| 2009 |
| 59 | EE | John Bethencourt,
Dawn Xiaodong Song,
Brent Waters:
New Techniques for Private Stream Searching.
ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
| 58 | EE | Debin Gao,
Michael K. Reiter,
Dawn Xiaodong Song:
Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance.
IEEE Trans. Dependable Sec. Comput. 6(2): 96-110 (2009) |
| 2008 |
| 57 | EE | Debin Gao,
Michael K. Reiter,
Dawn Xiaodong Song:
BinHunt: Automatically Finding Semantic Differences in Binary Programs.
ICICS 2008: 238-255 |
| 56 | EE | Dawn Xiaodong Song,
David Brumley,
Heng Yin,
Juan Caballero,
Ivan Jager,
Min Gyung Kang,
Zhenkai Liang,
James Newsome,
Pongsin Poosankam,
Prateek Saxena:
BitBlaze: A New Approach to Computer Security via Binary Analysis.
ICISS 2008: 1-25 |
| 55 | EE | David Brumley,
Pongsin Poosankam,
Dawn Xiaodong Song,
Jiang Zheng:
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications.
IEEE Symposium on Security and Privacy 2008: 143-157 |
| 54 | EE | David Brumley,
Cody Hartwig,
Zhenkai Liang,
James Newsome,
Dawn Xiaodong Song,
Heng Yin:
Automatically Identifying Trigger-based Behavior in Malware.
Botnet Detection 2008: 65-88 |
| 2007 |
| 53 | EE | Heng Yin,
Dawn Xiaodong Song,
Manuel Egele,
Christopher Kruegel,
Engin Kirda:
Panorama: capturing system-wide information flow for malware detection and analysis.
ACM Conference on Computer and Communications Security 2007: 116-127 |
| 52 | EE | Juan Caballero,
Heng Yin,
Zhenkai Liang,
Dawn Xiaodong Song:
Polyglot: automatic extraction of protocol message format using dynamic binary analysis.
ACM Conference on Computer and Communications Security 2007: 317-329 |
| 51 | EE | Giuseppe Ateniese,
Randal C. Burns,
Reza Curtmola,
Joseph Herring,
Lea Kissner,
Zachary N. J. Peterson,
Dawn Xiaodong Song:
Provable data possession at untrusted stores.
ACM Conference on Computer and Communications Security 2007: 598-609 |
| 50 | EE | David Brumley,
Hao Wang,
Somesh Jha,
Dawn Xiaodong Song:
Creating Vulnerability Signatures Using Weakest Preconditions.
CSF 2007: 311-325 |
| 49 | EE | Min Gyung Kang,
Juan Caballero,
Dawn Xiaodong Song:
Distributed Evasive Scan Techniques and Countermeasures.
DIMVA 2007: 157-174 |
| 48 | EE | Joseph Tucek,
James Newsome,
Shan Lu,
Chengdu Huang,
Spiros Xanthos,
David Brumley,
Yuanyuan Zhou,
Dawn Xiaodong Song:
Sweeper: a lightweight end-to-end system for defending against fast worms.
EuroSys 2007: 115-128 |
| 47 | EE | Elaine Shi,
John Bethencourt,
Hubert T.-H. Chan,
Dawn Xiaodong Song,
Adrian Perrig:
Multi-Dimensional Range Query over Encrypted Data.
IEEE Symposium on Security and Privacy 2007: 350-364 |
| 46 | EE | Shobha Venkataraman,
Juan Caballero,
Pongsin Poosankam,
Min Gyung Kang,
Dawn Xiaodong Song:
Fig: Automatic Fingerprint Generation.
NDSS 2007 |
| 45 | EE | David Brumley,
Dawn Xiaodong Song,
Tzi-cker Chiueh,
Rob Johnson,
Huijia Lin:
RICH: Automatically Protecting Against Integer-Based Vulnerabilities.
NDSS 2007 |
| 44 | EE | Manuel Egele,
Christopher Kruegel,
Engin Kirda,
Heng Yin,
Dawn Xiaodong Song:
Dynamic Spyware Analysis.
USENIX Annual Technical Conference 2007: 233-246 |
| 43 | EE | Haowen Chan,
Adrian Perrig,
Bartosz Przydatek,
Dawn Xiaodong Song:
SIA: Secure information aggregation in sensor networks.
