Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Dawn Xiaodong Song
Dawn Song
2010 – today
- 2013
[j15]Juan Caballero, Dawn Song: Automatic protocol reverse-engineering: Message format extraction and field semantics inference. Computer Networks 57(2): 451-474 (2013)
[j14]Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, Dawn Song: Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. IEEE Transactions on Information Forensics and Security 8(1): 136-148 (2013)
[c112]Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant, Dawn Song: HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism. ESORICS 2013: 164-181
[c111]Devdatta Akhawe, Frank Li, Warren He, Prateek Saxena, Dawn Song: Data-Confined HTML5 Applications. ESORICS 2013: 736-754
[c110]Shuaifu Dai, Alok Tongaonkar, Xiaoyin Wang, Antonio Nucci, Dawn Song: NetworkProfiler: Towards automatic fingerprinting of Android apps. INFOCOM 2013: 809-817
[c109]Kevin Zhijie Chen, Noah M. Johnson, Vijay D'Silva, Shuaifu Dai, Kyle MacNamara, Tom Magrino, Edward XueJun Wu, Martin Rinard, Dawn Xiaodong Song: Contextual Policy Enforcement in Android Applications with Permission Event Graphs. NDSS 2013
[c108]Prateek Mittal, Charalampos Papamanthou, Dawn Xiaodong Song: Preserving Link Privacy in Social Network Based Systems. NDSS 2013
[c107]Alok Tongaonkar, Shuaifu Dai, Antonio Nucci, Dawn Song: Understanding Mobile App Usage Patterns Using In-App Advertisements. PAM 2013: 63-72
[c106]Laszlo Szekeres, Mathias Payer, Tao Wei, Dawn Song: SoK: Eternal War in Memory. IEEE Symposium on Security and Privacy 2013: 48-62
[c105]Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, Wei Zou: Practical Control Flow Integrity and Randomization for Binary Executables. IEEE Symposium on Security and Privacy 2013: 559-573
[i15]Neil Zhenqiang Gong, Wenchang Xu, Dawn Song: Reciprocity in Social Networks: Measurements, Predictions, and Implications. CoRR abs/1302.6309 (2013)- 2012
[j13]Dawn Song, Elaine Shi, Ian Fischer, Umesh Shankar: Cloud Data Protection for the Masses. IEEE Computer 45(1): 39-45 (2012)
[j12]Domagoj Babic, Daniel Reynaud, Dawn Song: Recognizing malicious software behaviors with tree automata inference. Formal Methods in System Design 41(1): 107-128 (2012)
[j11]Adam Barth, Benjamin I. P. Rubinstein, Mukund Sundararajan, John C. Mitchell, Dawn Song, Peter L. Bartlett: A Learning-Based Approach to Reactive Security. IEEE Trans. Dependable Sec. Comput. 9(4): 482-493 (2012)
[c104]Lorenzo Martignoni, Stephen McCamant, Pongsin Poosankam, Dawn Song, Petros Maniatis: Path-exploration lifting: hi-fi tests for lo-fi emulators. ASPLOS 2012: 337-348
[c103]Steve Hanna, Ling Huang, Edward XueJun Wu, Saung Li, Charles Chen, Dawn Song: Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications. DIMVA 2012: 62-81
[c102]T.-H. Hubert Chan, Elaine Shi, Dawn Song: Optimal Lower Bound for Differentially Private Multi-party Aggregation. ESA 2012: 277-288
[c101]T.-H. Hubert Chan, Elaine Shi, Dawn Song: Privacy-Preserving Stream Aggregation with Fault Tolerance. Financial Cryptography 2012: 200-214
[c100]Mario Frank, Ben Dong, Adrienne Porter Felt, Dawn Song: Mining Permission Request Patterns from Android and Facebook Applications. ICDM 2012: 870-875
[c99]Samuel Smith, Jae Yeon (Claire) Baek, Zhaoyi Kang, Dawn Song, Laurent El Ghaoui, Mario Frank: Predicting Congressional Votes Based on Campaign Finance Data. ICMLA (1) 2012: 640-645
[c98]Neil Zhenqiang Gong, Wenchang Xu, Ling Huang, Prateek Mittal, Emil Stefanov, Vyas Sekar, Dawn Song: Evolution of social-attribute networks: measurements, modeling, and implications using google+. Internet Measurement Conference 2012: 131-144
[c97]Gabriel Maganis, Elaine Shi, Hao Chen, Dawn Song: Opaak: using mobile phones to limit anonymous identities online. MobiSys 2012: 295-308
