Dawn Song

Orcid: 0000-0001-9745-6802

Affiliations:
  • University of California, Berkeley, Computer Science Division


According to our database1, Dawn Song authored at least 430 papers between 1999 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2019, "For contributions to security and privacy".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
LLM-PBE: Assessing Data Privacy in Large Language Models.
Proc. VLDB Endow., July, 2024

Berkeley Open Extended Reality Recordings 2023 (BOXRR-23): 4.7 Million Motion Capture Recordings from 105,000 XR Users.
IEEE Trans. Vis. Comput. Graph., May, 2024

SoK: Data Privacy in Virtual Reality.
Proc. Priv. Enhancing Technol., January, 2024

Truth in Motion: The Unprecedented Risks and Opportunities of Extended Reality Motion Data.
IEEE Secur. Priv., 2024

HADES: Range-Filtered Private Aggregation on Public Data.
IACR Cryptol. ePrint Arch., 2024

An undetectable watermark for generative image models.
IACR Cryptol. ePrint Arch., 2024

CTINEXUS: Leveraging Optimized LLM In-Context Learning for Constructing Cybersecurity Knowledge Graphs Under Data Scarcity.
CoRR, 2024

Future of Algorithmic Organization: Large-Scale Analysis of Decentralized Autonomous Organizations (DAOs).
CoRR, 2024

SecCodePLT: A Unified Platform for Evaluating the Security of Code GenAI.
CoRR, 2024

Multimodal Situational Safety.
CoRR, 2024

From Experts to the Public: Governing Multimodal Language Models in Politically Sensitive Video Analysis.
CoRR, 2024

Tamper-Resistant Safeguards for Open-Weight LLMs.
CoRR, 2024

Can Editing LLMs Inject Harm?
CoRR, 2024

AutoScale: Automatic Prediction of Compute-optimal Data Composition for Training LLMs.
CoRR, 2024

AIR-Bench 2024: A Safety Benchmark Based on Risk Categories from Regulations and Policies.
CoRR, 2024

AgentPoison: Red-teaming LLM Agents via Poisoning Memory or Knowledge Bases.
CoRR, 2024

AI Risk Categorization Decoded (AIR 2024): From Government Regulations to Corporate Policies.
CoRR, 2024

Data Shapley in One Training Run.
CoRR, 2024

GuardAgent: Safeguard LLM Agents by a Guard Agent via Knowledge-Enabled Reasoning.
CoRR, 2024

AI Risk Management Should Incorporate Both Safety and Security.
CoRR, 2024

TrojFM: Resource-efficient Backdoor Attacks against Very Large Foundation Models.
CoRR, 2024

KnowHalu: Hallucination Detection via Multi-Form Knowledge Based Factual Checking.
CoRR, 2024

Benchmarking Zero-Shot Robustness of Multimodal Foundation Models: A Pilot Study.
CoRR, 2024

On the Societal Impact of Open Foundation Models.
CoRR, 2024

Evolving AI Collectives to Enhance Human Diversity and Enable Self-Regulation.
CoRR, 2024

Inferring Private Personal Attributes of Virtual Reality Users from Ecologically Valid Head and Hand Motion Data.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2024

Deep Motion Masking for Secure, Usable, and Scalable Real-Time Anonymization of Ecological Virtual Reality Motion Data.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2024

Specular: Towards Secure, Trust-minimized Optimistic Blockchain Execution.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

SoK: Privacy-Preserving Data Synthesis.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

TextGuard: Provable Defense against Backdoor Attacks on Text Classification.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

<i>ThreatKG: </i> An AI-Powered System for Automated Open-Source Cyber Threat Intelligence Gathering and Management.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024

RigorLLM: Resilient Guardrails for Large Language Models against Undesired Content.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

SHINE: Shielding Backdoors in Deep Reinforcement Learning.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Position: Evolving AI Collectives Enhance Human Diversity and Enable Self-Regulation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024


C-RAG: Certified Generation Risks for Retrieval-Augmented Language Models.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Decoding Compressed Trust: Scrutinizing the Trustworthiness of Efficient LLMs Under Compression.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Agent Instructs Large Language Models to be General Zero-Shot Reasoners.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

GRATH: Gradual Self-Truthifying for Large Language Models.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Effective and Efficient Federated Tree Learning on Hybrid Data.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

The False Promise of Imitating Proprietary Language Models.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

What Drives the (In)stability of a Stablecoin?
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

