Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Akhawe, Devdatta
add a person with the name Akhawe, Devdatta
 

Other publications of authors with the same name

Clickjacking Revisited: A Perceptual View of UI Security., , , , and . WOOT, USENIX Association, (2014)Towards a Formal Foundation of Web Security., , , , and . CSF, page 290-304. IEEE Computer Society, (2010)Privilege Separation in HTML5 Applications., , and . USENIX Security Symposium, page 429-444. USENIX Association, (2012)Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection., , , , and . HotOS, USENIX Association, (2011)A Symbolic Execution Framework for JavaScript., , , , , and . IEEE Symposium on Security and Privacy, page 513-528. IEEE Computer Society, (2010)Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness., and . USENIX Security Symposium, page 257-272. USENIX Association, (2013)pASSWORD tYPOS and How to Correct Them Securely., , , , and . IEEE Symposium on Security and Privacy, page 799-818. IEEE Computer Society, (2016)ASPIRE: Iterative Specification Synthesis for Security., , , , , and . HotOS, USENIX Association, (2015)An Empirical Study of Vulnerability Rewards Programs., , and . USENIX Security Symposium, page 273-288. USENIX Association, (2013)ShadowCrypt: Encrypted Web Applications for Everyone., , , , and . ACM Conference on Computer and Communications Security, page 1028-1039. ACM, (2014)