A symbolic execution framework for javascript P Saxena, D Akhawe, S Hanna, F Mao, S McCamant, D Song 2010 IEEE Symposium on Security and Privacy, 513-528, 2010 | 583 | 2010 |
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. D Akhawe, AP Felt Usenix Security, 257-272, 2013 | 502 | 2013 |
Towards a formal foundation of web security D Akhawe, A Barth, PE Lam, J Mitchell, D Song 2010 23rd IEEE Computer Security Foundations Symposium, 290-304, 2010 | 294 | 2010 |
The Emperor's New Password Manager: Security Analysis of Web-based Password Managers. Z Li, W He, D Akhawe, D Song USENIX Security, 465-479, 2014 | 210 | 2014 |
A systematic analysis of xss sanitization in web application frameworks J Weinberger, P Saxena, D Akhawe, M Finifter, R Shin, D Song Computer Security–ESORICS 2011, 150-171, 2011 | 207* | 2011 |
How to Ask for Permission. AP Felt, S Egelman, M Finifter, D Akhawe, D Wagner HotSec, 2012 | 176 | 2012 |
An Empirical Study of Vulnerability Rewards Programs. M Finifter, D Akhawe, D Wagner USENIX Security 13, 273-288, 2013 | 163 | 2013 |
ShadowCrypt: Encrypted Web Applications for Everyone W He, D Akhawe, S Jain, E Shi, D Song Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 134 | 2014 |
Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web D Akhawe, B Amann, M Vallentin, R Sommer Proceedings of the 22nd international conference on World Wide Web, 59-70, 2013 | 129 | 2013 |
Privilege separation in HTML5 applications D Akhawe, P Saxena, D Song Proceedings of the 21st USENIX conference on Security symposium, 23-23, 2012 | 75 | 2012 |
The emperor’s new APIs: On the (in) secure usage of new client-side primitives S Hanna, ECR Shin, D Akhawe, A Boehm, P Saxena, D Song Web 2.0 Security and Privacy Worskhop (W2SP), 2010 | 69 | 2010 |
Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection P Maniatis, D Akhawe, K Fall, E Shi, S McCamant, D Song Proceedings of the 13th USENIX conference on Hot topics in operating systems …, 2011 | 62 | 2011 |
pASSWORD tYPOS and How to Correct Them Securely R Chatterjee, A Athayle, D Akhawe, A Juels, T Ristenpart Security and Privacy (SP), 2016 IEEE Symposium on, 799-818, 2016 | 60 | 2016 |
Clickjacking Revisited A Perceptual View of UI Security D Akhawe, W He, Z Li, R Moazzezi, D Song Proceedings of the 8th USENIX conference on Offensive Technologies, 1-1, 2014 | 41 | 2014 |
Data-confined HTML5 applications D Akhawe, F Li, W He, P Saxena, D Song European Symposium on Research in Computer Security, 736-754, 2013 | 33 | 2013 |
Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers M Freyberger, W He, D Akhawe, ML Mazurek, P Mittal Proceedings on Privacy Enhancing Technologies 2018 (2), 47-63, 2018 | 14 | 2018 |
ASPIRE: Iterative Specification Synthesis for Security. KZ Chen, W He, D Akhawe, V D'Silva, P Mittal, D Song HotOS, 2015 | 4 | 2015 |
Product Labels for Mobile Application Markets D Akhawe, M Finifter | 2* | |
Towards High Assurance HTML5 Applications D Akhawe | 1 | 2014 |