Hidden Persuaders: LLMs' Political Leaning and Their Influence on Voters.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Language Models.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

"I Can't Believe It's Not Custodial!": Usable Trustless Decentralized Key Management.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

Re-Tuning: Overcoming the Compositionality Limits of Large Language Models with Recursive Tuning.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024

2023
Exploring the Privacy Risks of Adversarial VR Game Design.
Proc. Priv. Enhancing Technol., October, 2023

Lessons Learned: Surveying the Practicality of Differential Privacy in the Industry.
Proc. Priv. Enhancing Technol., April, 2023

Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses.
IEEE Trans. Pattern Anal. Mach. Intell., 2023

Secure Floating-Point Training.
IACR Cryptol. ePrint Arch., 2023

Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2023

Ratel: MPC-extensions for Smart Contracts.
IACR Cryptol. ePrint Arch., 2023

Blockchain Large Language Models.
IACR Cryptol. ePrint Arch., 2023

SoK: Data Sovereignty.
IACR Cryptol. ePrint Arch., 2023

Identifying and Mitigating the Security Risks of Generative AI.
Found. Trends Priv. Secur., 2023

SoK: The Gap Between Data Rights Ideals and Reality.
CoRR, 2023

Deep Motion Masking for Secure, Usable, and Scalable Real-Time Anonymization of Virtual Reality Motion Data.
CoRR, 2023

Managing AI Risks in an Era of Rapid Progress.
CoRR, 2023

Representation Engineering: A Top-Down Approach to AI Transparency.
CoRR, 2023

Berkeley Open Extended Reality Recordings 2023 (BOXRR-23): 4.7 Million Motion Capture Recordings from 105, 852 Extended Reality Device Users.
CoRR, 2023

Identifying and Mitigating the Security Risks of Generative AI.
CoRR, 2023

What Drives the (In)stability of a Stablecoin?
CoRR, 2023

CONTRACTFIX: A Framework for Automatically Fixing Vulnerabilities in Smart Contracts.
CoRR, 2023

MFDPG: Multi-Factor Authenticated Password Management With Zero Stored Secrets.
CoRR, 2023

Do you still need a manual smart contract audit?
CoRR, 2023

Inferring Private Personal Attributes of Virtual Reality Users from Head and Hand Motion Data.
CoRR, 2023

The False Promise of Imitating Proprietary LLMs.
CoRR, 2023

Towards Automated Security Analysis of Smart Contracts based on Execution Property Graph.
CoRR, 2023

Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice.
CoRR, 2023

The Blockchain Imitation Game.
Proceedings of the 32nd USENIX Security Symposium, 2023

Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management.
Proceedings of the 32nd USENIX Security Symposium, 2023

Unique Identification of 50, 000+ Virtual Reality Users from Head & Hand Motion Data.
Proceedings of the 32nd USENIX Security Symposium, 2023

PATROL: Provable Defense against Adversarial Policy in Two-player Games.
Proceedings of the 32nd USENIX Security Symposium, 2023

Going Incognito in the Metaverse: Achieving Theoretically Optimal Privacy-Usability Tradeoffs in VR.
Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology, 2023

DecodingTrust: A Comprehensive Assessment of Trustworthiness in GPT Models.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

BIRD: Generalizable Backdoor Detection and Removal for Deep Reinforcement Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Secure Federated Correlation Test and Entropy Estimation.
Proceedings of the International Conference on Machine Learning, 2023

Adversarial Collaborative Learning on Non-IID Features.
Proceedings of the International Conference on Machine Learning, 2023

DensePure: Understanding Diffusion Models for Adversarial Robustness.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Decentralizing Custodial Wallets with MFKDF.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Multi-Factor Credential Hashing for Asymmetric Brute-Force Attack Resistance.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

TrojDiff: Trojan Attacks on Diffusion Models with Diverse Targets.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Byzantine-Robust Federated Learning with Optimal Statistical Rates.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2023

2022
Parallel and Asynchronous Smart Contract Execution.
IEEE Trans. Parallel Distributed Syst., 2022

SoK: Decentralized Finance (DeFi) Attacks.
IACR Cryptol. ePrint Arch., 2022

Orion: Zero Knowledge Proof with Linear Prover Time.
IACR Cryptol. ePrint Arch., 2022

ZEBRA: Anonymous Credentials with Practical On-chain Verification and Applications to KYC in DeFi.
IACR Cryptol. ePrint Arch., 2022

