Devdatta Akhawe
Devdatta Akhawe
Figma, Inc.
Verified email at - Homepage
Cited by
Cited by
A symbolic execution framework for javascript
P Saxena, D Akhawe, S Hanna, F Mao, S McCamant, D Song
2010 IEEE Symposium on Security and Privacy, 513-528, 2010
Alice in warningland: a {Large-Scale} field study of browser security warning effectiveness
D Akhawe, AP Felt
22nd USENIX Security Symposium (USENIX Security 13), 257-272, 2013
Towards a formal foundation of web security
D Akhawe, A Barth, PE Lam, J Mitchell, D Song
2010 23rd IEEE Computer Security Foundations Symposium, 290-304, 2010
The {Emperor’s} new password manager: Security analysis of web-based password managers
Z Li, W He, D Akhawe, D Song
23rd USENIX Security Symposium (USENIX Security 14), 465-479, 2014
A systematic analysis of xss sanitization in web application frameworks
J Weinberger, P Saxena, D Akhawe, M Finifter, R Shin, D Song
Computer Security–ESORICS 2011, 150-171, 2011
How to ask for permission
AP Felt, S Egelman, M Finifter, D Akhawe, D Wagner
HotSec, 0, 2012
An empirical study of vulnerability rewards programs
M Finifter, D Akhawe, D Wagner
22nd USENIX Security Symposium (USENIX Security 13), 273-288, 2013
Shadowcrypt: Encrypted web applications for everyone
W He, D Akhawe, S Jain, E Shi, D Song
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Sok: Hate, harassment, and the changing landscape of online abuse
K Thomas, D Akhawe, M Bailey, D Boneh, E Bursztein, S Consolvo, ...
2021 IEEE Symposium on Security and Privacy (SP), 247-267, 2021
Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web
D Akhawe, B Amann, M Vallentin, R Sommer
Proceedings of the 22nd international conference on World Wide Web, 59-70, 2013
Privilege Separation in {HTML5} Applications
D Akhawe, P Saxena, D Song
21st USENIX Security Symposium (USENIX Security 12), 429-444, 2012
pASSWORD tYPOS and how to correct them securely
R Chatterjee, A Athayle, D Akhawe, A Juels, T Ristenpart
2016 IEEE Symposium on Security and Privacy (SP), 799-818, 2016
The emperor’s new APIs: On the (in) secure usage of new client-side primitives
S Hanna, ECR Shin, D Akhawe, A Boehm, P Saxena, D Song
Web 2.0 Security and Privacy Worskhop (W2SP), 2010
Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection
P Maniatis, D Akhawe, K Fall, E Shi, S McCamant, D Song
Proceedings of the 13th USENIX conference on Hot topics in operating systems …, 2011
Clickjacking Revisited A Perceptual View of UI Security
D Akhawe, W He, Z Li, R Moazzezi, D Song
Proceedings of the 8th USENIX conference on Offensive Technologies, 1-1, 2014
Data-confined HTML5 applications
D Akhawe, F Li, W He, P Saxena, D Song
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
Hopper: Modeling and detecting lateral movement
G Ho, M Dhiman, D Akhawe, V Paxson, S Savage, GM Voelker, D Wagner
30th USENIX Security Symposium (USENIX Security 21), 3093-3110, 2021
Cracking shadowcrypt: Exploring the limitations of secure I/O systems in internet browsers
M Freyberger, W He, D Akhawe, ML Mazurek, P Mittal
Proceedings on Privacy Enhancing Technologies, 2018
{ASPIRE}: Iterative Specification Synthesis for Security
K Chen, W He, D Akhawe, V D'Silva, P Mittal, D Song
15th Workshop on Hot Topics in Operating Systems (HotOS XV), 2015
Product labels for mobile application markets
D Akhawe, M Finifter
Proceedings of Mobile Security Technologies Workshop 24, 2012
The system can't perform the operation now. Try again later.
Articles 1–20