Follow
Steven Hanna
Steven Hanna
Researcher
Verified email at eecs.berkeley.edu
Title
Cited by
Cited by
Year
Android permissions demystified
AP Felt, E Chin, S Hanna, D Song, D Wagner
Proceedings of the 18th ACM conference on Computer and communications …, 2011
21092011
A survey of mobile malware in the wild
AP Felt, M Finifter, E Chin, S Hanna, D Wagner
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
11542011
Permission re-delegation: Attacks and defenses.
AP Felt, HJ Wang, A Moshchuk, S Hanna, E Chin
USENIX security symposium 30, 88, 2011
7652011
A symbolic execution framework for javascript
P Saxena, D Akhawe, S Hanna, F Mao, S McCamant, D Song
2010 IEEE Symposium on Security and Privacy, 513-528, 2010
6102010
Juxtapp: A scalable system for detecting code reuse among android applications
S Hanna, L Huang, E Wu, S Li, C Chen, D Song
Detection of Intrusions and Malware, and Vulnerability Assessment: 9th …, 2013
3192013
FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.
P Saxena, S Hanna, P Poosankam, D Song
NDss, 2010
2052010
Emulating emulation-resistant malware
MG Kang, H Yin, S Hanna, S McCamant, D Song
Proceedings of the 1st ACM workshop on Virtual machine security, 11-22, 2009
1732009
Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices.
S Hanna, R Rolles, A Molina-Markham, P Poosankam, J Blocki, K Fu, ...
HealthSec, 2011
962011
The emperor’s new APIs: On the (in) secure usage of new client-side primitives
S Hanna, R Shin, D Akhawe, A Boehm, P Saxena, D Song
Proceedings of the Web 2, 2010
702010
Hookscout: Proactive binary-centric hook detection
H Yin, P Poosankam, S Hanna, D Song
International Conference on Detection of Intrusions and Malware, and …, 2010
512010
Juxtapp and dstruct: Detection of similarity among android applications
S Li, S Hanna, L Huang, E Wu, C Chen, D Song
EECS Department, University of California, 2012
252012
The Network Endpoint Assessment (NEA) Asokan Attack Analysis
J Salowey, S Hanna
52012
Analysis of August 2003 Follow-up Survey on Obstacles to PKI Deployment and Usage
S Hanna
OASIS PKI Technical Committee, 1October, 2003
42003
TNC: Open standards for network access control
S Hana
Network World Conference & Expo, 2007
32007
The Java Reliable Multicast Service™: A Reliable Multicast Library
S Hanna, M Kadansky, P Rosenzweig
Sun Microsystems Laboratories The First Ten Years, 2001
32001
PB-TNC: A Posture Broker (PB) Protocol Compatible with Trusted Network Connect (TNC)
R Sahita, S Hanna, R Hurst, K Narayan
22010
NEA: Public health for the network
S Hanna, S Thomson
IEEE internet computing 14 (3), 77-80, 2010
12010
RFC 7170: Tunnel Extensible Authentication Protocol (TEAP) Version 1
H Zhou, N Cam-Winget, J Salowey, S Hanna
RFC Editor, 2014
2014
Coenrolment In A Randomized Trial Of High Frequency Oscillation In Ards: Prevalence, Patterns And Predictors
DJ Cook, L Hand, P Austin, Q Zhou, V Danesh, N Adhikari, YM Arabi, ...
B23. CLINICAL TRIALS AND OUTCOMES, A2542-A2542, 2014
2014
EMU Working Group H. Zhou Internet-Draft N. Cam-Winget Intended status: Standards Track J. Salowey Expires: July 13, 2014 Cisco Systems
S Hanna, EAP Tunnel
2014
The system can't perform the operation now. Try again later.
Articles 1–20