Search the dblp DataBase
Dawn Xiaodong Song :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Lea Kissner , Alina Oprea , Michael K. Reiter , Dawn Xiaodong Song , Ke Yang Private Keyword-Based Push and Pull with Applications to Anonymous Communication. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:16-30 [Conf ] Dawn Xiaodong Song , Adrian Perrig , Doantam Phan AGVI - Automatic Generation, Verification, and Implementation of Security Protocols. [Citation Graph (0, 0)][DBLP ] CAV, 2001, pp:241-245 [Conf ] David Brumley , Li-Hao Liu , Pongsin Poosankam , Dawn Xiaodong Song Design space and analysis of worm defense strategies. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:125-137 [Conf ] Scott Crosby , Ian Goldberg , Robert Johnson , Dawn Xiaodong Song , David Wagner A Cryptanalysis of the High-Bandwidth Digital Content Protection System. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2001, pp:192-200 [Conf ] Debin Gao , Michael K. Reiter , Dawn Xiaodong Song Gray-box extraction of execution graphs for anomaly detection. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:318-329 [Conf ] Dawn Xiaodong Song Practical forward secure group signature schemes. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:225-234 [Conf ] James Newsome , David Brumley , Jason Franklin , Dawn Xiaodong Song Replayer: automatic protocol replay by binary analysis. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:311-321 [Conf ] Haowen Chan , Adrian Perrig , Dawn Xiaodong Song Secure hierarchical in-network aggregation in sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:278-287 [Conf ] Lea Kissner , Dawn Xiaodong Song Privacy-Preserving Set Operations. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:241-257 [Conf ] Dawn Xiaodong Song Athena: A New Efficient Automatic Checker for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:192-202 [Conf ] Robert Johnson , David Molnar , Dawn Xiaodong Song , David Wagner Homomorphic Signature Schemes. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:244-262 [Conf ] Cynthia Wong , Chenxi Wang , Dawn Xiaodong Song , Stan Bielski , Gregory R. Ganger Dynamic Quarantine of Internet Worms. [Citation Graph (0, 0)][DBLP ] DSN, 2004, pp:73-82 [Conf ] Giuseppe Ateniese , Dawn Xiaodong Song , Gene Tsudik Quasi-Efficient Revocation in Group Signatures. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2002, pp:183-197 [Conf ] Dawn Xiaodong Song , Adrian Perrig Advanced and Authenticated Marking Schemes for IP Traceback. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2001, pp:878-886 [Conf ] Abraham Yaar , Adrian Perrig , Dawn Xiaodong Song FIT: fast Internet traceback. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:1395-1406 [Conf ] Adrian Perrig , Sean W. Smith , Dawn Xiaodong Song , J. D. Tygar SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. [Citation Graph (0, 0)][DBLP ] IPDPS, 2001, pp:170- [Conf ] James Newsome , Elaine Shi , Dawn Xiaodong Song , Adrian Perrig The sybil attack in sensor networks: analysis & defenses. [Citation Graph (0, 0)][DBLP ] IPSN, 2004, pp:259-268 [Conf ] James Newsome , David Brumley , Dawn Xiaodong Song Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. [Citation Graph (0, 0)][DBLP ] NDSS, 2006, pp:- [Conf ] James Newsome , Dawn Xiaodong Song Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. [Citation Graph (0, 0)][DBLP ] NDSS, 2005, pp:- [Conf ] Adrian Perrig , Ran Canetti , Dawn Xiaodong Song , J. D. Tygar Efficient and Secure Source Authentication for Multicast. [Citation Graph (0, 0)][DBLP ] NDSS, 2001, pp:- [Conf ] Adrian Perrig , Dawn Xiaodong Song A First Step Towards the Automatic Generation of Security Protocols. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Shobha Venkataraman , Dawn Xiaodong Song , Phillip B. Gibbons , Avrim Blum New Streaming Algorithms for Fast Detection of Superspreaders. [Citation Graph (0, 0)][DBLP ] NDSS, 2005, pp:- [Conf ] James Newsome , Brad Karp , Dawn Xiaodong Song Paragraph: Thwarting Signature Learning by Training Maliciously. [Citation Graph (0, 0)][DBLP ] RAID, 2006, pp:81-105 [Conf ] Avrim Blum , Dawn Xiaodong Song , Shobha Venkataraman Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. [Citation Graph (0, 0)][DBLP ] RAID, 2004, pp:258-277 [Conf ] Debin Gao , Michael K. Reiter , Dawn Xiaodong Song Behavioral Distance for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] RAID, 2005, pp:63-81 [Conf ] Debin Gao , Michael K. Reiter , Dawn Xiaodong Song Behavioral Distance Measurement Using Hidden Markov Models. [Citation Graph (0, 0)][DBLP ] RAID, 2006, pp:19-40 [Conf ] James Newsome , Dawn Xiaodong Song GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information. [Citation Graph (0, 0)][DBLP ] SenSys, 2003, pp:76-88 [Conf ] Bartosz Przydatek , Dawn Xiaodong Song , Adrian Perrig SIA: secure information aggregation in sensor networks. [Citation Graph (0, 0)][DBLP ] SenSys, 2003, pp:255-265 [Conf ] Mihai Christodorescu , Somesh Jha , Sanjit A. Seshia , Dawn Xiaodong Song , Randal E. Bryant Semantics-Aware Malware Detection. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:32-46 [Conf ] Haowen Chan , Adrian Perrig , Dawn Xiaodong Song Random Key Predistribution Schemes for Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:197-0 [Conf ] John Bethencourt , Dawn Xiaodong Song , Brent Waters New Constructions and Practical Applications for Private Stream Searching (Extended Abstract). [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:132-139 [Conf ] David Brumley , James Newsome , Dawn Xiaodong Song , Hao Wang , Somesh Jha Towards Automatic Generation of Vulnerability-Based Signatures. [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:2-16 [Conf ] James Newsome , Brad Karp , Dawn Xiaodong Song Polygraph: Automatically Generating Signatures for Polymorphic Worms. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:226-241 [Conf ] Adrian Perrig , Ran Canetti , J. D. Tygar , Dawn Xiaodong Song Efficient Authentication and Signing of Multicast Streams over Lossy Channels. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:56-73 [Conf ] Adrian Perrig , Dawn Xiaodong Song , J. D. Tygar ELK, A New Protocol for Efficient Large-Group Key Distribution. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2001, pp:247-0 [Conf ] Abraham Yaar , Adrian Perrig , Dawn Xiaodong Song Pi: A Path Identification Mechanism to Defend against DDoS Attack. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:93-0 [Conf ] Dawn Xiaodong Song , J. D. Tygar , David Zuckerman Expander Graphs for Digital Stream Authentication and Robust Overlay Networks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:258-0 [Conf ] Abraham Yaar , Adrian Perrig , Dawn Xiaodong Song SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:130-0 [Conf ] Dawn Xiaodong Song , David Wagner , Adrian Perrig Practical Techniques for Searches on Encrypted Data. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:44-55 [Conf ] Elaine Shi , John Bethencourt , Hubert T.-H. Chan , Dawn Xiaodong Song , Adrian Perrig Multi-Dimensional Range Query over Encrypted Data. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:350-364 [Conf ] David Brumley , Dawn Xiaodong Song Privtrans: Automatically Partitioning Programs for Privilege Separation. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:57-72 [Conf ] Debin Gao , Michael K. Reiter , Dawn Xiaodong Song On Gray-Box Program Tracking for Anomaly Detection. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:103-118 [Conf ] Dawn Xiaodong Song , Sergey Berezin , Adrian Perrig Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2001, v:9, n:1/2, pp:47-74 [Journal ] Haowen Chan , Adrian Perrig , Bartosz Przydatek , Dawn Xiaodong Song SIA: Secure information aggregation in sensor networks. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2007, v:15, n:1, pp:69-102 [Journal ] Min Gyung Kang , Juan Caballero , Dawn Song Distributed Evasive Scan Techniques and Countermeasures. [Citation Graph (0, 0)][DBLP ] DIMVA, 2007, pp:157-174 [Conf ] Joseph Tucek , James Newsome , Shan Lu , Chengdu Huang , Spiros Xanthos , David Brumley , Yuanyuan Zhou , Dawn Xiaodong Song Sweeper: a lightweight end-to-end system for defending against fast worms. [Citation Graph (0, 0)][DBLP ] EuroSys, 2007, pp:115-128 [Conf ] Provable data possession at untrusted stores. [Citation Graph (, )][DBLP ] Polyglot: automatic extraction of protocol message format using dynamic binary analysis. [Citation Graph (, )][DBLP ] Panorama: capturing system-wide information flow for malware detection and analysis. [Citation Graph (, )][DBLP ] Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. [Citation Graph (, )][DBLP ] Creating Vulnerability Signatures Using Weakest Preconditions. [Citation Graph (, )][DBLP ] HookScout: Proactive Binary-Centric Hook Detection. [Citation Graph (, )][DBLP ] BinHunt: Automatically Finding Semantic Differences in Binary Programs. [Citation Graph (, )][DBLP ] BitBlaze: A New Approach to Computer Security via Binary Analysis. [Citation Graph (, )][DBLP ] RICH: Automatically Protecting Against Integer-Based Vulnerabilities. [Citation Graph (, )][DBLP ] Fig: Automatic Fingerprint Generation. [Citation Graph (, )][DBLP ] Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. [Citation Graph (, )][DBLP ] Dynamic Spyware Analysis. [Citation Graph (, )][DBLP ] A Learning-Based Approach to Reactive Security [Citation Graph (, )][DBLP ] Search in 0.030secs, Finished in 0.033secs