A symbolic execution framework for javascript P Saxena, D Akhawe, S Hanna, F Mao, S McCamant, D Song 2010 IEEE Symposium on Security and Privacy, 513-528, 2010 | 625 | 2010 |
Alice in warningland: a {Large-Scale} field study of browser security warning effectiveness D Akhawe, AP Felt 22nd USENIX Security Symposium (USENIX Security 13), 257-272, 2013 | 570 | 2013 |
Towards a formal foundation of web security D Akhawe, A Barth, PE Lam, J Mitchell, D Song 2010 23rd IEEE Computer Security Foundations Symposium, 290-304, 2010 | 329 | 2010 |
The {Emperor’s} new password manager: Security analysis of web-based password managers Z Li, W He, D Akhawe, D Song 23rd USENIX Security Symposium (USENIX Security 14), 465-479, 2014 | 243 | 2014 |
A systematic analysis of xss sanitization in web application frameworks J Weinberger, P Saxena, D Akhawe, M Finifter, R Shin, D Song Computer Security–ESORICS 2011, 150-171, 2011 | 221* | 2011 |
How to ask for permission AP Felt, S Egelman, M Finifter, D Akhawe, D Wagner HotSec, 0, 2012 | 189 | 2012 |
An empirical study of vulnerability rewards programs M Finifter, D Akhawe, D Wagner 22nd USENIX Security Symposium (USENIX Security 13), 273-288, 2013 | 187 | 2013 |
Sok: Hate, harassment, and the changing landscape of online abuse K Thomas, D Akhawe, M Bailey, D Boneh, E Bursztein, S Consolvo, ... 2021 IEEE Symposium on Security and Privacy (SP), 247-267, 2021 | 171 | 2021 |
Shadowcrypt: Encrypted web applications for everyone W He, D Akhawe, S Jain, E Shi, D Song Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 153 | 2014 |
Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web D Akhawe, B Amann, M Vallentin, R Sommer Proceedings of the 22nd international conference on World Wide Web, 59-70, 2013 | 136 | 2013 |
Privilege Separation in {HTML5} Applications D Akhawe, P Saxena, D Song 21st USENIX Security Symposium (USENIX Security 12), 429-444, 2012 | 76 | 2012 |
pASSWORD tYPOS and how to correct them securely R Chatterjee, A Athayle, D Akhawe, A Juels, T Ristenpart 2016 IEEE Symposium on Security and Privacy (SP), 799-818, 2016 | 73 | 2016 |
The emperor’s new APIs: On the (in) secure usage of new client-side primitives S Hanna, ECR Shin, D Akhawe, A Boehm, P Saxena, D Song Web 2.0 Security and Privacy Worskhop (W2SP), 2010 | 69 | 2010 |
Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection P Maniatis, D Akhawe, K Fall, E Shi, S McCamant, D Song Proceedings of the 13th USENIX conference on Hot topics in operating systems …, 2011 | 65 | 2011 |
Clickjacking Revisited A Perceptual View of UI Security D Akhawe, W He, Z Li, R Moazzezi, D Song Proceedings of the 8th USENIX conference on Offensive Technologies, 1-1, 2014 | 45 | 2014 |
Hopper: Modeling and detecting lateral movement G Ho, M Dhiman, D Akhawe, V Paxson, S Savage, GM Voelker, D Wagner 30th USENIX Security Symposium (USENIX Security 21), 3093-3110, 2021 | 38 | 2021 |
Data-confined HTML5 applications D Akhawe, F Li, W He, P Saxena, D Song Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 32 | 2013 |
Cracking shadowcrypt: Exploring the limitations of secure I/O systems in internet browsers M Freyberger, W He, D Akhawe, ML Mazurek, P Mittal Proceedings on Privacy Enhancing Technologies, 2018 | 14 | 2018 |
{ASPIRE}: Iterative Specification Synthesis for Security K Chen, W He, D Akhawe, V D'Silva, P Mittal, D Song 15th Workshop on Hot Topics in Operating Systems (HotOS XV), 2015 | 4 | 2015 |
Product labels for mobile application markets D Akhawe, M Finifter Proceedings of Mobile Security Technologies Workshop 24, 2012 | 3 | 2012 |