The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dawn Xiaodong Song: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang
    Private Keyword-Based Push and Pull with Applications to Anonymous Communication. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:16-30 [Conf]
  2. Dawn Xiaodong Song, Adrian Perrig, Doantam Phan
    AGVI - Automatic Generation, Verification, and Implementation of Security Protocols. [Citation Graph (0, 0)][DBLP]
    CAV, 2001, pp:241-245 [Conf]
  3. David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song
    Design space and analysis of worm defense strategies. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:125-137 [Conf]
  4. Scott Crosby, Ian Goldberg, Robert Johnson, Dawn Xiaodong Song, David Wagner
    A Cryptanalysis of the High-Bandwidth Digital Content Protection System. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:192-200 [Conf]
  5. Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
    Gray-box extraction of execution graphs for anomaly detection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:318-329 [Conf]
  6. Dawn Xiaodong Song
    Practical forward secure group signature schemes. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:225-234 [Conf]
  7. James Newsome, David Brumley, Jason Franklin, Dawn Xiaodong Song
    Replayer: automatic protocol replay by binary analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:311-321 [Conf]
  8. Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
    Secure hierarchical in-network aggregation in sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:278-287 [Conf]
  9. Lea Kissner, Dawn Xiaodong Song
    Privacy-Preserving Set Operations. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:241-257 [Conf]
  10. Dawn Xiaodong Song
    Athena: A New Efficient Automatic Checker for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:192-202 [Conf]
  11. Robert Johnson, David Molnar, Dawn Xiaodong Song, David Wagner
    Homomorphic Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:244-262 [Conf]
  12. Cynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Stan Bielski, Gregory R. Ganger
    Dynamic Quarantine of Internet Worms. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:73-82 [Conf]
  13. Giuseppe Ateniese, Dawn Xiaodong Song, Gene Tsudik
    Quasi-Efficient Revocation in Group Signatures. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:183-197 [Conf]
  14. Dawn Xiaodong Song, Adrian Perrig
    Advanced and Authenticated Marking Schemes for IP Traceback. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:878-886 [Conf]
  15. Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song
    FIT: fast Internet traceback. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:1395-1406 [Conf]
  16. Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar
    SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2001, pp:170- [Conf]
  17. James Newsome, Elaine Shi, Dawn Xiaodong Song, Adrian Perrig
    The sybil attack in sensor networks: analysis & defenses. [Citation Graph (0, 0)][DBLP]
    IPSN, 2004, pp:259-268 [Conf]
  18. James Newsome, David Brumley, Dawn Xiaodong Song
    Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  19. James Newsome, Dawn Xiaodong Song
    Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  20. Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar
    Efficient and Secure Source Authentication for Multicast. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  21. Adrian Perrig, Dawn Xiaodong Song
    A First Step Towards the Automatic Generation of Security Protocols. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  22. Shobha Venkataraman, Dawn Xiaodong Song, Phillip B. Gibbons, Avrim Blum
    New Streaming Algorithms for Fast Detection of Superspreaders. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  23. James Newsome, Brad Karp, Dawn Xiaodong Song
    Paragraph: Thwarting Signature Learning by Training Maliciously. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:81-105 [Conf]
  24. Avrim Blum, Dawn Xiaodong Song, Shobha Venkataraman
    Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:258-277 [Conf]
  25. Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
    Behavioral Distance for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:63-81 [Conf]
  26. Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
    Behavioral Distance Measurement Using Hidden Markov Models. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:19-40 [Conf]
  27. James Newsome, Dawn Xiaodong Song
    GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information. [Citation Graph (0, 0)][DBLP]
    SenSys, 2003, pp:76-88 [Conf]
  28. Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perrig
    SIA: secure information aggregation in sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2003, pp:255-265 [Conf]
  29. Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant
    Semantics-Aware Malware Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:32-46 [Conf]
  30. Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
    Random Key Predistribution Schemes for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:197-0 [Conf]
  31. John Bethencourt, Dawn Xiaodong Song, Brent Waters
    New Constructions and Practical Applications for Private Stream Searching (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:132-139 [Conf]
  32. David Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha
    Towards Automatic Generation of Vulnerability-Based Signatures. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:2-16 [Conf]
  33. James Newsome, Brad Karp, Dawn Xiaodong Song
    Polygraph: Automatically Generating Signatures for Polymorphic Worms. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:226-241 [Conf]
  34. Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song
    Efficient Authentication and Signing of Multicast Streams over Lossy Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:56-73 [Conf]
  35. Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar
    ELK, A New Protocol for Efficient Large-Group Key Distribution. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:247-0 [Conf]
  36. Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song
    Pi: A Path Identification Mechanism to Defend against DDoS Attack. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:93-0 [Conf]
  37. Dawn Xiaodong Song, J. D. Tygar, David Zuckerman
    Expander Graphs for Digital Stream Authentication and Robust Overlay Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:258-0 [Conf]
  38. Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song
    SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:130-0 [Conf]
  39. Dawn Xiaodong Song, David Wagner, Adrian Perrig
    Practical Techniques for Searches on Encrypted Data. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:44-55 [Conf]
  40. Elaine Shi, John Bethencourt, Hubert T.-H. Chan, Dawn Xiaodong Song, Adrian Perrig
    Multi-Dimensional Range Query over Encrypted Data. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:350-364 [Conf]
  41. David Brumley, Dawn Xiaodong Song
    Privtrans: Automatically Partitioning Programs for Privilege Separation. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:57-72 [Conf]
  42. Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
    On Gray-Box Program Tracking for Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:103-118 [Conf]
  43. Dawn Xiaodong Song, Sergey Berezin, Adrian Perrig
    Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2001, v:9, n:1/2, pp:47-74 [Journal]
  44. Haowen Chan, Adrian Perrig, Bartosz Przydatek, Dawn Xiaodong Song
    SIA: Secure information aggregation in sensor networks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2007, v:15, n:1, pp:69-102 [Journal]
  45. Min Gyung Kang, Juan Caballero, Dawn Song
    Distributed Evasive Scan Techniques and Countermeasures. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:157-174 [Conf]
  46. Joseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song
    Sweeper: a lightweight end-to-end system for defending against fast worms. [Citation Graph (0, 0)][DBLP]
    EuroSys, 2007, pp:115-128 [Conf]

  47. Provable data possession at untrusted stores. [Citation Graph (, )][DBLP]


  48. Polyglot: automatic extraction of protocol message format using dynamic binary analysis. [Citation Graph (, )][DBLP]


  49. Panorama: capturing system-wide information flow for malware detection and analysis. [Citation Graph (, )][DBLP]


  50. Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. [Citation Graph (, )][DBLP]


  51. Creating Vulnerability Signatures Using Weakest Preconditions. [Citation Graph (, )][DBLP]


  52. HookScout: Proactive Binary-Centric Hook Detection. [Citation Graph (, )][DBLP]


  53. BinHunt: Automatically Finding Semantic Differences in Binary Programs. [Citation Graph (, )][DBLP]


  54. BitBlaze: A New Approach to Computer Security via Binary Analysis. [Citation Graph (, )][DBLP]


  55. RICH: Automatically Protecting Against Integer-Based Vulnerabilities. [Citation Graph (, )][DBLP]


  56. Fig: Automatic Fingerprint Generation. [Citation Graph (, )][DBLP]


  57. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. [Citation Graph (, )][DBLP]


  58. Dynamic Spyware Analysis. [Citation Graph (, )][DBLP]


  59. A Learning-Based Approach to Reactive Security [Citation Graph (, )][DBLP]


Search in 0.019secs, Finished in 0.021secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002