Journal of Computer Security 15(1): 69-102 (2007) |
| 2006 |
| 42 | EE | Haowen Chan,
Adrian Perrig,
Dawn Xiaodong Song:
Secure hierarchical in-network aggregation in sensor networks.
ACM Conference on Computer and Communications Security 2006: 278-287 |
| 41 | EE | James Newsome,
David Brumley,
Jason Franklin,
Dawn Xiaodong Song:
Replayer: automatic protocol replay by binary analysis.
ACM Conference on Computer and Communications Security 2006: 311-321 |
| 40 | EE | David Brumley,
Li-Hao Liu,
Pongsin Poosankam,
Dawn Xiaodong Song:
Design space and analysis of worm defense strategies.
ASIACCS 2006: 125-137 |
| 39 | EE | John Bethencourt,
Dawn Xiaodong Song,
Brent Waters:
New Constructions and Practical Applications for Private Stream Searching (Extended Abstract).
IEEE Symposium on Security and Privacy 2006: 132-139 |
| 38 | EE | David Brumley,
James Newsome,
Dawn Xiaodong Song,
Hao Wang,
Somesh Jha:
Towards Automatic Generation of Vulnerability-Based Signatures.
IEEE Symposium on Security and Privacy 2006: 2-16 |
| 37 | EE | James Newsome,
David Brumley,
Dawn Xiaodong Song:
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.
NDSS 2006 |
| 36 | EE | Debin Gao,
Michael K. Reiter,
Dawn Xiaodong Song:
Behavioral Distance Measurement Using Hidden Markov Models.
RAID 2006: 19-40 |
| 35 | EE | James Newsome,
Brad Karp,
Dawn Xiaodong Song:
Paragraph: Thwarting Signature Learning by Training Maliciously.
RAID 2006: 81-105 |
| 2005 |
| 34 | EE | Lea Kissner,
Dawn Xiaodong Song:
Privacy-Preserving Set Operations.
CRYPTO 2005: 241-257 |
| 33 | EE | James Newsome,
Brad Karp,
Dawn Xiaodong Song:
Polygraph: Automatically Generating Signatures for Polymorphic Worms.
IEEE Symposium on Security and Privacy 2005: 226-241 |
| 32 | EE | Mihai Christodorescu,
Somesh Jha,
Sanjit A. Seshia,
Dawn Xiaodong Song,
Randal E. Bryant:
Semantics-Aware Malware Detection.
IEEE Symposium on Security and Privacy 2005: 32-46 |
| 31 | EE | Abraham Yaar,
Adrian Perrig,
Dawn Xiaodong Song:
FIT: fast Internet traceback.
INFOCOM 2005: 1395-1406 |
| 30 | EE | James Newsome,
Dawn Xiaodong Song:
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
NDSS 2005 |
| 29 | EE | Shobha Venkataraman,
Dawn Xiaodong Song,
Phillip B. Gibbons,
Avrim Blum:
New Streaming Algorithms for Fast Detection of Superspreaders.
NDSS 2005 |
| 28 | EE | Debin Gao,
Michael K. Reiter,
Dawn Xiaodong Song:
Behavioral Distance for Intrusion Detection.
RAID 2005: 63-81 |
| 2004 |
| 27 | EE | Debin Gao,
Michael K. Reiter,
Dawn Xiaodong Song:
Gray-box extraction of execution graphs for anomaly detection.
ACM Conference on Computer and Communications Security 2004: 318-329 |
| 26 | EE | Lea Kissner,
Alina Oprea,
Michael K. Reiter,
Dawn Xiaodong Song,
Ke Yang:
Private Keyword-Based Push and Pull with Applications to Anonymous Communication.
ACNS 2004: 16-30 |
| 25 | EE | Cynthia Wong,
Chenxi Wang,
Dawn Xiaodong Song,
Stan Bielski,
Gregory R. Ganger:
Dynamic Quarantine of Internet Worms.
DSN 2004: 73-82 |
| 24 | EE | Abraham Yaar,
Adrian Perrig,
Dawn Xiaodong Song:
SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks.
IEEE Symposium on Security and Privacy 2004: 130- |
| 23 | EE | James Newsome,
Elaine Shi,
Dawn Xiaodong Song,
Adrian Perrig:
The sybil attack in sensor networks: analysis & defenses.
IPSN 2004: 259-268 |
| 22 | EE | Avrim Blum,
Dawn Xiaodong Song,
Shobha Venkataraman:
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds.
