dblp.uni-trier.dewww.uni-trier.de

Dawn Xiaodong Song

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
59EEJohn Bethencourt, Dawn Xiaodong Song, Brent Waters: New Techniques for Private Stream Searching. ACM Trans. Inf. Syst. Secur. 12(3): (2009)
58EEDebin Gao, Michael K. Reiter, Dawn Xiaodong Song: Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance. IEEE Trans. Dependable Sec. Comput. 6(2): 96-110 (2009)
2008
57EEDebin Gao, Michael K. Reiter, Dawn Xiaodong Song: BinHunt: Automatically Finding Semantic Differences in Binary Programs. ICICS 2008: 238-255
56EEDawn Xiaodong Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena: BitBlaze: A New Approach to Computer Security via Binary Analysis. ICISS 2008: 1-25
55EEDavid Brumley, Pongsin Poosankam, Dawn Xiaodong Song, Jiang Zheng: Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. IEEE Symposium on Security and Privacy 2008: 143-157
54EEDavid Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin: Automatically Identifying Trigger-based Behavior in Malware. Botnet Detection 2008: 65-88
2007
53EEHeng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda: Panorama: capturing system-wide information flow for malware detection and analysis. ACM Conference on Computer and Communications Security 2007: 116-127
52EEJuan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiaodong Song: Polyglot: automatic extraction of protocol message format using dynamic binary analysis. ACM Conference on Computer and Communications Security 2007: 317-329
51EEGiuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song: Provable data possession at untrusted stores. ACM Conference on Computer and Communications Security 2007: 598-609
50EEDavid Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song: Creating Vulnerability Signatures Using Weakest Preconditions. CSF 2007: 311-325
49EEMin Gyung Kang, Juan Caballero, Dawn Xiaodong Song: Distributed Evasive Scan Techniques and Countermeasures. DIMVA 2007: 157-174
48EEJoseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song: Sweeper: a lightweight end-to-end system for defending against fast worms. EuroSys 2007: 115-128
47EEElaine Shi, John Bethencourt, Hubert T.-H. Chan, Dawn Xiaodong Song, Adrian Perrig: Multi-Dimensional Range Query over Encrypted Data. IEEE Symposium on Security and Privacy 2007: 350-364
46EEShobha Venkataraman, Juan Caballero, Pongsin Poosankam, Min Gyung Kang, Dawn Xiaodong Song: Fig: Automatic Fingerprint Generation. NDSS 2007
45EEDavid Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh, Rob Johnson, Huijia Lin: RICH: Automatically Protecting Against Integer-Based Vulnerabilities. NDSS 2007
44EEManuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, Dawn Xiaodong Song: Dynamic Spyware Analysis. USENIX Annual Technical Conference 2007: 233-246
43EEHaowen Chan, Adrian Perrig, Bartosz Przydatek, Dawn Xiaodong Song: SIA: Secure information aggregation in sensor networks. Journal of Computer Security 15(1): 69-102 (2007)
2006
42EEHaowen Chan, Adrian Perrig, Dawn Xiaodong Song: Secure hierarchical in-network aggregation in sensor networks. ACM Conference on Computer and Communications Security 2006: 278-287
41EEJames Newsome, David Brumley, Jason Franklin, Dawn Xiaodong Song: Replayer: automatic protocol replay by binary analysis. ACM Conference on Computer and Communications Security 2006: 311-321
40EEDavid Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song: Design space and analysis of worm defense strategies. ASIACCS 2006: 125-137
39EEJohn Bethencourt, Dawn Xiaodong Song, Brent Waters: New Constructions and Practical Applications for Private Stream Searching (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 132-139
