Dawn Song
Orcid: 0000-0001-9745-6802Affiliations:
- University of California, Berkeley, Computer Science Division
According to our database1,
Dawn Song
authored at least 426 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2019, "For contributions to security and privacy".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on twitter.com
-
on twidter.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proc. VLDB Endow., July, 2024
Berkeley Open Extended Reality Recordings 2023 (BOXRR-23): 4.7 Million Motion Capture Recordings from 105,000 XR Users.
IEEE Trans. Vis. Comput. Graph., May, 2024
Truth in Motion: The Unprecedented Risks and Opportunities of Extended Reality Motion Data.
IEEE Secur. Priv., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
From Experts to the Public: Governing Multimodal Language Models in Politically Sensitive Video Analysis.
CoRR, 2024
AutoScale: Automatic Prediction of Compute-optimal Data Composition for Training LLMs.
CoRR, 2024
AIR-Bench 2024: A Safety Benchmark Based on Risk Categories from Regulations and Policies.
CoRR, 2024
CoRR, 2024
AI Risk Categorization Decoded (AIR 2024): From Government Regulations to Corporate Policies.
CoRR, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Inferring Private Personal Attributes of Virtual Reality Users from Ecologically Valid Head and Hand Motion Data.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2024
Deep Motion Masking for Secure, Usable, and Scalable Real-Time Anonymization of Ecological Virtual Reality Motion Data.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Position: Evolving AI Collectives Enhance Human Diversity and Enable Self-Regulation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Decoding Compressed Trust: Scrutinizing the Trustworthiness of Efficient LLMs Under Compression.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Language Models.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
"I Can't Believe It's Not Custodial!": Usable Trustless Decentralized Key Management.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
Re-Tuning: Overcoming the Compositionality Limits of Large Language Models with Recursive Tuning.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024
2023
Proc. Priv. Enhancing Technol., October, 2023
Proc. Priv. Enhancing Technol., April, 2023
Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses.
IEEE Trans. Pattern Anal. Mach. Intell., 2023
IACR Cryptol. ePrint Arch., 2023
Found. Trends Priv. Secur., 2023
Deep Motion Masking for Secure, Usable, and Scalable Real-Time Anonymization of Virtual Reality Motion Data.
CoRR, 2023
Berkeley Open Extended Reality Recordings 2023 (BOXRR-23): 4.7 Million Motion Capture Recordings from 105, 852 Extended Reality Device Users.
CoRR, 2023
CONTRACTFIX: A Framework for Automatically Fixing Vulnerabilities in Smart Contracts.
CoRR, 2023
CoRR, 2023
Inferring Private Personal Attributes of Virtual Reality Users from Head and Hand Motion Data.
CoRR, 2023
Towards Automated Security Analysis of Smart Contracts based on Execution Property Graph.
CoRR, 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management.
Proceedings of the 32nd USENIX Security Symposium, 2023
Unique Identification of 50, 000+ Virtual Reality Users from Head & Hand Motion Data.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Going Incognito in the Metaverse: Achieving Theoretically Optimal Privacy-Usability Tradeoffs in VR.
Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2023
2022
IEEE Trans. Parallel Distributed Syst., 2022
IACR Cryptol. ePrint Arch., 2022
ZEBRA: Anonymous Credentials with Practical On-chain Verification and Applications to KYC in DeFi.
IACR Cryptol. ePrint Arch., 2022
ThreatKG: A Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management.
CoRR, 2022
Specular: Towards Trust-minimized Blockchain Execution Scalability with EVM-native Fraud Proofs.
CoRR, 2022
Is Vertical Logistic Regression Privacy-Preserving? A Comprehensive Privacy Analysis and Beyond.
CoRR, 2022
Byzantine-Robust Federated Learning with Optimal Statistical Rates and Privacy Guarantees.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the Uncertainty in Artificial Intelligence, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the International Conference on Machine Learning, 2022
Differentially Private Fractional Frequency Moments Estimation with Polylogarithmic Space.
Proceedings of the Tenth International Conference on Learning Representations, 2022
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the 29th International Conference on Computational Linguistics, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022
2021
DPlis: Boosting Utility of Differentially Private Deep Learning via Randomized Smoothing.
Proc. Priv. Enhancing Technol., 2021
IACR Cryptol. ePrint Arch., 2021
CoRR, 2021
CoRR, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021
Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the NeurIPS 2022 Competition Track, 2021
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the 9th International Conference on Learning Representations, 2021
Proceedings of the 9th International Conference on Learning Representations, 2021
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021
The Many Faces of Robustness: A Critical Analysis of Out-of-Distribution Generalization.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Scalability vs. Utility: Do We Have To Sacrifice One for the Other in Data Importance Quantification?
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited Data.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
PlotCoder: Hierarchical Decoding for Synthesizing Visualization Code in Programmatic Context.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021
2020
Proceedings of the Federated Learning - Privacy and Incentive, 2020
The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts.
IEEE Secur. Priv., 2020
MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs.
IACR Cryptol. ePrint Arch., 2020
IEEE Data Eng. Bull., 2020
CoRR, 2020
CoRR, 2020
CoRR, 2020
Proceedings of the 2020 International Conference on Management of Data, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the 8th International Conference on Learning Representations, 2020
Neural Symbolic Reader: Scalable Integration of Distributed and Symbolic Representations for Reading Comprehension.
