TAJ: effective taint analysis of web applications O Tripp, M Pistoia, SJ Fink, M Sridharan, O Weisman ACM Sigplan Notices 44 (6), 87-97, 2009 | 514 | 2009 |
Andromeda: Accurate and Scalable Security Analysis of Web Applications O Tripp, M Pistoia, P Cousot, R Cousot, S Guarnieri Fundamental Approaches to Software Engineering: 16th International …, 2013 | 189 | 2013 |
Saving the world wide web from vulnerable JavaScript S Guarnieri, M Pistoia, O Tripp, J Dolby, S Teilhet, R Berg Proceedings of the 2011 International Symposium on Software Testing and …, 2011 | 184 | 2011 |
F4F: taint analysis of framework-based web applications M Sridharan, S Artzi, M Pistoia, S Guarnieri, O Tripp, R Berg Proceedings of the 2011 ACM international conference on Object oriented …, 2011 | 139 | 2011 |
A bayesian approach to privacy enforcement in smartphones O Tripp, J Rubin 23rd USENIX Security Symposium (USENIX Security 14), 175-190, 2014 | 113 | 2014 |
Path-and index-sensitive string analysis based on monadic second-order logic T Tateishi, M Pistoia, O Tripp ACM Transactions on Software Engineering and Methodology (TOSEM) 22 (4), 1-33, 2013 | 100 | 2013 |
Aletheia: Improving the usability of static security analysis O Tripp, S Guarnieri, M Pistoia, A Aravkin Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 97 | 2014 |
Dynamic detection of inter-application communication vulnerabilities in Android R Hay, O Tripp, M Pistoia Proceedings of the 2015 International Symposium on Software Testing and …, 2015 | 96 | 2015 |
Grail: Context-aware fixing of concurrency bugs P Liu, O Tripp, C Zhang Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014 | 72 | 2014 |
Hybrid security analysis of web javascript code via dynamic partial evaluation O Tripp, P Ferrara, M Pistoia Proceedings of the 2014 International Symposium on Software Testing and …, 2014 | 71 | 2014 |
Z3str2: an efficient solver for strings, regular expressions, and length constraints Y Zheng, V Ganesh, S Subramanian, O Tripp, M Berzish, J Dolby, ... Formal Methods in System Design 50, 249-288, 2017 | 60 | 2017 |
Effective search-space pruning for solvers of string equations, regular expressions and length constraints Y Zheng, V Ganesh, S Subramanian, O Tripp, J Dolby, X Zhang Computer Aided Verification: 27th International Conference, CAV 2015, San …, 2015 | 56 | 2015 |
Learning minimal abstractions P Liang, O Tripp, M Naik Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2011 | 54 | 2011 |
Automated testing of applications with scripting code S Artzi, J Dolby, SA Guarnieri, SH Jensen, M Pistoia, M Sridharan, F Tip, ... US Patent 9,135,147, 2015 | 52 | 2015 |
Detecting and localizing security vulnerabilities in client-server application S Artzi, J Dolby, M Pistoia, F Tip, O Tripp US Patent 8,516,449, 2013 | 51 | 2013 |
Finding your way in the testing jungle: A learning approach to web security testing O Tripp, O Weisman, L Guy Proceedings of the 2013 International Symposium on Software Testing and …, 2013 | 50 | 2013 |
Detecting persistent vulnerabilities in web applications Y Amit, O Tripp US Patent 8,949,994, 2015 | 41 | 2015 |
Enforcement of data privacy to maintain obfuscation of certain data MG Burke, I Peshansky, M Pistoia, O Tripp US Patent 8,544,104, 2013 | 39 | 2013 |
Security risk evaluation R Hay, O Tripp, M Pistoia US Patent App. 15/339,965, 2018 | 37 | 2018 |
Simulating black box test results using information from white box testing S Fink, YA Haviv, R Hay, M Pistoia, O Segal, A Sharabani, M Sridharan, ... US Patent 9,747,187, 2017 | 35 | 2017 |