Name
Affiliation
Papers
MUNAWAR HAFIZ
Univ. of Illinois, Urbana, IL, USA|c|
26
Collaborators
Citations 
PageRank 
35
224
15.40
Referers 
Referees 
References 
529
764
388
Search Limit
100764
Title
Citations
PageRank
Year
Understanding and fixing multiple language interoperability issues: the C/Fortran case.00.342016
Growing a language: An empirical study on how (and why) developers use some recently-introduced and/or recently-evolving JavaScript features.10.362016
Energy profiles of Java collections classes.361.062016
POODLEs, More POODLEs, FREAK Attacks Too: How Server Administrators Responded to Three Serious Web Vulnerabilities.00.342016
Differential precondition checking: a language-independent, reusable analysis for refactoring engines00.342016
Refactoring Myths.00.342015
When Are OSS Developers More Likely to Introduce Vulnerable Code Changes? A Case Study.10.352014
Identifying the characteristics of vulnerable code changes: an empirical study210.812014
A foundation for refactoring C with macros30.382014
OpenRefactory/C: an infrastructure for building correct and complex C transformations.70.502013
Systematic testing of refactoring engines on real software projects140.602013
A pattern language for developing privacy enhancing technologies.201.002013
Program transformations to fix C integers300.812013
R2Fix: Automatically Generating Bug Fixes from Bug Reports270.742013
OpenRefactory/C: an infrastructure for developing program transformations for C programs50.602012
The nature of order: from security patterns to a pattern language10.372012
Growing a pattern language (for security)241.682012
An 'explicit type enforcement' program transformation tool for preventing integer vulnerabiliites10.472011
Patterns Transform Architectures10.352011
Security-oriented program transformations10.352009
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations100.862009
Evolution of the MTA architecture: the impact of security91.012008
A security oriented program transformation to "add on" policies to prevent injection attacks.20.402008
Security oriented program transformations (or how to add security on demand)40.462008
AMPol: Adaptive Messaging Policy30.422006
Security patterns and evolution of MTA architecture30.472005