Marco Pistoia
Marco Pistoia
Head of Research and Engineering, JPMorgan Chase & Co.
Verified email at - Homepage
Cited by
Cited by
TAJ: effective taint analysis of web applications
O Tripp, M Pistoia, SJ Fink, M Sridharan, O Weisman
Proceedings of the 2009 ACM SIGPLAN Conference on Programming Languages …, 2009
Qiskit: An open-source framework for quantum computing
G Aleksandrowicz, T Alexander, P Barkoutsos, L Bello, Y Ben-Haim, ...
Accessed on: Mar 16, 2019
Static specification mining using automata-based abstractions
S Shoham, E Yahav, SJ Fink, M Pistoia
IEEE Transactions on Software Engineering 34 (5), 651-666, 2008
Method, system and computer program product for enforcing privacy policies
L Koved, M Pistoia
US Patent 7,877,812, 2011
Directed test generation for effective fault localization
S Artzi, J Dolby, F Tip, M Pistoia
Proceedings of the 19th international symposium on Software testing and …, 2010
Saving the world wide web from vulnerable JavaScript
S Guarnieri, M Pistoia, O Tripp, J Dolby, S Teilhet, R Berg
Proceedings of the 2011 International Symposium on Software Testing and …, 2011
Andromeda: Accurate and Scalable Security Analysis of Web Applications
O Tripp, M Pistoia, P Cousot, R Cousot, S Guarnieri
International Conference on Fundamental Approaches to Software Engineering …, 2013
System and method for supporting digital rights management in an enhanced Java™ 2 runtime environment
L Koved, MM Mourad, JP Munson, G Pacifici, M Pistoia, AS Youssef
US Patent 7,308,717, 2007
Access rights analysis for Java
L Koved, M Pistoia, A Kershenbaum
Proceedings of the 2002 ACM SIGPLAN Conference on Object-Oriented …, 2002
Practical fault localization for dynamic web applications
S Artzi, J Dolby, F Tip, M Pistoia
2010 ACM/IEEE 32nd International Conference on Software Engineering 1, 265-274, 2010
A survey of static analysis methods for identifying security vulnerabilities in software systems
M Pistoia, S Chandra, SJ Fink, E Yahav
IBM Systems Journal 46 (2), 265-288, 2007
Automatic detection of inter-application permission leaks in android applications
D Sbīrlea, MG Burke, S Guarnieri, M Pistoia, V Sarkar
IBM Journal of Research and Development 57 (6), 10: 1-10: 12, 2013
F4F: taint analysis of framework-based web applications
M Sridharan, S Artzi, M Pistoia, S Guarnieri, O Tripp, R Berg
Proceedings of the 2011 ACM international conference on Object oriented …, 2011
Software verification system, method and computer program element
PH Abbott, L Koved, AJ Nadalin, M Pistoia
US Patent 7,496,757, 2009
Path-and index-sensitive string analysis based on monadic second-order logic
T Tateishi, M Pistoia, O Tripp
ACM Transactions on Software Engineering and Methodology (TOSEM) 22 (4), 1-33, 2013
Transparent digital rights management for extendible content viewers
MM Mourad, JP Munson, T Nadeem, G Pacifici, M Pistoia, AS Youssef
US Patent 7,171,558, 2007
Interprocedural analysis for privileged code placement and tainted variable detection
M Pistoia, RJ Flynn, L Koved, VC Sreedhar
European Conference on Object-Oriented Programming, 362-386, 2005
Static analysis based error reduction for software applications
B Alpern, R Johnson, A Kershenbaum, L Koved, G Leeman, M Pistoia, ...
US Patent App. 10/620,078, 2005
Dynamic detection of inter-application communication vulnerabilities in Android
R Hay, O Tripp, M Pistoia
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
Beyond stack inspection: A unified access-control and information-flow security model
M Pistoia, A Banerjee, DA Naumann
2007 IEEE Symposium on Security and Privacy (SP'07), 149-163, 2007
The system can't perform the operation now. Try again later.
Articles 1–20