2009 | ||
---|---|---|
59 | EE | John Bethencourt, Dawn Xiaodong Song, Brent Waters: New Techniques for Private Stream Searching. ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
58 | EE | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance. IEEE Trans. Dependable Sec. Comput. 6(2): 96-110 (2009) |
2008 | ||
57 | EE | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: BinHunt: Automatically Finding Semantic Differences in Binary Programs. ICICS 2008: 238-255 |
56 | EE | Dawn Xiaodong Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena: BitBlaze: A New Approach to Computer Security via Binary Analysis. ICISS 2008: 1-25 |
55 | EE | David Brumley, Pongsin Poosankam, Dawn Xiaodong Song, Jiang Zheng: Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. IEEE Symposium on Security and Privacy 2008: 143-157 |
54 | EE | David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin: Automatically Identifying Trigger-based Behavior in Malware. Botnet Detection 2008: 65-88 |
2007 | ||
53 | EE | Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda: Panorama: capturing system-wide information flow for malware detection and analysis. ACM Conference on Computer and Communications Security 2007: 116-127 |
52 | EE | Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiaodong Song: Polyglot: automatic extraction of protocol message format using dynamic binary analysis. ACM Conference on Computer and Communications Security 2007: 317-329 |
51 | EE | Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song: Provable data possession at untrusted stores. ACM Conference on Computer and Communications Security 2007: 598-609 |
50 | EE | David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song: Creating Vulnerability Signatures Using Weakest Preconditions. CSF 2007: 311-325 |
49 | EE | Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song: Distributed Evasive Scan Techniques and Countermeasures. DIMVA 2007: 157-174 |
48 | EE | Joseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song: Sweeper: a lightweight end-to-end system for defending against fast worms. EuroSys 2007: 115-128 |
47 | EE | Elaine Shi, John Bethencourt, Hubert T.-H. Chan, Dawn Xiaodong Song, Adrian Perrig: Multi-Dimensional Range Query over Encrypted Data. IEEE Symposium on Security and Privacy 2007: 350-364 |
46 | EE | Shobha Venkataraman, Juan Caballero, Pongsin Poosankam, Min Gyung Kang, Dawn Xiaodong Song: Fig: Automatic Fingerprint Generation. NDSS 2007 |
45 | EE | David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh, Rob Johnson, Huijia Lin: RICH: Automatically Protecting Against Integer-Based Vulnerabilities. NDSS 2007 |
44 | EE | Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, Dawn Xiaodong Song: Dynamic Spyware Analysis. USENIX Annual Technical Conference 2007: 233-246 |
43 | EE | Haowen Chan, Adrian Perrig, Bartosz Przydatek, Dawn Xiaodong Song: SIA: Secure information aggregation in sensor networks. Journal of Computer Security 15(1): 69-102 (2007) |
2006 | ||
42 | EE | Haowen Chan, Adrian Perrig, Dawn Xiaodong Song: Secure hierarchical in-network aggregation in sensor networks. ACM Conference on Computer and Communications Security 2006: 278-287 |
41 | EE | James Newsome, David Brumley, Jason Franklin, Dawn Xiaodong Song: Replayer: automatic protocol replay by binary analysis. ACM Conference on Computer and Communications Security 2006: 311-321 |
40 | EE | David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song: Design space and analysis of worm defense strategies. ASIACCS 2006: 125-137 |
39 | EE | John Bethencourt, Dawn Xiaodong Song, Brent Waters: New Constructions and Practical Applications for Private Stream Searching (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 132-139 |
38 | EE | David Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha: Towards Automatic Generation of Vulnerability-Based Signatures. IEEE Symposium on Security and Privacy 2006: 2-16 |
37 | EE | James Newsome, David Brumley, Dawn Xiaodong Song: Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. NDSS 2006 |
36 | EE | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: Behavioral Distance Measurement Using Hidden Markov Models. RAID 2006: 19-40 |
35 | EE | James Newsome, Brad Karp, Dawn Xiaodong Song: Paragraph: Thwarting Signature Learning by Training Maliciously. RAID 2006: 81-105 |
2005 | ||
34 | EE | Lea Kissner, Dawn Xiaodong Song: Privacy-Preserving Set Operations. CRYPTO 2005: 241-257 |
33 | EE | James Newsome, Brad Karp, Dawn Xiaodong Song: Polygraph: Automatically Generating Signatures for Polymorphic Worms. IEEE Symposium on Security and Privacy 2005: 226-241 |
32 | EE | Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant: Semantics-Aware Malware Detection. IEEE Symposium on Security and Privacy 2005: 32-46 |