38EEDavid Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha: Towards Automatic Generation of Vulnerability-Based Signatures. IEEE Symposium on Security and Privacy 2006: 2-16
37EEJames Newsome, David Brumley, Dawn Xiaodong Song: Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. NDSS 2006
36EEDebin Gao, Michael K. Reiter, Dawn Xiaodong Song: Behavioral Distance Measurement Using Hidden Markov Models. RAID 2006: 19-40
35EEJames Newsome, Brad Karp, Dawn Xiaodong Song: Paragraph: Thwarting Signature Learning by Training Maliciously. RAID 2006: 81-105
2005
34EELea Kissner, Dawn Xiaodong Song: Privacy-Preserving Set Operations. CRYPTO 2005: 241-257
33EEJames Newsome, Brad Karp, Dawn Xiaodong Song: Polygraph: Automatically Generating Signatures for Polymorphic Worms. IEEE Symposium on Security and Privacy 2005: 226-241
32EEMihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant: Semantics-Aware Malware Detection. IEEE Symposium on Security and Privacy 2005: 32-46
31EEAbraham Yaar, Adrian Perrig, Dawn Xiaodong Song: FIT: fast Internet traceback. INFOCOM 2005: 1395-1406
30EEJames Newsome, Dawn Xiaodong Song: Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. NDSS 2005
29EEShobha Venkataraman, Dawn Xiaodong Song, Phillip B. Gibbons, Avrim Blum: New Streaming Algorithms for Fast Detection of Superspreaders. NDSS 2005
28EEDebin Gao, Michael K. Reiter, Dawn Xiaodong Song: Behavioral Distance for Intrusion Detection. RAID 2005: 63-81
2004
27EEDebin Gao, Michael K. Reiter, Dawn Xiaodong Song: Gray-box extraction of execution graphs for anomaly detection. ACM Conference on Computer and Communications Security 2004: 318-329
26EELea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang: Private Keyword-Based Push and Pull with Applications to Anonymous Communication. ACNS 2004: 16-30
25EECynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Stan Bielski, Gregory R. Ganger: Dynamic Quarantine of Internet Worms. DSN 2004: 73-82
24EEAbraham Yaar, Adrian Perrig, Dawn Xiaodong Song: SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. IEEE Symposium on Security and Privacy 2004: 130-
23EEJames Newsome, Elaine Shi, Dawn Xiaodong Song, Adrian Perrig: The sybil attack in sensor networks: analysis & defenses. IPSN 2004: 259-268
22EEAvrim Blum, Dawn Xiaodong Song, Shobha Venkataraman: Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. RAID 2004: 258-277
21EEDebin Gao, Michael K. Reiter, Dawn Xiaodong Song: On Gray-Box Program Tracking for Anomaly Detection. USENIX Security Symposium 2004: 103-118
20EEDavid Brumley, Dawn Xiaodong Song: Privtrans: Automatically Partitioning Programs for Privilege Separation. USENIX Security Symposium 2004: 57-72
2003
19EEHaowen Chan, Adrian Perrig, Dawn Xiaodong Song: Random Key Predistribution Schemes for Sensor Networks. IEEE Symposium on Security and Privacy 2003: 197-
18EEAbraham Yaar, Adrian Perrig, Dawn Xiaodong Song: Pi: A Path Identification Mechanism to Defend against DDoS Attack. IEEE Symposium on Security and Privacy 2003: 93-
17EEBartosz Przydatek, Dawn Xiaodong Song, Adrian Perrig: SIA: secure information aggregation in sensor networks. SenSys 2003: 255-265
16EEJames Newsome, Dawn Xiaodong Song: GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information. SenSys 2003: 76-88
2002
15EERobert Johnson, David Molnar, Dawn Xiaodong Song, David Wagner: Homomorphic Signature Schemes. CT-RSA 2002: 244-262
14EEGiuseppe Ateniese, Dawn Xiaodong Song, Gene Tsudik: Quasi-Efficient Revocation in Group Signatures. Financial Cryptography 2002: 183-197
13EEDawn Xiaodong Song, J. D. Tygar, David Zuckerman: Expander Graphs for Digital Stream Authentication and Robust Overlay Networks. IEEE Symposium on Security and Privacy 2002: 258-
