Follow
Matthew S. Finifter
Matthew S. Finifter
Figma
Verified email at figma.com - Homepage
Title
Cited by
Cited by
Year
A survey of mobile malware in the wild
AP Felt, M Finifter, E Chin, S Hanna, D Wagner
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
11602011
A systematic analysis of xss sanitization in web application frameworks
J Weinberger, P Saxena, D Akhawe, M Finifter, R Shin, D Song
Computer Security–ESORICS 2011, 150-171, 2011
220*2011
How to ask for permission
AP Felt, S Egelman, M Finifter, D Akhawe, D Wagner
HotSec, 0, 2012
1882012
An empirical study of vulnerability rewards programs
M Finifter, D Akhawe, D Wagner
22nd USENIX Security Symposium (USENIX Security 13), 273-288, 2013
1862013
An empirical study on the effectiveness of security code review
A Edmundson, B Holtkamp, E Rivera, M Finifter, A Mettler, D Wagner
Engineering Secure Software and Systems: 5th International Symposium, ESSoS …, 2013
1022013
Blizzard: Fast, cloud-scale block storage for cloud-oblivious applications
J Mickens, EB Nightingale, J Elson, D Gehring, B Fan, A Kadav, ...
11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014
89*2014
Verifiable functional purity in Java
M Finifter, A Mettler, N Sastry, D Wagner
Proceedings of the 15th ACM conference on Computer and communications …, 2008
792008
Preventing capability leaks in secure javascript subsets
M Finifter, J Weinberger, A Barth
Proc. of Network and Distributed System Security Symposium, 2010
682010
Exploring the relationship between web application development tools and security
M Finifter
2nd USENIX Conference on Web Application Development (WebApps 11), 2011
572011
Diesel: Applying privilege separation to database access
AP Felt, M Finifter, J Weinberger, D Wagner
Proceedings of the 6th ACM symposium on information, computer and …, 2011
332011
Product labels for mobile application markets
D Akhawe, M Finifter
Proceedings of Mobile Security Technologies Workshop 24, 2012
32012
Vulnerability Rewards Programs
M Finifter, D Akhawe, D Wagner
Towards Evidence-Based Assessment of Factors Contributing to the …, 0
1
Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities
MS Finifter
University of California, Berkeley, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–13