ThreatKG: A Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management.
CoRR, 2022

Specular: Towards Trust-minimized Blockchain Execution Scalability with EVM-native Fraud Proofs.
CoRR, 2022

DensePure: Understanding Diffusion Models towards Adversarial Robustness.
CoRR, 2022

SoK: Decentralized Finance (DeFi) Incidents.
CoRR, 2022

Going Incognito in the Metaverse.
CoRR, 2022

Multi-Factor Key Derivation Function (MFKDF).
CoRR, 2022

Exploring the Unprecedented Privacy Risks of the Metaverse.
CoRR, 2022

UniFed: A Benchmark for Federated Learning Frameworks.
CoRR, 2022

Is Vertical Logistic Regression Privacy-Preserving? A Comprehensive Privacy Analysis and Beyond.
CoRR, 2022

Byzantine-Robust Federated Learning with Optimal Statistical Rates and Privacy Guarantees.
CoRR, 2022

The Sky Above The Clouds.
CoRR, 2022

Shades of Finality and Layer 2 Scaling.
CoRR, 2022

Global perspectives of diversity, equity, and inclusion.
Commun. ACM, 2022

PrivGuard: Privacy Regulation Compliance Made Easier.
Proceedings of the 31st USENIX Security Symposium, 2022

Perturbation type categorization for multiple adversarial perturbation robustness.
Proceedings of the Uncertainty in Artificial Intelligence, 2022

Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Forecasting Future World Events With Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

How Would The Viewer Feel? Estimating Wellbeing From Video Scenarios.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Scaling Out-of-Distribution Detection for Real-World Settings.
Proceedings of the International Conference on Machine Learning, 2022

Differentially Private Fractional Frequency Moments Estimation with Polylogarithmic Space.
Proceedings of the Tenth International Conference on Learning Representations, 2022

PALT: Parameter-Lite Transfer of Language Models for Knowledge Graph Completion.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

Benchmarking Language Models for Code Syntax Understanding.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

IELM: An Open Information Extraction Benchmark for Pre-Trained Language Models.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

PixMix: Dreamlike Pictures Comprehensively Improve Safety Measures.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Joint Language Semantic and Structure Embedding for Knowledge Graph Completion.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

zkBridge: Trustless Cross-chain Bridges Made Practical.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

ConsensusDay '22: ACM Workshop on Developments in Consensus.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Characterizing Attacks on Deep Reinforcement Learning.
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022

DeepStruct: Pretraining of Language Models for Structure Prediction.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022

2021
DPlis: Boosting Utility of Differentially Private Deep Learning via Randomized Smoothing.
Proc. Priv. Enhancing Technol., 2021

SoK: Validating Bridges as a Scaling Solution for Blockchains.
IACR Cryptol. ePrint Arch., 2021

Advances and Open Problems in Federated Learning.
Found. Trends Mach. Learn., 2021

RobustART: Benchmarking Robustness on Architecture Design and Training Techniques.
CoRR, 2021

FED-χ<sub>2</sub>: Privacy Preserving Federated Correlation Test.
CoRR, 2021

Differentially Private Frequency Moments Estimation with Polylogarithmic Space.
CoRR, 2021

Extracting Training Data from Large Language Models.
Proceedings of the 30th USENIX Security Symposium, 2021

A System for Automated Open-Source Threat Intelligence Gathering and Management.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021


What Would Jiminy Cricket Do? Towards Agents That Behave Morally.
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021

Measuring Coding Challenge Competence With APPS.
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021

Measuring Mathematical Problem Solving With the MATH Dataset.
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021

Latent Execution for Neural Program Synthesis Beyond Domain-Specific Languages.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

ADVM'21: 1st International Workshop on Adversarial Learning for Multimedia.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Practical One-Shot Federated Learning for Cross-Silo Setting.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

TeraPipe: Token-Level Pipeline Parallelism for Training Large-Scale Language Models.
Proceedings of the 38th International Conference on Machine Learning, 2021

Measuring Massive Multitask Language Understanding.
Proceedings of the 9th International Conference on Learning Representations, 2021

Aligning AI With Shared Human Values.
Proceedings of the 9th International Conference on Learning Representations, 2021

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

The Many Faces of Robustness: A Critical Analysis of Out-of-Distribution Generalization.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Zero-Shot Information Extraction as a Unified Text-to-Triple Translation.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

