 2020 |
An analysis of first-party cookie exfiltration due to cname redirections T Ren, A Wittman, L De Carli, D Davidson Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb), 2021 | 12 | 2021 |
Protocol normalization using attribute grammars D Davidson, R Smith, N Doyle, S Jha Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 12 | 2009 |
Mismesh: Security issues and challenges in service meshes DA Hahn, D Davidson, AG Bardas Security and Privacy in Communication Networks: 16th EAI International …, 2020 | 9 | 2020 |
Wolf at the door: Preventing install-time attacks in npm with latch E Wyss, A Wittman, D Davidson, L De Carli Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 4 | 2022 |
What the fork? finding hidden code clones in npm E Wyss, L De Carli, D Davidson Proceedings of the 44th International Conference on Software Engineering …, 2022 | 4 | 2022 |
Assessing Adaptive Attacks Against Trained JavaScript Classifiers N Hansen, L De Carli, D Davidson Security and Privacy in Communication Networks: 16th EAI International …, 2020 | 3 | 2020 |
Towards least privilege containers with cimplifier V Rastogi, D Davidson, L De Carli, S Jha, P McDaniel arXiv preprint arXiv:1602.08410, 2016 | 3 | 2016 |
Digital home-lessness: Exploring the links between public Internet access, technological capital, and social inequality M Comi, S Smith, WA Goettlich, P Alexander, D Davidson, WG Staples Current Sociology, 00113921221111819, 2022 | 2 | 2022 |
Enhancing Android security through app splitting D Davidson, V Rastogi, M Christodorescu, S Jha Security and Privacy in Communication Networks: 13th International …, 2018 | 2 | 2018 |
Security Issues and Challenges in Service Meshes--An Extended Study DA Hahn, D Davidson, AG Bardas arXiv preprint arXiv:2010.11079, 2020 | 1 | 2020 |
Towards Enforceable Data-Driven Privacy Policies M Fredrikson, D Davidson, S Jha, B Livshits Web 2.0 Workshop on Security and Privacy, 2011 | 1 | 2011 |