[c96]Daniel Reynaud, Dawn Xiaodong Song, Tom Magrino, Edward XueJun Wu, Eui Chul Richard Shin: FreeMarket: Shopping for free in Android applications. NDSS 2012
[c95]
[c94]Emil Stefanov, Elaine Shi, Dawn Song: Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies. Public Key Cryptography 2012: 413-430
[c93]Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, Dawn Song, David E. Culler: GUPT: privacy preserving data analysis made easy. SIGMOD Conference 2012: 349-360
[c92]Arvind Narayanan, Hristo Paskov, Neil Zhenqiang Gong, John Bethencourt, Emil Stefanov, Eui Chul Richard Shin, Dawn Song: On the Feasibility of Internet-Scale Author Identification. IEEE Symposium on Security and Privacy 2012: 300-314
[i14]Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, Dawn Song: Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. CoRR abs/1207.6231 (2012)
[i13]Prateek Mittal, Charalampos Papamanthou, Dawn Song: Preserving Link Privacy in Social Network Based Systems. CoRR abs/1208.6189 (2012)
[i12]Neil Zhenqiang Gong, Wenchang Xu, Ling Huang, Prateek Mittal, Emil Stefanov, Vyas Sekar, Dawn Song: Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+. CoRR abs/1209.0835 (2012)
[i11]Mario Frank, Ben Dong, Adrienne Porter Felt, Dawn Song: Mining Permission Request Patterns from Android and Facebook Applications (extended author version). CoRR abs/1210.2429 (2012)
[i10]T.-H. Hubert Chan, Elaine Shi, Dawn Song: Optimal Lower Bound for Differentially Private Multi-Party Aggregation. IACR Cryptology ePrint Archive 2012: 373 (2012)- 2011
[j10]Haowen Chan, Hsu-Chun Hsiao, Adrian Perrig, Dawn Song: Secure Distributed Data Aggregation. Foundations and Trends in Databases 3(3): 149-201 (2011)
[j9]David (Yu) Zhu, Jaeyeon Jung, Dawn Song, Tadayoshi Kohno, David Wetherall: TaintEraser: protecting sensitive data leaks using application-level taint tracking. Operating Systems Review 45(1): 142-154 (2011)
[j8]Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary N. J. Peterson, Dawn Song: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1): 12 (2011)
[j7]T.-H. Hubert Chan, Elaine Shi, Dawn Song: Private and Continual Release of Statistics. ACM Trans. Inf. Syst. Secur. 14(3): 26 (2011)
[c91]Domagoj Babic, Daniel Reynaud, Dawn Song: Malware Analysis with Tree Automata Inference. CAV 2011: 116-131
[c90]Mike Samuel, Prateek Saxena, Dawn Song: Context-sensitive auto-sanitization in web templating languages using type qualifiers. ACM Conference on Computer and Communications Security 2011: 587-600
[c89]Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner: Android permissions demystified. ACM Conference on Computer and Communications Security 2011: 627-638
[c88]Joel Weinberger, Prateek Saxena, Devdatta Akhawe, Matthew Finifter, Eui Chul Richard Shin, Dawn Song: A Systematic Analysis of XSS Sanitization in Web Application Frameworks. ESORICS 2011: 150-171
[c87]Kurt Thomas, Chris Grier, Dawn Song, Vern Paxson: Suspended accounts in retrospect: an analysis of twitter spam. Internet Measurement Conference 2011: 243-258
[c86]Domagoj Babic, Lorenzo Martignoni, Stephen McCamant, Dawn Song: Statically-directed dynamic automated test generation. ISSTA 2011: 12-22
[c85]Min Gyung Kang, Stephen McCamant, Pongsin Poosankam, Dawn Song: DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. NDSS 2011
[c84]Elaine Shi, T.-H. Hubert Chan, Eleanor G. Rieffel, Richard Chow, Dawn Song: Privacy-Preserving Aggregation of Time-Series Data. NDSS 2011
[c83]Daisuke Mashima, Prateek Sarkar, Elaine Shi, Chris Li, Richard Chow, Dawn Song: Privacy settings from contextual attributes: A case study using Google Buzz. PerCom Workshops 2011: 257-262
[c82]Noah M. Johnson, Juan Caballero, Kevin Zhijie Chen, Stephen McCamant, Pongsin Poosankam, Daniel Reynaud, Dawn Song: Differential Slicing: Identifying Causal Execution Differences for Security Applications. IEEE Symposium on Security and Privacy 2011: 347-362