31 | EE | Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song: FIT: fast Internet traceback. INFOCOM 2005: 1395-1406 |
30 | EE | James Newsome, Dawn Xiaodong Song: Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. NDSS 2005 |
29 | EE | Shobha Venkataraman, Dawn Xiaodong Song, Phillip B. Gibbons, Avrim Blum: New Streaming Algorithms for Fast Detection of Superspreaders. NDSS 2005 |
28 | EE | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: Behavioral Distance for Intrusion Detection. RAID 2005: 63-81 |
2004 | ||
27 | EE | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: Gray-box extraction of execution graphs for anomaly detection. ACM Conference on Computer and Communications Security 2004: 318-329 |
26 | EE | Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang: Private Keyword-Based Push and Pull with Applications to Anonymous Communication. ACNS 2004: 16-30 |
25 | EE | Cynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Stan Bielski, Gregory R. Ganger: Dynamic Quarantine of Internet Worms. DSN 2004: 73-82 |
24 | EE | Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song: SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. IEEE Symposium on Security and Privacy 2004: 130- |
23 | EE | James Newsome, Elaine Shi, Dawn Xiaodong Song, Adrian Perrig: The sybil attack in sensor networks: analysis & defenses. IPSN 2004: 259-268 |
22 | EE | Avrim Blum, Dawn Xiaodong Song, Shobha Venkataraman: Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. RAID 2004: 258-277 |
21 | EE | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: On Gray-Box Program Tracking for Anomaly Detection. USENIX Security Symposium 2004: 103-118 |
20 | EE | David Brumley, Dawn Xiaodong Song: Privtrans: Automatically Partitioning Programs for Privilege Separation. USENIX Security Symposium 2004: 57-72 |
2003 | ||
19 | EE | Haowen Chan, Adrian Perrig, Dawn Xiaodong Song: Random Key Predistribution Schemes for Sensor Networks. IEEE Symposium on Security and Privacy 2003: 197- |
18 | EE | Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song: Pi: A Path Identification Mechanism to Defend against DDoS Attack. IEEE Symposium on Security and Privacy 2003: 93- |
17 | EE | Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perrig: SIA: secure information aggregation in sensor networks. SenSys 2003: 255-265 |
16 | EE | James Newsome, Dawn Xiaodong Song: GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information. SenSys 2003: 76-88 |
2002 | ||
15 | EE | Robert Johnson, David Molnar, Dawn Xiaodong Song, David Wagner: Homomorphic Signature Schemes. CT-RSA 2002: 244-262 |
14 | EE | Giuseppe Ateniese, Dawn Xiaodong Song, Gene Tsudik: Quasi-Efficient Revocation in Group Signatures. Financial Cryptography 2002: 183-197 |
13 | EE | Dawn Xiaodong Song, J. D. Tygar, David Zuckerman: Expander Graphs for Digital Stream Authentication and Robust Overlay Networks. IEEE Symposium on Security and Privacy 2002: 258- |
2001 | ||
12 | EE | Dawn Xiaodong Song: Practical forward secure group signature schemes. ACM Conference on Computer and Communications Security 2001: 225-234 |
11 | EE | Dawn Xiaodong Song, Adrian Perrig, Doantam Phan: AGVI - Automatic Generation, Verification, and Implementation of Security Protocols. CAV 2001: 241-245 |
10 | EE | Scott Crosby, Ian Goldberg, Robert Johnson, Dawn Xiaodong Song, David Wagner: A Cryptanalysis of the High-Bandwidth Digital Content Protection System. Digital Rights Management Workshop 2001: 192-200 |
9 | EE | Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar: ELK, A New Protocol for Efficient Large-Group Key Distribution. IEEE Symposium on Security and Privacy 2001: 247- |
8 | EE | Dawn Xiaodong Song, Adrian Perrig: Advanced and Authenticated Marking Schemes for IP Traceback. INFOCOM 2001: 878-886 |
7 | Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar: SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. IPDPS 2001: 170 | |
6 | EE | Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar: Efficient and Secure Source Authentication for Multicast. NDSS 2001 |
5 | Dawn Xiaodong Song, Sergey Berezin, Adrian Perrig: Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis. Journal of Computer Security 9(1/2): 47-74 (2001) | |
2000 | ||
4 | EE | Dawn Xiaodong Song, David Wagner, Adrian Perrig: Practical Techniques for Searches on Encrypted Data. IEEE Symposium on Security and Privacy 2000: 44-55 |
3 | EE | Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. IEEE Symposium on Security and Privacy 2000: 56-73 |
2 | EE | Adrian Perrig, Dawn Xiaodong Song: A First Step Towards the Automatic Generation of Security Protocols. NDSS 2000 |
1999 | ||
1 | EE | Dawn Xiaodong Song: Athena: A New Efficient Automatic Checker for Security Protocol Analysis. CSFW 1999: 192-202 |