An empirical study of privacy-violating information flows in JavaScript web applications D Jang, R Jhala, S Lerner, H Shacham Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 275 | 2010 |
SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks. D Jang, Z Tatlock, S Lerner NDSS, 2014 | 201 | 2014 |
Establishing browser security guarantees through formal shim verification D Jang, Z Tatlock, S Lerner 21st USENIX Security Symposium (USENIX Security 12), 113-128, 2012 | 93 | 2012 |
Points-to analysis for JavaScript D Jang, KM Choe Proceedings of the 2009 ACM symposium on Applied Computing, 1930-1937, 2009 | 84 | 2009 |
Automating formal proofs for reactive systems D Ricketts, V Robert, D Jang, Z Tatlock, S Lerner Proceedings of the 35th ACM SIGPLAN Conference on Programming Language …, 2014 | 21 | 2014 |
Analyzing the crossdomain policies of Flash applications D Jang, A Venkataraman, GM Sawka, H Shacham Proceedings of the 5th Workshop on Web 2, 2011 | 20 | 2011 |
Rewriting-based dynamic information flow for JavaScript D Jang, R Jhala, S Lerner, H Shacham 17th ACM Conference on Computer and Communications Security, 2010 | 8 | 2010 |
Language-based Security for Web Browsers D Jang University of California, San Diego, 2014 | 1 | 2014 |
Securing C++ Virtual Calls from Memory Corruption Attacks D Jang, Z Tatlock, S Lerner | | 2016 |
Daniel Ricketts D Ricketts, G Malecha, MM Alvarez, V Gowda, S Lerner, V Robert, D Jang, ... Conference on, pages 248 (257), 2015 | | 2015 |