2008 |
12 | EE | Dawn Xiaodong Song,
David Brumley,
Heng Yin,
Juan Caballero,
Ivan Jager,
Min Gyung Kang,
Zhenkai Liang,
James Newsome,
Pongsin Poosankam,
Prateek Saxena:
BitBlaze: A New Approach to Computer Security via Binary Analysis.
ICISS 2008: 1-25 |
11 | EE | David Brumley,
Cody Hartwig,
Zhenkai Liang,
James Newsome,
Dawn Xiaodong Song,
Heng Yin:
Automatically Identifying Trigger-based Behavior in Malware.
Botnet Detection 2008: 65-88 |
10 | EE | David Brumley,
James Newsome,
D. Song,
Hao Wang,
Somesh Jha:
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.
IEEE Trans. Dependable Sec. Comput. 5(4): 224-241 (2008) |
2007 |
9 | EE | Joseph Tucek,
James Newsome,
Shan Lu,
Chengdu Huang,
Spiros Xanthos,
David Brumley,
Yuanyuan Zhou,
Dawn Xiaodong Song:
Sweeper: a lightweight end-to-end system for defending against fast worms.
EuroSys 2007: 115-128 |
2006 |
8 | EE | James Newsome,
David Brumley,
Jason Franklin,
Dawn Xiaodong Song:
Replayer: automatic protocol replay by binary analysis.
ACM Conference on Computer and Communications Security 2006: 311-321 |
7 | EE | David Brumley,
James Newsome,
Dawn Xiaodong Song,
Hao Wang,
Somesh Jha:
Towards Automatic Generation of Vulnerability-Based Signatures.
IEEE Symposium on Security and Privacy 2006: 2-16 |
6 | EE | James Newsome,
David Brumley,
Dawn Xiaodong Song:
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.
NDSS 2006 |
5 | EE | James Newsome,
Brad Karp,
Dawn Xiaodong Song:
Paragraph: Thwarting Signature Learning by Training Maliciously.
RAID 2006: 81-105 |
2005 |
4 | EE | James Newsome,
Brad Karp,
Dawn Xiaodong Song:
Polygraph: Automatically Generating Signatures for Polymorphic Worms.
IEEE Symposium on Security and Privacy 2005: 226-241 |
3 | EE | James Newsome,
Dawn Xiaodong Song:
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
NDSS 2005 |
2004 |
2 | EE | James Newsome,
Elaine Shi,
Dawn Xiaodong Song,
Adrian Perrig:
The sybil attack in sensor networks: analysis & defenses.
IPSN 2004: 259-268 |
2003 |
1 | EE | James Newsome,
Dawn Xiaodong Song:
GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information.
SenSys 2003: 76-88 |