Munawar Hafiz
Title
Cited by
Cited by
Year
Organizing security patterns
M Hafiz, P Adamczyk, RE Johnson
IEEE software 24 (4), 52-60, 2007
1472007
Energy profiles of java collections classes
S Hasan, Z King, M Hafiz, M Sayagh, B Adams, A Hindle
Proceedings of the 38th International Conference on Software Engineering …, 2016
922016
A collection of privacy design patterns
M Hafiz
Proceedings of the 2006 conference on Pattern languages of programs, 1-13, 2006
892006
Growing a pattern language (for security)
M Hafiz, P Adamczyk, RE Johnson
Proceedings of the ACM international symposium on New ideas, new paradigms …, 2012
722012
Program transformations to fix C integers
Z Coker, M Hafiz
2013 35th International Conference on Software Engineering (ICSE), 792-801, 2013
672013
Rest and web services: In theory and in practice
P Adamczyk, PH Smith, RE Johnson, M Hafiz
REST: from research to practice, 35-57, 2011
652011
R2Fix: Automatically generating bug fixes from bug reports
C Liu, J Yang, L Tan, M Hafiz
2013 IEEE Sixth International Conference on Software Testing, Verification …, 2013
642013
A pattern language for developing privacy enhancing technologies
M Hafiz
Software: Practice and Experience 43 (7), 769-787, 2013
622013
Identifying the characteristics of vulnerable code changes: An empirical study
A Bosu, JC Carver, M Hafiz, P Hilley, D Janni
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014
522014
Systematic testing of refactoring engines on real software projects
M Gligoric, F Behrang, Y Li, J Overbey, M Hafiz, D Marinov
European Conference on Object-Oriented Programming, 629-653, 2013
472013
Multiple design patterns for voice over IP (VoIP) security
Z Anwar, W Yurcik, RE Johnson, M Hafiz, RH Campbell
2006 IEEE International Performance Computing and Communications Conference …, 2006
372006
Security patterns and their classification schemes
M Hafiz, RE Johnson
University of Illinois at Urbana-Champaign Department of Computer Science …, 2006
312006
The security architecture of qmail
M Hafiz, R Johnson, R Afandi
Proceedings of the 11th Conference on Patterns Language of Programming (PLoP’04), 2004
312004
Game of detections: how are security vulnerabilities discovered in the wild?
M Hafiz, M Fang
Empirical Software Engineering 21 (5), 1920-1959, 2016
292016
Systematically eradicating data injection attacks using security-oriented program transformations
M Hafiz, P Adamczyk, R Johnson
International Symposium on Engineering Secure Software and Systems, 75-90, 2009
262009
Evolution of the MTA architecture: The impact of security
M Hafiz, RE Johnson
Software: Practice and Experience 38 (15), 1569-1599, 2008
242008
Security on demand
M Hafiz
University of Illinois at Urbana-Champaign, 2011
202011
Improving perimeter security with security-oriented program transformations
M Hafiz, RE Johnson
2009 ICSE Workshop on Software Engineering for Secure Systems, 61-67, 2009
182009
Discovering buffer overflow vulnerabilities in the wild: an empirical study
M Fang, M Hafiz
Proceedings of the 8th ACM/IEEE International Symposium on Empirical …, 2014
162014
Automatically fixing c buffer overflows using program transformations
A Shaw, D Doggett, M Hafiz
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
152014
The system can't perform the operation now. Try again later.
Articles 1–20