Organizing security patterns M Hafiz, P Adamczyk, RE Johnson IEEE software 24 (4), 52-60, 2007 | 183 | 2007 |
Energy profiles of java collections classes S Hasan, Z King, M Hafiz, M Sayagh, B Adams, A Hindle Proceedings of the 38th International Conference on Software Engineering …, 2016 | 182 | 2016 |
Identifying the characteristics of vulnerable code changes: An empirical study A Bosu, JC Carver, M Hafiz, P Hilley, D Janni Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014 | 154 | 2014 |
R2Fix: Automatically generating bug fixes from bug reports C Liu, J Yang, L Tan, M Hafiz 2013 IEEE Sixth international conference on software testing, verification …, 2013 | 144 | 2013 |
A collection of privacy design patterns M Hafiz Proceedings of the 2006 conference on Pattern languages of programs, 1-13, 2006 | 129 | 2006 |
Growing a pattern language (for security) M Hafiz, P Adamczyk, RE Johnson Proceedings of the ACM international symposium on New ideas, new paradigms …, 2012 | 101 | 2012 |
Rest and web services: In theory and in practice P Adamczyk, PH Smith, RE Johnson, M Hafiz REST: from research to practice, 35-57, 2011 | 101 | 2011 |
Program transformations to fix C integers Z Coker, M Hafiz 2013 35th International Conference on Software Engineering (ICSE), 792-801, 2013 | 90 | 2013 |
A pattern language for developing privacy enhancing technologies M Hafiz Software: Practice and Experience 43 (7), 769-787, 2013 | 88 | 2013 |
Systematic testing of refactoring engines on real software projects M Gligoric, F Behrang, Y Li, J Overbey, M Hafiz, D Marinov ECOOP 2013–Object-Oriented Programming: 27th European Conference …, 2013 | 67 | 2013 |
Game of detections: how are security vulnerabilities discovered in the wild? M Hafiz, M Fang Empirical Software Engineering 21, 1920-1959, 2016 | 57 | 2016 |
Multiple design patterns for voice over IP (VoIP) security Z Anwar, W Yurcik, RE Johnson, M Hafiz, RH Campbell 2006 IEEE International Performance Computing and Communications Conference …, 2006 | 49 | 2006 |
The security architecture of qmail M Hafiz, R Johnson, R Afandi Proceedings of the 11th Conference on Patterns Language of Programming (PLoP’04), 2004 | 37 | 2004 |
Automatically fixing c buffer overflows using program transformations A Shaw, D Doggett, M Hafiz 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014 | 32 | 2014 |
Security patterns and their classification schemes M Hafiz, RE Johnson University of Illinois at Urbana-Champaign Department of Computer Science …, 2006 | 32 | 2006 |
Discovering buffer overflow vulnerabilities in the wild: An empirical study M Fang, M Hafiz Proceedings of the 8th ACM/IEEE International Symposium on Empirical …, 2014 | 29 | 2014 |
Evolution of the MTA architecture: The impact of security M Hafiz, RE Johnson Software: Practice and Experience 38 (15), 1569-1599, 2008 | 27 | 2008 |
Systematically eradicating data injection attacks using security-oriented program transformations M Hafiz, P Adamczyk, R Johnson International Symposium on Engineering Secure Software and Systems, 75-90, 2009 | 25 | 2009 |
Security on demand M Hafiz University of Illinois at Urbana-Champaign, 2010 | 20 | 2010 |
Improving perimeter security with security-oriented program transformations M Hafiz, RE Johnson 2009 ICSE Workshop on Software Engineering for Secure Systems, 61-67, 2009 | 19 | 2009 |