
Presentations
Note that some of these talks have been given by collaborators and students and the credit for the slides rests with them.
-
- New: Just-in-Time Static Analysis.
Benjamin Livshits with Lisa Nguyen Quang Do, Karim Ali, and Eric Bodden
March 2016.
-
- Detecting JavaScript Races that Matter.
Erdal Mutlu, Serdar Tasiran, and Benjamin Livshits
Foundations of Software Engineering (FSE), September 2015.
- InterPoll: Crowd-Sourced Internet Polls.
Benjamin Livshits and Todd Mytkowicz
Summit On Advances In Programming Languages (SNAPL), May 2015.
- PriVaricator: Deceiving Fingerprinters with Little White Lies.
Nick Nikiforakis, Wouter Joosen, and Benjamin Livshits
International World Wide Web Conference (WWW), May 2015.
- SurroundWeb : Mitigating Privacy Concerns in a 3D Web Browser.
John Vilk, David Molnar, Eyal Ofek, Chris Rossbach, Benjamin Livshits, Alexander Moshchuk, Helen J. Wang, and Ran Gal
IEEE Symposium on Security and Privacy (Oakland Security), May 2015.
- Program Boosting: Program Synthesis via Crowd-Sourcing.
Robert Cochran, Loris D'Antoni, Benjamin Livshits, David Molnar, and Margus Veanes
Symposium on the Principles of Programming Languages (POPL), January 2015.
- Data Parallel String Manipulating Programs.
Margus Veanes, Todd Mytkowicz, David Molnar, Benjamin Livshits
Symposium on the Principles of Programming Languages (POPL), January 2015.
-
- Fast: a Transducer-Based Language for Tree Manipulation.
Loris D'Antoni, Margus Veanes, Benjamin Livshits and David Molnar
Conference on Programming Language Design and Implementation (PLDI), June 2014.
- ZŲ: An Optimizing Distributing Zero-Knowledge Compiler.
Matt Fredrikson and Benjamin Livshits
Usenix Security, August 2014.
- Programming for social scientists with InterPoll.
Benjamin Livshits
ECOOP summer school, August 2014.
- Saving Money While Polling with InterPoll using Power Analysis.
Benjamin Livshits and Todd Mytkowicz
Conference on Human Computation & Crowdsourcing (HCOMP 2014), November 2014.
- Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications.
Benjamin Livshits
Usenix Security, August 2013.
-
- Personalization and Privacy: An Overview.
Benjamin Livshits
Microsoft Research Faculty Summit, July 2013.
- Challenges in Pointer Analysis of JavaScript.
Benjamin Livshits
Dagstuhl seminar 13162, April 2013.
- Towards Fully Automatic Placement of Security Sanitizers and Declassifiers.
Benjamin Livshits and Stephen Chong
Symposium on the Principles of Programming Languages (POPL), January 2013.
- Private Client-side Profiling with Random Forests and Hidden Markov Models.
George Danezis, Markulf Kohlweiss, Benjamin Livshits, and Alfredo Rial
Privacy Enhancing Technologies Symposium, July 2012.
- Finding Malware on a Web Scale: an Updated Overview.
Benjamin Livshits, Benjamin Zorn, Christian Seifert, and others
- Rozzle: De-Cloaking Internet Malware.
Clemens Kolbitsch, Benjamin Livshits, Benjamin Zorn, and Christian Seifert
- Finding Malware on a Web Scale: an Overview.
Benjamin Livshits, Benjamin Zorn, Christian Seifert, and others
- Zozzle: Finding Malware on a Web Scale.
Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, and Christian Seifert
Usenix Security, August 2011.
- RePriv: Re-Envisioning In-Browser Privacy.
Benjamin Livshits and Matt Fredrikson
Overview talk , March 2011.
- Privacy and Security for Brower Extensions: A Language-Based Approach.
Benjamin Livshits, Nikhil Swamy, Matt Fredrikson, and Arjun Guha
Overview talk , December 2010.
- JSMeter: Comparing the Behavior of JavaScript Benchmarks with Real Web Applications.
Paruj Ratanaworabhan, Benjamin Livshits, and Benjamin Zorn
USENIX Conference on Web Application Development (WebApps) , June 2010.
- JSZap: Compressing JavaScript Code
Martin Burtscher, Benjamin Livshits, Gaurav Sinha, and Benjamin Zorn
USENIX Conference on Web Application Development (WebApps) , June 2010.
- Gulfstream: Incremental Static Analysis for Streaming JavaScript Applications.
Salvatore Guarnieri and Benjamin Livshits
USENIX Conference on Web Application Development (WebApps) , June 2010.
- Fluxo: A System for Internet Service Programming by Non-expert Developers.
Emre Kiciman, Benjamin Livshits, Madanlal Musuvathi, and Kevin C. Webb
ACM Symposium on Cloud Computing (SOCC) , June 2010.
- Empowering Browser Security for Mobile Devices Using Smart CDNs.
Benjamin Livshits and David Molnar
Workshop on Web 2.0 Security and Privacy (W2SP), May 2010.
- Secure Cooperative Sharing of JavaScript, Browser, and Physical Resources.