Grounded Graph Decoding improves Compositional Generalization in Question Answering.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021

Model-Contrastive Federated Learning.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Scalability vs. Utility: Do We Have To Sacrifice One for the Other in Data Importance Quantification?
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Natural Adversarial Examples.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Towards Building a Responsible Data Economy.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited Data.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

PlotCoder: Hierarchical Decoding for Synthesizing Visualization Code in Programmatic Context.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

2020
A Principled Approach to Data Valuation for Federated Learning.
Proceedings of the Federated Learning - Privacy and Incentive, 2020

The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts.
IEEE Secur. Priv., 2020

Building Open Trusted Execution Environments.
IEEE Secur. Priv., 2020

MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs.
IACR Cryptol. ePrint Arch., 2020

Epione: Lightweight Contact Tracing with Strong Privacy.
IEEE Data Eng. Bull., 2020

BeeTrace: A Unified Platform for Secure Contact Tracing that Breaks Data Silos.
IEEE Data Eng. Bull., 2020

PrivFramework: A System for Configurable and Automated Privacy Policy Compliance.
CoRR, 2020

Towards Defending Multiple Adversarial Perturbations via Gated Batch Normalization.
CoRR, 2020

Language Models are Open Knowledge Graphs.
CoRR, 2020

F2ED-Learning: Good Fences Make Good Neighbors.
CoRR, 2020

Model-Agnostic Round-Optimal Federated Learning via Knowledge Transfer.
CoRR, 2020

A Principled Approach to Data Valuation for Federated Learning.
CoRR, 2020

Anomalous Instance Detection in Deep Learning: A Survey.
CoRR, 2020

Proceedings of the AAAI-20 Workshop on Intelligent Process Automation (IPA-20).
CoRR, 2020

Anomalous Example Detection in Deep Learning: A Survey.
IEEE Access, 2020

FalconDB: Blockchain-based Collaborative Database.
Proceedings of the 2020 International Conference on Management of Data, 2020

Towards practical differentially private causal graph discovery.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Synthesize, Execute and Debug: Learning to Repair for Neural Program Synthesis.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Compositional Generalization via Neural-Symbolic Stack Machines.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Robust anomaly detection and backdoor attack detection via differential privacy.
Proceedings of the 8th International Conference on Learning Representations, 2020

Neural Symbolic Reader: Scalable Integration of Distributed and Symbolic Representations for Reading Comprehension.
Proceedings of the 8th International Conference on Learning Representations, 2020

Towards Inspecting and Eliminating Trojan Backdoors in Deep Neural Networks.
Proceedings of the 20th IEEE International Conference on Data Mining, 2020

Keystone: an open framework for architecting trusted execution environments.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020

Chorus: a Programming Framework for Building Scalable Differential Privacy Mechanisms.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Imitation Attacks and Defenses for Black-box Machine Translation Systems.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020

The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Zero Knowledge Proofs for Decision Tree Predictions and Accuracy.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

AI and Security: Lessons, Challenges and Future Directions.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Pretrained Transformers Improve Out-of-Distribution Robustness.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

2019
Efficient Task-Specific Data Valuation for Nearest Neighbor Algorithms.
Proc. VLDB Endow., 2019

Duet: an expressive higher-order language and linear type system for statically enforcing differential privacy.
Proc. ACM Program. Lang., 2019

Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.
IACR Cryptol. ePrint Arch., 2019

Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation.
IACR Cryptol. ePrint Arch., 2019

CHURP: Dynamic-Committee Proactive Secret Sharing.
IACR Cryptol. ePrint Arch., 2019

Sanctorum: A lightweight security monitor for secure enclaves.
IACR Cryptol. ePrint Arch., 2019

Hierarchical Variational Imitation Learning of Control Programs.
CoRR, 2019

Advances and Open Problems in Federated Learning.
CoRR, 2019

A Benchmark for Anomaly Segmentation.
CoRR, 2019

An Empirical and Comparative Analysis of Data Valuation with Scalable Algorithms.
CoRR, 2019

TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems.
CoRR, 2019

Keystone: A Framework for Architecting TEEs.
CoRR, 2019

Characterizing Attacks on Deep Reinforcement Learning.
CoRR, 2019

How You Act Tells a Lot: Privacy-Leakage Attack on Deep Reinforcement Learning.
CoRR, 2019

SysML: The New Frontier of Machine Learning Systems.
CoRR, 2019

Data Capsule: A New Paradigm for Automatic Compliance with Data Privacy Regulations.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019

DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks.
Proceedings of the 28th USENIX Security Symposium, 2019

Towards Practical Differentially Private Convex Optimization.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

REINAM: reinforcement learning for input-grammar inference.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Using Self-Supervised Learning Can Improve Model Robustness and Uncertainty.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

Characterizing Audio Adversarial Examples Using Temporal Dependency.
Proceedings of the 7th International Conference on Learning Representations, 2019

Synthetic Datasets for Neural Program Synthesis.
Proceedings of the 7th International Conference on Learning Representations, 2019

GamePad: A Learning Environment for Theorem Proving.
Proceedings of the 7th International Conference on Learning Representations, 2019

Execution-Guided Neural Program Synthesis.
Proceedings of the 7th International Conference on Learning Representations, 2019

AdvIT: Adversarial Frames Identifier Based on Temporal Consistency in Videos.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Detecting Fake Accounts in Online Social Networks at the Time of Registrations.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Lifelong Anomaly Detection Through Unlearning.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

How You Act Tells a Lot: Privacy-Leaking Attack on Deep Reinforcement Learning.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Towards Efficient Data Valuation Based on the Shapley Value.
Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics, 2019

Impossibility of Full Decentralization in Permissionless Blockchains.
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019

2018
Towards Practical Differential Privacy for SQL Queries.
Proc. VLDB Endow., 2018

A Demonstration of Sterling: A Privacy-Preserving Data Marketplace.
Proc. VLDB Endow., 2018

Data Poisoning Attack against Unsupervised Node Embedding Methods.
CoRR, 2018

Assessing Generalization in Deep Reinforcement Learning.
CoRR, 2018

Chorus: Differential Privacy via Query Rewriting.
CoRR, 2018

Efficient Deep Learning on Multi-Source Private Data.
CoRR, 2018

Curriculum Adversarial Training.
CoRR, 2018

Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution.
CoRR, 2018

The Secret Sharer: Measuring Unintended Neural Network Memorization & Extracting Secrets.
CoRR, 2018

Physical Adversarial Examples for Object Detectors.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

A Machine Learning Approach to Prevent Malicious Calls over Telephony Networks.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Adversarial Examples for Generative Models.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Improving Neural Program Synthesis with Inferred Execution Traces.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Tree-to-tree Neural Networks for Program Translation.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

PerfFuzz: automatically generating pathological inputs.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018

Generating Adversarial Examples with Adversarial Networks.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Curriculum Adversarial Training.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Spatially Transformed Adversarial Examples.
Proceedings of the 6th International Conference on Learning Representations, 2018

Towards Specification-Directed Program Repair.
Proceedings of the 6th International Conference on Learning Representations, 2018

Differentiable Neural Network Architecture Search.
Proceedings of the 6th International Conference on Learning Representations, 2018

Gradients explode - Deep Networks are shallow - ResNet explained.
Proceedings of the 6th International Conference on Learning Representations, 2018

Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality.
Proceedings of the 6th International Conference on Learning Representations, 2018

Decision Boundary Analysis of Adversarial Examples.
Proceedings of the 6th International Conference on Learning Representations, 2018

Parametrized Hierarchical Procedures for Neural Programming.
Proceedings of the 6th International Conference on Learning Representations, 2018

Towards Synthesizing Complex Programs From Input-Output Examples.
Proceedings of the 6th International Conference on Learning Representations, 2018

Black-box Attacks on Deep Neural Networks via Gradient Estimation.
Proceedings of the 6th International Conference on Learning Representations, 2018

Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation.
Proceedings of the Computer Vision - ECCV 2018, 2018

Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms.
Proceedings of the Computer Vision - ECCV 2018, 2018

Fooling Vision and Language Models Despite Localization and Attention Mechanism.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

Robust Physical-World Attacks on Deep Learning Visual Classification.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Code-pointer integrity.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

2017
Distributed Private Data Analysis: Lower Bounds and Practical Constructions.
ACM Trans. Algorithms, 2017

Exploring the Space of Black-box Attacks on Deep Neural Networks.
CoRR, 2017

Note on Attacking Object Detectors with Adversarial Stickers.
CoRR, 2017

A Berkeley View of Systems Challenges for AI.
CoRR, 2017

Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning.
CoRR, 2017

SQLNet: Generating Structured Queries From Natural Language Without Reinforcement Learning.
CoRR, 2017