[c81]Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song: Design and Evaluation of a Real-Time URL Spam Filtering Service. IEEE Symposium on Security and Privacy 2011: 447-462
[c80]Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu, Dawn Song: MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery. USENIX Security Symposium 2011
[i9]
[i8]Adam Barth, Saung Li, Benjamin I. P. Rubinstein, Dawn Song: How Open Should Open Source Be? CoRR abs/1109.0507 (2011)
[i7]Neil Zhenqiang Gong, Ameet Talwalkar, Lester W. Mackey, Ling Huang, Eui Chul Richard Shin, Emil Stefanov, Elaine Shi, Dawn Song: Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN). CoRR abs/1112.3265 (2011)
[i6]Emil Stefanov, Elaine Shi, Dawn Song: Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies. IACR Cryptology ePrint Archive 2011: 509 (2011)
[i5]T.-H. Hubert Chan, Elaine Shi, Dawn Song: Privacy-Preserving Stream Aggregation with Fault Tolerance. IACR Cryptology ePrint Archive 2011: 655 (2011)- 2010
[c79]Juan Caballero, Pongsin Poosankam, Stephen McCamant, Domagoj Babic, Dawn Song: Input generation via decomposition and re-stitching: finding bugs in Malware. ACM Conference on Computer and Communications Security 2010: 413-425
[c78]Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shin, Dawn Song: Inference and analysis of formal models of botnet command and control protocols. ACM Conference on Computer and Communications Security 2010: 426-439
[c77]Devdatta Akhawe, Adam Barth, Peifung E. Lam, John C. Mitchell, Dawn Song: Towards a Formal Foundation of Web Security. CSF 2010: 290-304
[c76]Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xiaodong Song: HookScout: Proactive Binary-Centric Hook Detection. DIMVA 2010: 1-20
[c75]Adam Barth, Benjamin I. P. Rubinstein, Mukund Sundararajan, John C. Mitchell, Dawn Song, Peter L. Bartlett: A Learning-Based Approach to Reactive Security. Financial Cryptography 2010: 192-206
[c74]John Bethencourt, Elaine Shi, Dawn Song: Signatures of Reputation. Financial Cryptography 2010: 400-407
[c73]T.-H. Hubert Chan, Elaine Shi, Dawn Song: Private and Continual Release of Statistics. ICALP (2) 2010: 405-417
[c72]Juan Caballero, Noah M. Johnson, Stephen McCamant, Dawn Song: Binary Code Extraction and Interface Identification for Security Applications. NDSS 2010
[c71]Prateek Saxena, Steve Hanna, Pongsin Poosankam, Dawn Song: FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications. NDSS 2010
[c70]Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng Mao, Stephen McCamant, Dawn Song: A Symbolic Execution Framework for JavaScript. IEEE Symposium on Security and Privacy 2010: 513-528
[p3]Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jonathon T. Giffin, Sushil Jajodia, Somesh Jha, Jason H. Li, Peng Liu, Peng Ning, Xinming Ou, Dawn Song, Laura Strater, Vipin Swarup, George P. Tadda, C. Wang, John Yen: Cyber SA: Situational Awareness for Cyber Defense. Cyber Situational Awareness 2010: 3-13
[i4]T.-H. Hubert Chan, Elaine Shi, Dawn Song: Private and Continual Release of Statistics. IACR Cryptology ePrint Archive 2010: 76 (2010)
2000 – 2009
- 2009
[j6]Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance. IEEE Trans. Dependable Sec. Comput. 6(2): 96-110 (2009)
[j5]John Bethencourt, Dawn Xiaodong Song, Brent Waters: New Techniques for Private Stream Searching. ACM Trans. Inf. Syst. Secur. 12(3) (2009)
[c69]Juan Caballero, Pongsin Poosankam, Christian Kreibich, Dawn Xiaodong Song: Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. ACM Conference on Computer and Communications Security 2009: 621-634
[c68]Prateek Saxena, Pongsin Poosankam, Stephen McCamant, Dawn Song: Loop-extended symbolic execution on binary programs. ISSTA 2009: 225-236
[c67]Yacin Nadji, Prateek Saxena, Dawn Song: Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense. NDSS 2009
[c66]Shobha Venkataraman, Avrim Blum, Dawn Song, Subhabrata Sen, Oliver Spatscheck: Tracking Dynamic Sources of Malicious Activity at Internet Scale. NIPS 2009: 1946-1954
[c65]James Newsome, Stephen McCamant, Dawn Song: Measuring channel capacity to distinguish undue influence. PLAS 2009: 73-85
[c64]Juan Caballero, Zhenkai Liang, Pongsin Poosankam, Dawn Song: Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration. RAID 2009: 161-181
[c63]Adam Barth, Juan Caballero, Dawn Song: Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves. IEEE Symposium on Security and Privacy 2009: 360-371
[c62]Adam Barth, Joel Weinberger, Dawn Song: Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense. USENIX Security Symposium 2009: 187-198
[e2]
[i3]Adam Barth, Benjamin I. P. Rubinstein, Mukund Sundararajan, John C. Mitchell, Dawn Xiaodong Song, Peter L. Bartlett: A Learning-Based Approach to Reactive Security. CoRR abs/0912.1155 (2009)- 2008
[j4]David Brumley, James Newsome, Dawn Song, Hao Wang, Somesh Jha: Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures. IEEE Trans. Dependable Sec. Comput. 5(4): 224-241 (2008)
[c61]Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: BinHunt: Automatically Finding Semantic Differences in Binary Programs. ICICS 2008: 238-255
[c60]Dawn Xiaodong Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena: BitBlaze: A New Approach to Computer Security via Binary Analysis. ICISS 2008: 1-25
[c59]
[c58]Juan Caballero, Theocharis Kampouris, Dawn Song, Jia Wang: Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects? NDSS 2008
[c57]Shobha Venkataraman, Avrim Blum, Dawn Song: Limits of Learning-based Signature Generation with Adversaries. NDSS 2008
[c56]Heng Yin, Zhenkai Liang, Dawn Song: HookFinder: Identifying and Understanding Malware Hooking Behaviors. NDSS 2008
[c55]David Brumley, Pongsin Poosankam, Dawn Xiaodong Song, Jiang Zheng: Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. IEEE Symposium on Security and Privacy 2008: 143-157
[p2]David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin: Automatically Identifying Trigger-based Behavior in Malware. Botnet Detection 2008: 65-88- 2007
[j3]Haowen Chan, Adrian Perrig, Bartosz Przydatek, Dawn Xiaodong Song: SIA: Secure information aggregation in sensor networks. Journal of Computer Security 15(1): 69-102 (2007)
[c54]Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda: Panorama: capturing system-wide information flow for malware detection and analysis. ACM Conference on Computer and Communications Security 2007: 116-127
[c53]Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiaodong Song: Polyglot: automatic extraction of protocol message format using dynamic binary analysis. ACM Conference on Computer and Communications Security 2007: 317-329
[c52]Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song: Provable data possession at untrusted stores. ACM Conference on Computer and Communications Security 2007: 598-609
[c51]David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song: Creating Vulnerability Signatures Using Weakest Preconditions. CSF 2007: 311-325
[c50]Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song: Distributed Evasive Scan Techniques and Countermeasures. DIMVA 2007: 157-174
[c49]Joseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song: Sweeper: a lightweight end-to-end system for defending against fast worms. EuroSys 2007: 115-128
[c48]Yan Gao, Yao Zhao, Robert T. Schweller, Shobha Venkataraman, Yan Chen, Dawn Xiaodong Song, Ming-Yang Kao: Detecting Stealthy Spreaders Using Online Outdegree Histograms. IWQoS 2007: 145-153
[c47]David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh, Rob Johnson, Huijia Lin: RICH: Automatically Protecting Against Integer-Based Vulnerabilities. NDSS 2007
[c46]Shobha Venkataraman, Juan Caballero, Pongsin Poosankam, Min Gyung Kang, Dawn Xiaodong Song: Fig: Automatic Fingerprint Generation. NDSS 2007