Leo Meyerovich, David Zhu, and Benjamin Livshits
Workshop on Web 2.0 Security and Privacy (W2SP), May 2010.
- ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser.
Leo Meyerovich and Benjamin Livshits
IEEE Symposium on Security and Privacy (Oakland Security), May 2010.
- Ripley: Automatically Securing Web 2.0 Applications Through Replicated Execution.
K. Vikram, Abhishek Prateek, and Benjamin Livshits
In Conference on Computer and Communications Security (CCS), November 2009.
-
Gatekeeper: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code.
Salvatore Guarnieri and Benjamin Livshits.
In Usenix Security, August 2009.
-
Nozzle: A Defense Against Heap-spraying Code Injection Attacks.
Paruj Ratanaworabhan, Benjamin Livshits, and Benjamin Zorn.
In Usenix Security, August 2009.
-
Merlin: Specification Inference for Explicit Information Flow Problems.
Benjamin Livshits, Aditya V. Nori, Sriram K. Rajamani, and Anindya Banerjee.
(slides by Aditya Nori)
In PLDI, June 2009.
-
Fluxo: Simple Service Compiler.
Emre Kiciman, Ben Livshits, and Madanlal Musuvathi.
(slides by Emre Kiciman)
In HotOS, May 2009.
-
Fluxo: Improving the Responsiveness of Internet Services with Automatic Cache Placement.
Alexander Rasmussen, Emre Kiciman, Ben Livshits, and Madanlal Musuvathi.
(slides by Alexander Rasmussen)
In EuroSys, March 2009.
-
Doloto: Code Splitting for Web 2.0 Applications.
Benjamin Livshits and Emre Kiciman.
In Foundations of Software Engineering (FSE), November 2008.
-
Spectator: Detection and Containment of JavaScript Worms.
Benjamin Livshits and Weidong Cui.
In Usenix Annual Technical Conference, June 2008.
-
Doloto: Code Splitting for AJAX Applications.
Benjamin Livshits and Emre Kiciman.
In Velocity Web Peformance Conference, June 2008.
-
AjaxScope: Remotely Monitoring Client-side Web-App Behavior. (slides by Emre Kiciman)
Emre Kiciman and Benjamin Livshits.
In Symposium of Operating System Principles (SOSP 2007), October 2007.
-
Using Web Application Construction Frameworks to Protect Against Code Injection Attacks.
Benjamin Livshits and Ulfar Erlingsson.
In Workshop on Programming Languages and Analysis for Security (PLAS 2007), June 2007.
-
Towards Security by Construction for Web 2.0 Applications.
Benjamin Livshits and Ulfar Erlingsson.
In Web 2.0 Security & Privacy 2007, May 2007.
-
Finding Application Errors and Security Flaws Using PQL: A Program Query Language.
Michael Martin, Benjamin Livshits, and Monica Lam.
In Dagstugl seminar on Runtime Verification (07011), January 2007.
- Reflection Analysis for Java.
Benjamin Livshits, John Whaley, and Monica S. Lam
In Third Asian Symposium on Programming Languages and Systems,
Tsukuba, Japan, November, 2005.
- Finding Application Errors and Security Flaws Using PQL: a Program Query Language.
Michael Martin, Benjamin Livshits, and Monica S. Lam
In 20th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications,
San Diego, California, October 2005 (slides and presentation by Michael Martin).
- DynaMine: Finding Common Error Patterns by Mining Software Revision Histories.
Benjamin Livshits and Thomas Zimmermann
In ACM SIGSOFT Symposium on the Foundations of Software Engineering,
Lisbon, Portugal, September 2005 (slides and presentation by Thomas Zimmermann).
-
Finding Security Vulnerabilities in Java Applications with Static Analysis.
Benjamin Livshits and Monica Lam.
In Usenix Security Symposium, Baltimore, Maryland, August 2005.
-
DynaMine: Finding Common Error Patterns by Mining Software Revision Histories.
Benjamin Livshits and Thomas Zimmermann.
In Dagstugl seminar 05261, June 2005.
- Locating Matching Method Calls by Mining Revision History Data.
Benjamin Livshits and Thomas Zimmermann
In the Workshop on the Evaluation of Software Defect Detection Tools, Chicago, Illinois, June 2005.
-
Using Static Analysis to Find Input Validation Errors in Java Programs.
Benjamin Livshits and Monica S. Lam.
In Stanford 7th Annual Security Workshop, May 2005.
-
Turning Eclipse Against Itself: Finding Errors in Eclipse Sources.
Benjamin Livshits.
In Eclipsecon '05 Research Exchange, March 2005.
-
Finding Security Errors in Java Applications Using Lightweight Static Analysis.
Benjamin Livshits.
Work-in-Progress Report, Annual Computer Security Applications Conference, November 2004.
-
Tracking Pointers with Path and Context Sensitivity for Bug Detection in C Programs.
Benjamin Livshits and Monica S. Lam
11th ACM SIGSOFT International Symposium on the
Foundations of Software Engineering, September 2003.
- Finding Security Violations by Using Precise Source-level Analysis.
Benjamin Livshits and Monica S. Lam
In Stanford 5th Annual Security Workshop, May 2003.
Top of page