Web-to-application injection attacks on android: Characterization and detection B Hassanshahi, Y Jia, RHC Yap, P Saxena, Z Liang Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 53 | 2015 |
Nodest: feedback-driven static analysis of Node. js applications BB Nielsen, B Hassanshahi, F Gauthier Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019 | 44 | 2019 |
An efficient tunable selective points-to analysis for large codebases B Hassanshahi, RK Ramesh, P Krishnan, B Scholz, Y Lu Proceedings of the 6th ACM SIGPLAN International Workshop on State Of the …, 2017 | 34 | 2017 |
AFFOGATO: runtime detection of injection attacks for Node. js F Gauthier, B Hassanshahi, A Jordan Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 94-99, 2018 | 32 | 2018 |
Android Database Attacks Revisited B Hassanshahi, RHC Yap Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 18 | 2017 |
Gelato: Feedback-driven and guided security analysis of client-side web applications B Hassanshahi, H Lee, P Krishnan 2022 IEEE International Conference on Software Analysis, Evolution and …, 2022 | 12 | 2022 |
Coding practices and recommendations of spring security for enterprise applications M Islam, S Rahaman, N Meng, B Hassanshahi, P Krishnan, DD Yao 2020 IEEE Secure Development (SecDev), 49-57, 2020 | 12 | 2020 |
SAFE-PDF: Robust Detection of JavaScript PDF Malware Using Abstract Interpretation A Jordan, F Gauthier, B Hassanshahi, D Zhao arXiv preprint arXiv:1810.12490, 2018 | 10 | 2018 |
Experience: Model-Based, Feedback-Driven, Greybox Web Fuzzing with BackREST F Gauthier, B Hassanshahi, B Selwyn-Smith, TN Mai, M Schlüter, ... 36th European Conference on Object-Oriented Programming (ECOOP 2022), 2022 | 9 | 2022 |
Automatic Root Cause Quantification for Missing Edges in JavaScript Call Graphs M Chakraborty, R Olivares, M Sridharan, B Hassanshahi 36th European Conference on Object-Oriented Programming (ECOOP 2022), 2022 | 8 | 2022 |
Roppdroid: Robust permission re-delegation prevention in android inter-component communication T Dai, X Li, B Hassanshahi, RHC Yap, Z Liang Computers & Security 68, 98-111, 2017 | 7 | 2017 |
BackREST: A Model-Based Feedback-Driven Greybox Fuzzer for Web Applications F Gauthier, B Hassanshahi, B Selwyn-Smith, TN Mai, M Schlüter, ... arXiv preprint arXiv:2108.08455, 2021 | 6 | 2021 |
MoScan: a model-based vulnerability scanner for web single sign-on services H Wei, B Hassanshahi, G Bai, P Krishnan, K Vorobyov Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021 | 6 | 2021 |
Unacceptable Behavior: Robust PDF Malware Detection Using Abstract Interpretation A Jordan, F Gauthier, B Hassanshahi, D Zhao Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and …, 2019 | 5 | 2019 |
The Role of Program Analysis in Security Vulnerability Detection: Then and Now C Cifuentes, F Gauthier, B Hassanshahi, P Krishnan, D McCall Computers & Security, 103463, 2023 | 4 | 2023 |
Trade-offs in managing risk and technical debt in industrial research labs: an experience report F Gauthier, A Jordan, P Krishnan, B Hassanshahi, JG Süß, S Bae, H Lee Proceedings of the 3rd International Conference on Technical Debt, 98-102, 2020 | 4 | 2020 |
Automatic Root Cause Quantification for Missing Edges in JavaScript Call Graphs (Extended Version) M Chakraborty, R Olivares, M Sridharan, B Hassanshahi arXiv preprint arXiv:2205.06780, 2022 | 3 | 2022 |
Application programming interface specification inference F Gauthier, B Hassanshahi, MM Schlüter US Patent App. 16/676,760, 2021 | 3 | 2021 |
JNICodejail: native code isolation for Java programs B Hassanshahi, RHC Yap Proceedings of the 2013 International Conference on Principles and Practices …, 2013 | 1 | 2013 |
Build process security framework TN Mai, B Hassanshahi, P Krishnan US Patent App. 17/888,466, 2024 | | 2024 |