default search action
Munawar Hafiz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j7]Jeffrey L. Overbey, Ralph E. Johnson, Munawar Hafiz:
Differential precondition checking: a language-independent, reusable analysis for refactoring engines. Autom. Softw. Eng. 23(1): 77-104 (2016) - [j6]Munawar Hafiz, Ming Fang:
Game of detections: how are security vulnerabilities discovered in the wild? Empir. Softw. Eng. 21(5): 1920-1959 (2016) - [j5]Munawar Hafiz, Samir Hasan, Zachary King, Allen Wirfs-Brock:
Growing a language: An empirical study on how (and why) developers use some recently-introduced and/or recently-evolving JavaScript features. J. Syst. Softw. 121: 191-208 (2016) - [c27]Benjamin Fogel, Shane Farmer, Hamza Alkofahi, Anthony Skjellum, Munawar Hafiz:
POODLEs, More POODLEs, FREAK Attacks Too: How Server Administrators Responded to Three Serious Web Vulnerabilities. ESSoS 2016: 122-137 - [c26]Samir Hasan, Zachary King, Munawar Hafiz, Mohammed Sayagh, Bram Adams, Abram Hindle:
Energy profiles of Java collections classes. ICSE 2016: 225-236 - [c25]Nawrin Sultana, Justin Middleton, Jeffrey Overbey, Munawar Hafiz:
Understanding and fixing multiple language interoperability issues: the C/Fortran case. ICSE 2016: 772-783 - 2015
- [j4]Munawar Hafiz, Jeffrey Overbey:
Refactoring Myths. IEEE Softw. 32(6): 39-43 (2015) - 2014
- [c24]Sharath Chowdary Gude, Munawar Hafiz, Allen Wirfs-Brock:
JavaScript: The Used Parts. COMPSAC 2014: 466-475 - [c23]Alex Shaw, Dusten Doggett, Munawar Hafiz:
Automatically Fixing C Buffer Overflows Using Program Transformations. DSN 2014: 124-135 - [c22]Ming Fang, Munawar Hafiz:
Discovering buffer overflow vulnerabilities in the wild: an empirical study. ESEM 2014: 23:1-23:10 - [c21]Amiangshu Bosu, Jeffrey C. Carver, Munawar Hafiz, Patrick Hilley, Derek Janni:
When Are OSS Developers More Likely to Introduce Vulnerable Code Changes? A Case Study. OSS 2014: 234-236 - [c20]Jeffrey L. Overbey, Farnaz Behrang, Munawar Hafiz:
A foundation for refactoring C with macros. SIGSOFT FSE 2014: 75-85 - [c19]Amiangshu Bosu, Jeffrey C. Carver, Munawar Hafiz, Patrick Hilley, Derek Janni:
Identifying the characteristics of vulnerable code changes: an empirical study. SIGSOFT FSE 2014: 257-268 - 2013
- [j3]Munawar Hafiz:
A pattern language for developing privacy enhancing technologies. Softw. Pract. Exp. 43(7): 769-787 (2013) - [c18]Milos Gligoric, Farnaz Behrang, Yilong Li, Jeffrey Overbey, Munawar Hafiz, Darko Marinov:
Systematic Testing of Refactoring Engines on Real Software Projects. ECOOP 2013: 629-653 - [c17]Zack Coker, Munawar Hafiz:
Program transformations to fix C integers. ICSE 2013: 792-801 - [c16]Chen Liu, Jinqiu Yang, Lin Tan, Munawar Hafiz:
R2Fix: Automatically Generating Bug Fixes from Bug Reports. ICST 2013: 282-291 - [c15]Munawar Hafiz, Jeffrey Overbey, Farnaz Behrang, Jillian Hall:
OpenRefactory/C: an infrastructure for building correct and complex C transformations. WRT@SPLASH 2013: 1-4 - 2012
- [c14]Munawar Hafiz, Jeffrey Overbey:
OpenRefactory/C: an infrastructure for developing program transformations for C programs. SPLASH 2012: 27-28 - [c13]Munawar Hafiz, Paul Adamczyk:
The nature of order: from security patterns to a pattern language. SPLASH 2012: 75-76 - [c12]Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson:
Growing a pattern language (for security). Onward! 2012: 139-158 - 2011
- [c11]Munawar Hafiz:
An 'explicit type enforcement' program transformation tool for preventing integer vulnerabiliites. OOPSLA Companion 2011: 21-22 - [c10]Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson:
Patterns Transform Architectures. WICSA 2011: 242-251 - [p1]Paul Adamczyk, Patrick H. Smith, Ralph E. Johnson, Munawar Hafiz:
REST and Web Services: In Theory and in Practice. REST: From Research to Practice 2011: 35-57 - 2010
- [b1]Munawar Hafiz:
Security on demand. University of Illinois Urbana-Champaign, USA, 2010 - [c9]Paul Adamczyk, Munawar Hafiz:
The Tower of Babel did not fail. OOPSLA 2010: 947-957
2000 – 2009
- 2009
- [c8]Munawar Hafiz, Ralph E. Johnson:
Security-oriented program transformations. CSIIRW 2009: 12 - [c7]Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson:
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations. ESSoS 2009: 75-90 - [c6]Munawar Hafiz, Ralph E. Johnson:
Improving perimeter security with security-oriented program transformations. SESS@ICSE 2009: 61-67 - 2008
- [j2]Munawar Hafiz, Ralph E. Johnson:
Evolution of the MTA architecture: the impact of security. Softw. Pract. Exp. 38(15): 1569-1599 (2008) - [c5]Munawar Hafiz, Ralph Johnson:
A security oriented program transformation to "add on" policies to prevent injection attacks. WRT@OOPSLA 2008: 12 - [c4]Munawar Hafiz:
Security oriented program transformations (or how to add security on demand). OOPSLA Companion 2008: 927-928 - 2007
- [j1]Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson:
Organizing Security Patterns. IEEE Softw. 24(4): 52-60 (2007) - 2006
- [c3]Raja Afandi, Jianqing Zhang, Munawar Hafiz, Carl A. Gunter:
AMPol: Adaptive Messaging Policy. ECOWS 2006: 53-64 - [c2]Zahid Anwar, William Yurcik, Ralph E. Johnson, Munawar Hafiz, Roy H. Campbell:
Multiple design patterns for voice over IP (VoIP) security. IPCCC 2006 - 2005
- [c1]Munawar Hafiz:
Security patterns and evolution of MTA architecture. OOPSLA Companion 2005: 142-143
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint