Name
Affiliation
Papers
DAVID EVANS
University of Virginia
30
Collaborators
Citations 
PageRank 
49
1374
85.14
Referers 
Referees 
References 
2980
810
391
Search Limit
1001000
Title
Citations
PageRank
Year
Stealthy Backdoors as Compression Artifacts00.342022
A Pragmatic Introduction to Secure Multi-Party Computation40.442018
Protecting private web content from embedded scripts90.702011
Measuring Security60.572011
Automated black-box detection of side-channel vulnerabilities in web applications301.192011
Privacy-preserving applications on smartphones300.872011
Guest Editors' Introduction: The Science of Security80.662011
GuardRails: a data-centric web application security framework110.512011
Reverse-engineering a cryptographic RFID tag1009.462008
Hiding In Groups: On The Expressiveness Of Privacy Distributions20.392008
Talking to strangers without taking their candy: isolating proxied content141.352008
The user is not the enemy: fighting malware by tracking user intentions80.682008
Secure and practical defense against code-injection attacks using software dynamic translation421.582006
Perracotta: mining temporal API rules from imperfect traces2129.002006
Quantifying information leakage in tree-based hash protocols (short paper)160.912006
N-variant systems: a secretless framework for security through diversity1233.882006
Inculcating invariants in introductory courses20.522006
Automatically Hardening Web Applications Using Precise Tainting18715.192005
Where's the FEEB? the effectiveness of instruction set randomization746.072005
Toasters, Seat Belts, and Inferring Program Properties00.342005
Second International Workshop on Dynamic Analysis (WODA 2004)00.342004
ICSE 2004 workshop summary second international workshop on dynamic analysis (WODA 2004)200.492004
.NET Security: Lessons Learned and Missed from Java40.532004
Automatically Inferring Temporal Properties for Program Evolution221.562004
Election Security: Perception and Reality161.032004
Pancakes, puzzles, and polynomials: cracking the Cracker Barrel00.342004
Secure aggregation for wireless networks17810.582003
A biological programming model for self-healing210.942003
A biologically inspired programming model for self-healing systems211.032002
Improving security using extensible lightweight static analysis21413.672002