Can you fool AI with adversarial examples on a visual Turing test?
CoRR, 2017

Practical Differential Privacy for SQL Queries Using Elastic Sensitivity.
CoRR, 2017

Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong.
CoRR, 2017

Robust Physical-World Attacks on Machine Learning Models.
CoRR, 2017

Learning Neural Programs To Parse Programs.
CoRR, 2017

Using EEG-Based BCI Devices to Subliminally Probe for Private Information.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Adversarial Example Defense: Ensembles of Weak Defenses are not Strong.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Delving into Transferable Adversarial Examples and Black-box Attacks.
Proceedings of the 5th International Conference on Learning Representations, 2017

Delving into adversarial attacks on deep policies.
Proceedings of the 5th International Conference on Learning Representations, 2017

Making Neural Programming Architectures Generalize via Recursion.
Proceedings of the 5th International Conference on Learning Representations, 2017

PIANO: Proximity-Based User Authentication on Voice-Powered Internet-of-Things Devices.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
The Honey Badger of BFT Protocols.
IACR Cryptol. ePrint Arch., 2016

Latent Attention For If-Then Program Synthesis.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

VTrust: Regaining Trust on Virtual Calls.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

ExploreKit: Automatic Feature Generation and Selection.
Proceedings of the IEEE 16th International Conference on Data Mining, 2016

Formal verification for computer security: Lessons learned and future directions.
Proceedings of the 2016 Formal Methods in Computer-Aided Design, 2016

On Scaling Decentralized Blockchains - (A Position Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

Smart Locks: Lessons for Securing Commodity Internet of Things Devices.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Recognizing Functions in Binaries with Neural Networks.
Proceedings of the 24th USENIX Security Symposium, 2015

The Correctness-Security Gap in Compiler Optimization.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

VTint: Protecting Virtual Function Tables' Integrity.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

JITScope: Protecting web users from control-flow hijacking attacks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

ASPIRE: Iterative Specification Synthesis for Security.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

2014
Joint Link Prediction and Attribute Inference Using a Social-Attribute Network.
ACM Trans. Intell. Syst. Technol., 2014

Clickjacking Revisited: A Perceptual View of UI Security.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

The Emperor's New Password Manager: Security Analysis of Web-based Password Managers.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Code-Pointer Integrity.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

ShadowCrypt: Encrypted Web Applications for Everyone.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Automatic Malware Analysis - An Emulator Based Approach.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-5523-3, 2013

Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication.
IEEE Trans. Inf. Forensics Secur., 2013

Reciprocity in Social Networks: Measurements, Predictions, and Implications
CoRR, 2013

Subliminal Probing for Private Information via EEG-Based BCI Devices.
CoRR, 2013

Automatic protocol reverse-engineering: Message format extraction and field semantics inference.
Comput. Networks, 2013

Practical Control Flow Integrity and Randomization for Binary Executables.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

SoK: Eternal War in Memory.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

SAFE: Secure authentication with Face and Eyes.
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013

Understanding Mobile App Usage Patterns Using In-App Advertisements.
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

Preserving Link Privacy in Social Network Based Systems.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Contextual Policy Enforcement in Android Applications with Permission Event Graphs.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

BLITZ: Compositional bounded model checking for real-world programs.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

NetworkProfiler: Towards automatic fingerprinting of Android apps.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism.
Proceedings of the Computer Security - ESORICS 2013, 2013

Data-Confined HTML5 Applications.
Proceedings of the Computer Security - ESORICS 2013, 2013

PHANTOM: practical oblivious computation in a secure processor.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
A Learning-Based Approach to Reactive Security.
IEEE Trans. Dependable Secur. Comput., 2012

Optimal Lower Bound for Differentially Private Multi-Party Aggregation.
IACR Cryptol. ePrint Arch., 2012

Recognizing malicious software behaviors with tree automata inference.
Formal Methods Syst. Des., 2012

Mining Permission Request Patterns from Android and Facebook Applications (extended author version)
CoRR, 2012

Cloud Data Protection for the Masses.
Computer, 2012

Context-centric Security.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Privilege Separation in HTML5 Applications.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

On the Feasibility of Internet-Scale Author Identification.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

GUPT: privacy preserving data analysis made easy.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2012

Towards Practical Oblivious RAM.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

FreeMarket: Shopping for free in Android applications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Opaak: using mobile phones to limit anonymous identities online.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Evolution of social-attribute networks: measurements, modeling, and implications using google+.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

