Munawar Hafiz
Cited by
Cited by
Organizing security patterns
M Hafiz, P Adamczyk, RE Johnson
IEEE software 24 (4), 52-60, 2007
Energy profiles of java collections classes
S Hasan, Z King, M Hafiz, M Sayagh, B Adams, A Hindle
Proceedings of the 38th International Conference on Software Engineering …, 2016
R2Fix: Automatically generating bug fixes from bug reports
C Liu, J Yang, L Tan, M Hafiz
2013 IEEE Sixth international conference on software testing, verification …, 2013
Identifying the characteristics of vulnerable code changes: An empirical study
A Bosu, JC Carver, M Hafiz, P Hilley, D Janni
Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014
A collection of privacy design patterns
M Hafiz
Proceedings of the 2006 conference on Pattern languages of programs, 1-13, 2006
Growing a pattern language (for security)
M Hafiz, P Adamczyk, RE Johnson
Proceedings of the ACM international symposium on New ideas, new paradigms …, 2012
Rest and web services: In theory and in practice
P Adamczyk, PH Smith, RE Johnson, M Hafiz
REST: from research to practice, 35-57, 2011
Program transformations to fix C integers
Z Coker, M Hafiz
2013 35th International Conference on Software Engineering (ICSE), 792-801, 2013
A pattern language for developing privacy enhancing technologies
M Hafiz
Software: Practice and Experience 43 (7), 769-787, 2013
Systematic testing of refactoring engines on real software projects
M Gligoric, F Behrang, Y Li, J Overbey, M Hafiz, D Marinov
ECOOP 2013–Object-Oriented Programming: 27th European Conference …, 2013
Game of detections: how are security vulnerabilities discovered in the wild?
M Hafiz, M Fang
Empirical Software Engineering 21, 1920-1959, 2016
Multiple design patterns for voice over IP (VoIP) security
Z Anwar, W Yurcik, RE Johnson, M Hafiz, RH Campbell
2006 IEEE International Performance Computing and Communications Conference …, 2006
The security architecture of qmail
M Hafiz, R Johnson, R Afandi
Proceedings of the 11th Conference on Patterns Language of Programming (PLoP’04), 2004
Security patterns and their classification schemes
M Hafiz, RE Johnson
University of Illinois at Urbana-Champaign Department of Computer Science …, 2006
Discovering buffer overflow vulnerabilities in the wild: an empirical study
M Fang, M Hafiz
Proceedings of the 8th ACM/IEEE International Symposium on Empirical …, 2014
Automatically fixing c buffer overflows using program transformations
A Shaw, D Doggett, M Hafiz
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
Evolution of the MTA architecture: The impact of security
M Hafiz, RE Johnson
Software: Practice and Experience 38 (15), 1569-1599, 2008
Systematically eradicating data injection attacks using security-oriented program transformations
M Hafiz, P Adamczyk, R Johnson
Engineering Secure Software and Systems: First International Symposium ESSoS …, 2009
Security on demand
M Hafiz
University of Illinois at Urbana-Champaign, 2010
Improving perimeter security with security-oriented program transformations
M Hafiz, RE Johnson
2009 ICSE Workshop on Software Engineering for Secure Systems, 61-67, 2009
The system can't perform the operation now. Try again later.
Articles 1–20