2001
12EEDawn Xiaodong Song: Practical forward secure group signature schemes. ACM Conference on Computer and Communications Security 2001: 225-234
11EEDawn Xiaodong Song, Adrian Perrig, Doantam Phan: AGVI - Automatic Generation, Verification, and Implementation of Security Protocols. CAV 2001: 241-245
10EEScott Crosby, Ian Goldberg, Robert Johnson, Dawn Xiaodong Song, David Wagner: A Cryptanalysis of the High-Bandwidth Digital Content Protection System. Digital Rights Management Workshop 2001: 192-200
9EEAdrian Perrig, Dawn Xiaodong Song, J. D. Tygar: ELK, A New Protocol for Efficient Large-Group Key Distribution. IEEE Symposium on Security and Privacy 2001: 247-
8EEDawn Xiaodong Song, Adrian Perrig: Advanced and Authenticated Marking Schemes for IP Traceback. INFOCOM 2001: 878-886
7 Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar: SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. IPDPS 2001: 170
6EEAdrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar: Efficient and Secure Source Authentication for Multicast. NDSS 2001
5 Dawn Xiaodong Song, Sergey Berezin, Adrian Perrig: Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis. Journal of Computer Security 9(1/2): 47-74 (2001)
2000
4EEDawn Xiaodong Song, David Wagner, Adrian Perrig: Practical Techniques for Searches on Encrypted Data. IEEE Symposium on Security and Privacy 2000: 44-55
3EEAdrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. IEEE Symposium on Security and Privacy 2000: 56-73
2EEAdrian Perrig, Dawn Xiaodong Song: A First Step Towards the Automatic Generation of Security Protocols. NDSS 2000
1999
1EEDawn Xiaodong Song: Athena: A New Efficient Automatic Checker for Security Protocol Analysis. CSFW 1999: 192-202

Coauthor Index

1Giuseppe Ateniese [14] [51]
2Sergey Berezin [5]
3John Bethencourt [39] [47] [59]
4Stan Bielski [25]
5Avrim Blum [22] [29]
6David Brumley [20] [37] [38] [40] [41] [45] [48] [50] [54] [55] [56]
7Randal E. Bryant [32]
8Randal C. Burns [51]
9Juan Caballero [46] [49] [52] [56]
10Ran Canetti [3] [6]
11Haowen Chan [19] [42] [43]
12T.-H. Hubert Chan (Hubert T.-H. Chan) [47]
13Tzi-cker Chiueh [45]
14Mihai Christodorescu [32]
15Scott Crosby [10]
16Reza Curtmola [51]
17Manuel Egele [44] [53]
18Jason Franklin [41]
19Gregory R. Ganger [25]
20Debin Gao [21] [27] [28] [36] [57] [58]
21Phillip B. Gibbons [29]
22Ian Goldberg [10]
23Cody Hartwig [54]
24Joseph Herring [51]
25Chengdu Huang [48]
26Ivan Jager [56]
27Somesh Jha [32] [38] [50]
28Rob Johnson [45]
29Robert Johnson [10] [15]
30Min Gyung Kang [46] [49] [56]
31Brad Karp [33] [35]
32Engin Kirda [44] [53]
33Lea Kissner [26] [34] [51]
34Christopher Krügel (Christopher Kruegel) [44] [53]
35Zhenkai Liang [52] [54] [56]
36Huijia Lin [45]
37Li-Hao Liu [40]
38Shan Lu [48]
39David Molnar [15]
40James Newsome [16] [23] [30] [33] [35] [37] [38] [41] [48] [54] [56]
41Alina Oprea [26]
42Adrian Perrig [2] [3] [4] [5] [6] [7] [8] [9] [11] [17] [18] [19] [23] [24] [31] [42] [43] [47]
43Zachary N. J. Peterson [51]
44Doantam Phan [11]
45Pongsin Poosankam [40] [46] [55] [56]
46Bartosz Przydatek [17] [43]
47Michael K. Reiter [21] [26] [27] [28] [36] [57] [58]
48Prateek Saxena [56]
49Sanjit A. Seshia [32]
50Elaine Shi [23] [47]
51Sean W. Smith [7]
52Gene Tsudik [14]
53Joseph Tucek [48]
54J. Doug Tygar (J. D. Tygar) [3] [6] [7] [9] [13]
55Shobha Venkataraman [22] [29] [46]
56David Wagner [4] [10] [15]
57Chenxi Wang [25]
58Hao Wang [38] [50]
59Brent Waters (Brent R. Waters) [39] [59]
60Cynthia Wong [25]
61Spiros Xanthos [48]
62Abraham Yaar [18] [24] [31]
63Ke Yang [26]
64Heng Yin [44] [52] [53] [54] [56]
65Jiang Zheng [55]
66Yuanyuan Zhou [48]
67David Zuckerman [13]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)