James Newsome

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

12EEDawn Xiaodong Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena: BitBlaze: A New Approach to Computer Security via Binary Analysis. ICISS 2008: 1-25
11EEDavid Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin: Automatically Identifying Trigger-based Behavior in Malware. Botnet Detection 2008: 65-88
10EEDavid Brumley, James Newsome, D. Song, Hao Wang, Somesh Jha: Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures. IEEE Trans. Dependable Sec. Comput. 5(4): 224-241 (2008)
9EEJoseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song: Sweeper: a lightweight end-to-end system for defending against fast worms. EuroSys 2007: 115-128
8EEJames Newsome, David Brumley, Jason Franklin, Dawn Xiaodong Song: Replayer: automatic protocol replay by binary analysis. ACM Conference on Computer and Communications Security 2006: 311-321
7EEDavid Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha: Towards Automatic Generation of Vulnerability-Based Signatures. IEEE Symposium on Security and Privacy 2006: 2-16
6EEJames Newsome, David Brumley, Dawn Xiaodong Song: Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. NDSS 2006
5EEJames Newsome, Brad Karp, Dawn Xiaodong Song: Paragraph: Thwarting Signature Learning by Training Maliciously. RAID 2006: 81-105
4EEJames Newsome, Brad Karp, Dawn Xiaodong Song: Polygraph: Automatically Generating Signatures for Polymorphic Worms. IEEE Symposium on Security and Privacy 2005: 226-241
3EEJames Newsome, Dawn Xiaodong Song: Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. NDSS 2005
2EEJames Newsome, Elaine Shi, Dawn Xiaodong Song, Adrian Perrig: The sybil attack in sensor networks: analysis & defenses. IPSN 2004: 259-268
1EEJames Newsome, Dawn Xiaodong Song: GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information. SenSys 2003: 76-88

Coauthor Index

1David Brumley [6] [7] [8] [9] [10] [11] [12]
2Juan Caballero [12]
3Jason Franklin [8]
4Cody Hartwig [11]
5Chengdu Huang [9]
6Ivan Jager [12]
7Somesh Jha [7] [10]
8Min Gyung Kang [12]
9Brad Karp [4] [5]
10Zhenkai Liang [11] [12]
11Shan Lu [9]
12Adrian Perrig [2]
13Pongsin Poosankam [12]
14Prateek Saxena [12]
15Elaine Shi [2]
16D. Song [10]
17Dawn Xiaodong Song [1] [2] [3] [4] [5] [6] [7] [8] [9] [11] [12]
18Joseph Tucek [9]
19Hao Wang [7] [10]
20Spiros Xanthos [9]
21Heng Yin [11] [12]
22Yuanyuan Zhou [9]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)