Predicting Congressional Votes Based on Campaign Finance Data.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

Mining Permission Request Patterns from Android and Facebook Applications.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

Path-exploration lifting: hi-fi tests for lo-fi emulators.
Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, 2012

2011
Private and Continual Release of Statistics.
ACM Trans. Inf. Syst. Secur., 2011

Remote data checking using provable data possession.
ACM Trans. Inf. Syst. Secur., 2011

TaintEraser: protecting sensitive data leaks using application-level taint tracking.
ACM SIGOPS Oper. Syst. Rev., 2011

Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies.
IACR Cryptol. ePrint Arch., 2011

Privacy-Preserving Stream Aggregation with Fault Tolerance.
IACR Cryptol. ePrint Arch., 2011

Secure Distributed Data Aggregation.
Found. Trends Databases, 2011

Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN)
CoRR, 2011

How Open Should Open Source Be?
CoRR, 2011

Towards Client-side HTML Security Policies.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery.
Proceedings of the 20th USENIX Security Symposium, 2011

Design and Evaluation of a Real-Time URL Spam Filtering Service.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Differential Slicing: Identifying Causal Execution Differences for Security Applications.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Privacy settings from contextual attributes: A case study using Google Buzz.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Privacy-Preserving Aggregation of Time-Series Data.
Proceedings of the Network and Distributed System Security Symposium, 2011

DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation.
Proceedings of the Network and Distributed System Security Symposium, 2011

Statically-directed dynamic automated test generation.
Proceedings of the 20th International Symposium on Software Testing and Analysis, 2011

Suspended accounts in retrospect: an analysis of twitter spam.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

A Systematic Analysis of XSS Sanitization in Web Application Frameworks.
Proceedings of the Computer Security - ESORICS 2011, 2011

Context-sensitive auto-sanitization in web templating languages using type qualifiers.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Android permissions demystified.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Malware Analysis with Tree Automata Inference.
Proceedings of the Computer Aided Verification - 23rd International Conference, 2011

2010
Cyber SA: Situational Awareness for Cyber Defense.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

A Symbolic Execution Framework for JavaScript.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.
Proceedings of the Network and Distributed System Security Symposium, 2010

Binary Code Extraction and Interface Identification for Security Applications.
Proceedings of the Network and Distributed System Security Symposium, 2010

Insights from the Inside: A View of Botnet Management from Infiltration.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010

Signatures of Reputation.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

HookScout: Proactive Binary-Centric Hook Detection.
Proceedings of the Detection of Intrusions and Malware, 2010

Towards a Formal Foundation of Web Security.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

Inference and analysis of formal models of botnet command and control protocols.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Input generation via decomposition and re-stitching: finding bugs in Malware.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
New Techniques for Private Stream Searching.
ACM Trans. Inf. Syst. Secur., 2009

Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance.
IEEE Trans. Dependable Secur. Comput., 2009

Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense.
Proceedings of the 18th USENIX Security Symposium, 2009

Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Measuring channel capacity to distinguish undue influence.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009

Tracking Dynamic Sources of Malicious Activity at Internet Scale.
Proceedings of the Advances in Neural Information Processing Systems 22: 23rd Annual Conference on Neural Information Processing Systems 2009. Proceedings of a meeting held 7-10 December 2009, 2009

Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense.
Proceedings of the Network and Distributed System Security Symposium, 2009

Loop-extended symbolic execution on binary programs.
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009

Emulating emulation-resistant malware.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009

Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Automatically Identifying Trigger-based Behavior in Malware.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.
IEEE Trans. Dependable Secur. Comput., 2008

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

HookFinder: Identifying and Understanding Malware Hooking Behaviors.
Proceedings of the Network and Distributed System Security Symposium, 2008

Limits of Learning-based Signature Generation with Adversaries.
Proceedings of the Network and Distributed System Security Symposium, 2008

Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects?
Proceedings of the Network and Distributed System Security Symposium, 2008

Analysis-Resistant Malware.
Proceedings of the Network and Distributed System Security Symposium, 2008

BitBlaze: A New Approach to Computer Security via Binary Analysis.
Proceedings of the Information Systems Security, 4th International Conference, 2008

BinHunt: Automatically Finding Semantic Differences in Binary Programs.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

2007
Sting: An End-to-End Self-Healing System for Defending against Internet Worms.
Proceedings of the Malware Detection, 2007