RAID 2004: 258-277 |
| 21 | EE | Debin Gao,
Michael K. Reiter,
Dawn Xiaodong Song:
On Gray-Box Program Tracking for Anomaly Detection.
USENIX Security Symposium 2004: 103-118 |
| 20 | EE | David Brumley,
Dawn Xiaodong Song:
Privtrans: Automatically Partitioning Programs for Privilege Separation.
USENIX Security Symposium 2004: 57-72 |
| 2003 |
| 19 | EE | Haowen Chan,
Adrian Perrig,
Dawn Xiaodong Song:
Random Key Predistribution Schemes for Sensor Networks.
IEEE Symposium on Security and Privacy 2003: 197- |
| 18 | EE | Abraham Yaar,
Adrian Perrig,
Dawn Xiaodong Song:
Pi: A Path Identification Mechanism to Defend against DDoS Attack.
IEEE Symposium on Security and Privacy 2003: 93- |
| 17 | EE | Bartosz Przydatek,
Dawn Xiaodong Song,
Adrian Perrig:
SIA: secure information aggregation in sensor networks.
SenSys 2003: 255-265 |
| 16 | EE | James Newsome,
Dawn Xiaodong Song:
GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information.
SenSys 2003: 76-88 |
| 2002 |
| 15 | EE | Robert Johnson,
David Molnar,
Dawn Xiaodong Song,
David Wagner:
Homomorphic Signature Schemes.
CT-RSA 2002: 244-262 |
| 14 | EE | Giuseppe Ateniese,
Dawn Xiaodong Song,
Gene Tsudik:
Quasi-Efficient Revocation in Group Signatures.
Financial Cryptography 2002: 183-197 |
| 13 | EE | Dawn Xiaodong Song,
J. D. Tygar,
David Zuckerman:
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks.
IEEE Symposium on Security and Privacy 2002: 258- |
| 2001 |
| 12 | EE | Dawn Xiaodong Song:
Practical forward secure group signature schemes.
ACM Conference on Computer and Communications Security 2001: 225-234 |
| 11 | EE | Dawn Xiaodong Song,
Adrian Perrig,
Doantam Phan:
AGVI - Automatic Generation, Verification, and Implementation of Security Protocols.
CAV 2001: 241-245 |
| 10 | EE | Scott Crosby,
Ian Goldberg,
Robert Johnson,
Dawn Xiaodong Song,
David Wagner:
A Cryptanalysis of the High-Bandwidth Digital Content Protection System.
Digital Rights Management Workshop 2001: 192-200 |
| 9 | EE | Adrian Perrig,
Dawn Xiaodong Song,
J. D. Tygar:
ELK, A New Protocol for Efficient Large-Group Key Distribution.
IEEE Symposium on Security and Privacy 2001: 247- |
| 8 | EE | Dawn Xiaodong Song,
Adrian Perrig:
Advanced and Authenticated Marking Schemes for IP Traceback.
INFOCOM 2001: 878-886 |
| 7 | | Adrian Perrig,
Sean W. Smith,
Dawn Xiaodong Song,
J. D. Tygar:
SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware.
IPDPS 2001: 170 |
| 6 | EE | Adrian Perrig,
Ran Canetti,
Dawn Xiaodong Song,
J. D. Tygar:
Efficient and Secure Source Authentication for Multicast.
NDSS 2001 |
| 5 | | Dawn Xiaodong Song,
Sergey Berezin,
Adrian Perrig:
Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis.
Journal of Computer Security 9(1/2): 47-74 (2001) |
| 2000 |
| 4 | EE | Dawn Xiaodong Song,
David Wagner,
Adrian Perrig:
Practical Techniques for Searches on Encrypted Data.
IEEE Symposium on Security and Privacy 2000: 44-55 |
| 3 | EE | Adrian Perrig,
Ran Canetti,
J. D. Tygar,
Dawn Xiaodong Song:
Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
IEEE Symposium on Security and Privacy 2000: 56-73 |
| 2 | EE | Adrian Perrig,
Dawn Xiaodong Song:
A First Step Towards the Automatic Generation of Security Protocols.
NDSS 2000 |
| 1999 |
| 1 | EE | Dawn Xiaodong Song:
Athena: A New Efficient Automatic Checker for Security Protocol Analysis.
CSFW 1999: 192-202 |