[c45]Elaine Shi, John Bethencourt, Hubert T.-H. Chan, Dawn Xiaodong Song, Adrian Perrig: Multi-Dimensional Range Query over Encrypted Data. IEEE Symposium on Security and Privacy 2007: 350-364
[c44]Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, Dawn Xiaodong Song: Dynamic Spyware Analysis. USENIX Annual Technical Conference 2007: 233-246
[p1]David Brumley, James Newsome, Dawn Song: Sting: An End-to-End Self-Healing System for Defending against Internet Worms. Malware Detection 2007: 147-170
[e1]Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang (Eds.): Malware Detection. Advances in Information Security 27, Springer 2007, ISBN 978-0-387-32720-4
[i2]Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Song: Provable Data Possession at Untrusted Stores. IACR Cryptology ePrint Archive 2007: 202 (2007)- 2006
[j2]Abraham Yaar, Adrian Perrig, Dawn Song: StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense. IEEE Journal on Selected Areas in Communications 24(10): 1853-1863 (2006)
[c43]David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song: Design space and analysis of worm defense strategies. ASIACCS 2006: 125-137
[c42]Haowen Chan, Adrian Perrig, Dawn Xiaodong Song: Secure hierarchical in-network aggregation in sensor networks. ACM Conference on Computer and Communications Security 2006: 278-287
[c41]James Newsome, David Brumley, Jason Franklin, Dawn Xiaodong Song: Replayer: automatic protocol replay by binary analysis. ACM Conference on Computer and Communications Security 2006: 311-321
[c40]James Newsome, David Brumley, Dawn Xiaodong Song: Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. NDSS 2006
[c39]Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: Behavioral Distance Measurement Using Hidden Markov Models. RAID 2006: 19-40
[c38]James Newsome, Brad Karp, Dawn Xiaodong Song: Paragraph: Thwarting Signature Learning by Training Maliciously. RAID 2006: 81-105
[c37]David Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha: Towards Automatic Generation of Vulnerability-Based Signatures. IEEE Symposium on Security and Privacy 2006: 2-16
[c36]John Bethencourt, Dawn Xiaodong Song, Brent Waters: New Constructions and Practical Applications for Private Stream Searching (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 132-139- 2005
[c35]
[c34]Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song: FIT: fast Internet traceback. INFOCOM 2005: 1395-1406
[c33]James Newsome, Dawn Xiaodong Song: Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. NDSS 2005
[c32]Shobha Venkataraman, Dawn Xiaodong Song, Phillip B. Gibbons, Avrim Blum: New Streaming Algorithms for Fast Detection of Superspreaders. NDSS 2005
[c31]Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: Behavioral Distance for Intrusion Detection. RAID 2005: 63-81
[c30]Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant: Semantics-Aware Malware Detection. IEEE Symposium on Security and Privacy 2005: 32-46
[c29]James Newsome, Brad Karp, Dawn Xiaodong Song: Polygraph: Automatically Generating Signatures for Polymorphic Worms. IEEE Symposium on Security and Privacy 2005: 226-241- 2004
[c28]Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang: Private Keyword-Based Push and Pull with Applications to Anonymous Communication. ACNS 2004: 16-30
[c27]Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: Gray-box extraction of execution graphs for anomaly detection. ACM Conference on Computer and Communications Security 2004: 318-329
[c26]Cynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Stan Bielski, Gregory R. Ganger: Dynamic Quarantine of Internet Worms. DSN 2004: 73-82
[c25]James Newsome, Elaine Shi, Dawn Xiaodong Song, Adrian Perrig: The sybil attack in sensor networks: analysis & defenses. IPSN 2004: 259-268