SIA: Secure information aggregation in sensor networks.
J. Comput. Secur., 2007

Provable Data Possession at Untrusted Stores.
IACR Cryptol. ePrint Arch., 2007

Exploiting Network Structure for Proactive Spam Mitigation.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Dynamic Spyware Analysis.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Multi-Dimensional Range Query over Encrypted Data.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Fig: Automatic Fingerprint Generation.
Proceedings of the Network and Distributed System Security Symposium, 2007

RICH: Automatically Protecting Against Integer-Based Vulnerabilities.
Proceedings of the Network and Distributed System Security Symposium, 2007

Detecting Stealthy Spreaders Using Online Outdegree Histograms.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

Sweeper: a lightweight end-to-end system for defending against fast worms.
Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, 2007

Distributed Evasive Scan Techniques and Countermeasures.
Proceedings of the Detection of Intrusions and Malware, 2007

Creating Vulnerability Signatures Using Weakest Preconditions.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

Panorama: capturing system-wide information flow for malware detection and analysis.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Polyglot: automatic extraction of protocol message format using dynamic binary analysis.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense.
IEEE J. Sel. Areas Commun., 2006

Towards Attack-Agnostic Defenses.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006

Towards Automatic Generation of Vulnerability-Based Signatures.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

New Constructions and Practical Applications for Private Stream Searching (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Paragraph: Thwarting Signature Learning by Training Maliciously.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Behavioral Distance Measurement Using Hidden Markov Models.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.
Proceedings of the Network and Distributed System Security Symposium, 2006

Black Box Anomaly Detection: Is It Utopian?.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006

Replayer: automatic protocol replay by binary analysis.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

Secure hierarchical in-network aggregation in sensor networks.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

Design space and analysis of worm defense strategies.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction.
RFC, June, 2005

Polygraph: Automatically Generating Signatures for Polymorphic Worms.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Semantics-Aware Malware Detection.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Behavioral Distance for Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

New Streaming Algorithms for Fast Detection of Superspreaders.
Proceedings of the Network and Distributed System Security Symposium, 2005

Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
Proceedings of the Network and Distributed System Security Symposium, 2005

A Generic Scheme for Zero-Knowledge Sets.
Proceedings of the Applied Public Key Infrastructure, 2005

FIT: fast Internet traceback.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Privacy-Preserving Set Operations.
Proceedings of the Advances in Cryptology, 2005

2004
On Gray-Box Program Tracking for Anomaly Detection.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Privtrans: Automatically Partitioning Programs for Privilege Separation.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

The sybil attack in sensor networks: analysis & defenses.
Proceedings of the Third International Symposium on Information Processing in Sensor Networks, 2004

Dynamic Quarantine of Internet Worms.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Gray-box extraction of execution graphs for anomaly detection.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

Private Keyword-Based Push and Pull with Applications to Anonymous Communication.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Pi: A Path Identification Mechanism to Defend against DDoS Attack.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Random Key Predistribution Schemes for Sensor Networks.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

SIA: secure information aggregation in sensor networks.
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003

GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information.
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003

2002
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Homomorphic Signature Schemes.
Proceedings of the Topics in Cryptology, 2002

2001
Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis.
J. Comput. Secur., 2001

Quasi-Efficient Revocation of Group Signatures.
IACR Cryptol. ePrint Arch., 2001

Timing Analysis of Keystrokes and Timing Attacks on SSH.
Proceedings of the 10th USENIX Security Symposium, 2001

ELK, A New Protocol for Efficient Large-Group Key Distribution.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Efficient and Secure Source Authentication for Multicast.
Proceedings of the Network and Distributed System Security Symposium, 2001

SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

Advanced and Authenticated Marking Schemes for IP Traceback.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

Practical forward secure group signature schemes.
Proceedings of the CCS 2001, 2001

A Cryptanalysis of the High-Bandwidth Digital Content Protection System.
Proceedings of the Security and Privacy in Digital Rights Management, 2001

AGVI - Automatic Generation, Verification, and Implementation of Security Protocols.
Proceedings of the Computer Aided Verification, 13th International Conference, 2001

2000
Practical Techniques for Searches on Encrypted Data.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

A First Step Towards the Automatic Generation of Security Protocols.
Proceedings of the Network and Distributed System Security Symposium, 2000

Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

1999
Athena: A New Efficient Automatic Checker for Security Protocol Analysis.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999


  Loading...