Proceedings of the 8th International Conference on Learning Representations, 2020
Proceedings of the 20th IEEE International Conference on Data Mining, 2020
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020
Chorus: a Programming Framework for Building Scalable Differential Privacy Mechanisms.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020
The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020
2019
Proc. VLDB Endow., 2019
Duet: an expressive higher-order language and linear type system for statically enforcing differential privacy.
Proc. ACM Program. Lang., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
CoRR, 2019
TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems.
CoRR, 2019
CoRR, 2019
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019
DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019
The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019
Proceedings of the 7th International Conference on Learning Representations, 2019
Proceedings of the 7th International Conference on Learning Representations, 2019
Proceedings of the 7th International Conference on Learning Representations, 2019
Proceedings of the 7th International Conference on Learning Representations, 2019
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019
Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics, 2019
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019
2018
Proc. VLDB Endow., 2018
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution.
CoRR, 2018
The Secret Sharer: Measuring Unintended Neural Network Memorization & Extracting Secrets.
CoRR, 2018
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Proceedings of the 6th International Conference on Learning Representations, 2018
Proceedings of the 6th International Conference on Learning Representations, 2018
Proceedings of the 6th International Conference on Learning Representations, 2018
Proceedings of the 6th International Conference on Learning Representations, 2018
Proceedings of the 6th International Conference on Learning Representations, 2018
Proceedings of the 6th International Conference on Learning Representations, 2018
Proceedings of the 6th International Conference on Learning Representations, 2018
Proceedings of the 6th International Conference on Learning Representations, 2018
Proceedings of the 6th International Conference on Learning Representations, 2018
Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation.
Proceedings of the Computer Vision - ECCV 2018, 2018
Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms.
Proceedings of the Computer Vision - ECCV 2018, 2018
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018
DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018
2017
ACM Trans. Algorithms, 2017
SQLNet: Generating Structured Queries From Natural Language Without Reinforcement Learning.
CoRR, 2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 5th International Conference on Learning Representations, 2017
Proceedings of the 5th International Conference on Learning Representations, 2017
Proceedings of the 5th International Conference on Learning Representations, 2017
PIANO: Proximity-Based User Authentication on Voice-Powered Internet-of-Things Devices.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the IEEE 16th International Conference on Data Mining, 2016
Proceedings of the 2016 Formal Methods in Computer-Aided Design, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015
2014
ACM Trans. Intell. Syst. Technol., 2014
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014
The Emperor's New Password Manager: Security Analysis of Web-based Password Managers.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-5523-3, 2013
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication.
IEEE Trans. Inf. Forensics Secur., 2013
CoRR, 2013
Automatic protocol reverse-engineering: Message format extraction and field semantics inference.
Comput. Networks, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
IACR Cryptol. ePrint Arch., 2012
Formal Methods Syst. Des., 2012
Mining Permission Request Patterns from Android and Facebook Applications (extended author version)
CoRR, 2012
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the 2012 USENIX Annual Technical Conference, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 10th International Conference on Mobile Systems, 2012
Evolution of social-attribute networks: measurements, modeling, and implications using google+.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012
Proceedings of the 12th IEEE International Conference on Data Mining, 2012
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012
Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
ACM SIGOPS Oper. Syst. Rev., 2011
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
CoRR, 2011
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011
Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011
MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery.
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Differential Slicing: Identifying Causal Execution Differences for Security Applications.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation.
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 20th International Symposium on Software Testing and Analysis, 2011
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011
Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Context-sensitive auto-sanitization in web templating languages using type qualifiers.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Computer Aided Verification - 23rd International Conference, 2011
2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the Detection of Intrusions and Malware, 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance.
IEEE Trans. Dependable Secur. Comput., 2009
Proceedings of the 18th USENIX Security Symposium, 2009
Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009
Proceedings of the Advances in Neural Information Processing Systems 22: 23rd Annual Conference on Neural Information Processing Systems 2009. Proceedings of a meeting held 7-10 December 2009, 2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008
IEEE Trans. Dependable Secur. Comput., 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects?
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
2007
Proceedings of the Malware Detection, 2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Proceedings of the 2007 USENIX Annual Technical Conference, 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007
Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, 2007
Proceedings of the Detection of Intrusions and Malware, 2007
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Polyglot: automatic extraction of protocol message format using dynamic binary analysis.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense.
IEEE J. Sel. Areas Commun., 2006
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
New Constructions and Practical Applications for Private Stream Searching (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.
Proceedings of the Network and Distributed System Security Symposium, 2006
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction.
RFC, June, 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
Proceedings of the Network and Distributed System Security Symposium, 2005
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
Proceedings of the Network and Distributed System Security Symposium, 2005
Proceedings of the Applied Public Key Infrastructure, 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004
Proceedings of the Third International Symposium on Information Processing in Sensor Networks, 2004
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003
GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information.
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003
2002
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002
2001
J. Comput. Secur., 2001
Proceedings of the 10th USENIX Security Symposium, 2001
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001
Proceedings of the Network and Distributed System Security Symposium, 2001
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001
Proceedings of the Security and Privacy in Digital Rights Management, 2001
Proceedings of the Computer Aided Verification, 13th International Conference, 2001
2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Proceedings of the Network and Distributed System Security Symposium, 2000
Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000
1999
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999