[c24]Avrim Blum, Dawn Xiaodong Song, Shobha Venkataraman: Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. RAID 2004: 258-277
[c23]Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song: SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. IEEE Symposium on Security and Privacy 2004: 130-
[c22]David Brumley, Dawn Xiaodong Song: Privtrans: Automatically Partitioning Programs for Privilege Separation. USENIX Security Symposium 2004: 57-72
[c21]Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: On Gray-Box Program Tracking for Anomaly Detection. USENIX Security Symposium 2004: 103-118- 2003
[c20]James Newsome, Dawn Xiaodong Song: GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information. SenSys 2003: 76-88
[c19]Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perrig: SIA: secure information aggregation in sensor networks. SenSys 2003: 255-265
[c18]Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song: Pi: A Path Identification Mechanism to Defend against DDoS Attack. IEEE Symposium on Security and Privacy 2003: 93-
[c17]Haowen Chan, Adrian Perrig, Dawn Xiaodong Song: Random Key Predistribution Schemes for Sensor Networks. IEEE Symposium on Security and Privacy 2003: 197-- 2002
[c16]Robert Johnson, David Molnar, Dawn Xiaodong Song, David Wagner: Homomorphic Signature Schemes. CT-RSA 2002: 244-262
[c15]Giuseppe Ateniese, Dawn Xiaodong Song, Gene Tsudik: Quasi-Efficient Revocation in Group Signatures. Financial Cryptography 2002: 183-197
[c14]Dawn Xiaodong Song, J. D. Tygar, David Zuckerman: Expander Graphs for Digital Stream Authentication and Robust Overlay Networks. IEEE Symposium on Security and Privacy 2002: 258-270- 2001
[j1]Dawn Xiaodong Song, Sergey Berezin, Adrian Perrig: Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis. Journal of Computer Security 9(1/2): 47-74 (2001)
[c13]Dawn Xiaodong Song, Adrian Perrig, Doantam Phan: AGVI - Automatic Generation, Verification, and Implementation of Security Protocols. CAV 2001: 241-245
[c12]Scott A. Crosby, Ian Goldberg, Robert Johnson, Dawn Xiaodong Song, David Wagner: A Cryptanalysis of the High-Bandwidth Digital Content Protection System. Digital Rights Management Workshop 2001: 192-200
[c11]Dawn Xiaodong Song: Practical forward secure group signature schemes. ACM Conference on Computer and Communications Security 2001: 225-234
[c10]Dawn Xiaodong Song, Adrian Perrig: Advanced and Authenticated Marking Schemes for IP Traceback. INFOCOM 2001: 878-886
[c9]Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar: SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. IPDPS 2001: 170
[c8]Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar: Efficient and Secure Source Authentication for Multicast. NDSS 2001
[c7]Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar: ELK, A New Protocol for Efficient Large-Group Key Distribution. IEEE Symposium on Security and Privacy 2001: 247-262
[c6]Dawn Xiaodong Song, David Wagner, Xuqing Tian: Timing Analysis of Keystrokes and Timing Attacks on SSH. USENIX Security Symposium 2001
[i1]Giuseppe Ateniese, Dawn Song, Gene Tsudik: Quasi-Efficient Revocation of Group Signatures. IACR Cryptology ePrint Archive 2001: 101 (2001)- 2000
[c5]Adrian Perrig, Dawn Song: Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols. CSFW 2000: 64-76
[c4]Adrian Perrig, Dawn Xiaodong Song: A First Step Towards the Automatic Generation of Security Protocols. NDSS 2000
[c3]Dawn Xiaodong Song, David Wagner, Adrian Perrig: Practical Techniques for Searches on Encrypted Data. IEEE Symposium on Security and Privacy 2000: 44-55
[c2]Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. IEEE Symposium on Security and Privacy 2000: 56-73
1990 – 1999
- 1999
[c1]Dawn Xiaodong Song: Athena: A New Efficient Automatic Checker for Security Protocol Analysis. CSFW 1999: 192-202
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:14 CEST by the dblp team



