What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Dawn Xiaodong Song
Google Scholar
46
publications in security and cryptology related venues
Year
Venue
Title
2015
conf/sp
The Correctness-Security Gap in Compiler Optimization.
Vijay D'Silva
Mathias Payer
Dawn Xiaodong Song
2014
conf/ccs
ShadowCrypt: Encrypted Web Applications for Everyone.
Warren He
Devdatta Akhawe
Sumeet Jain
Elaine Shi
Dawn Xiaodong Song
2013
conf/ndss
Contextual Policy Enforcement in Android Applications with Permission Event Graphs.
Kevin Zhijie Chen
Noah M. Johnson
Vijay D'Silva
Shuaifu Dai
Kyle MacNamara
Thomas R. Magrino
Edward XueJun Wu
Martin C. Rinard
Dawn Xiaodong Song
2013
conf/ndss
Preserving Link Privacy in Social Network Based Systems.
Prateek Mittal
Charalampos Papamanthou
Dawn Xiaodong Song
2012
conf/ndss
FreeMarket: Shopping for free in Android applications.
Daniel Reynaud
Dawn Xiaodong Song
Thomas R. Magrino
Edward XueJun Wu
Eui Chul Richard Shin
2012
conf/ndss
Towards Practical Oblivious RAM.
Emil Stefanov
Elaine Shi
Dawn Xiaodong Song
2009
conf/ccs
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering.
Juan Caballero
Pongsin Poosankam
Christian Kreibich
Dawn Xiaodong Song
2008
conf/sp
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications.
David Brumley
Pongsin Poosankam
Dawn Xiaodong Song
Jiang Zheng
2008
conf/iciss
BitBlaze: A New Approach to Computer Security via Binary Analysis.
Dawn Xiaodong Song
David Brumley
Heng Yin
Juan Caballero
Ivan Jager
Min Gyung Kang
Zhenkai Liang
James Newsome
Pongsin Poosankam
Prateek Saxena
2008
conf/icics
BinHunt: Automatically Finding Semantic Differences in Binary Programs.
Debin Gao
Michael K. Reiter
Dawn Xiaodong Song
2007
conf/ccs
Panorama: capturing system-wide information flow for malware detection and analysis.
Heng Yin
Dawn Xiaodong Song
Manuel Egele
Christopher Kruegel
Engin Kirda
2007
conf/ccs
Polyglot: automatic extraction of protocol message format using dynamic binary analysis.
Juan Caballero
Heng Yin
Zhenkai Liang
Dawn Xiaodong Song
2007
conf/ccs
Provable data possession at untrusted stores.
Giuseppe Ateniese
Randal C. Burns
Reza Curtmola
Joseph Herring
Lea Kissner
Zachary N. J. Peterson
Dawn Xiaodong Song
2007
conf/sp
Multi-Dimensional Range Query over Encrypted Data.
Elaine Shi
John Bethencourt
T.-H. Hubert Chan
Dawn Xiaodong Song
Adrian Perrig
2007
conf/ndss
Fig: Automatic Fingerprint Generation.
Shobha Venkataraman
Juan Caballero
Pongsin Poosankam
Min Gyung Kang
Dawn Xiaodong Song
2007
conf/ndss
RICH: Automatically Protecting Against Integer-Based Vulnerabilities.
David Brumley
Dawn Xiaodong Song
Tzi-cker Chiueh
Rob Johnson
Huijia Lin
2006
conf/ccs
Replayer: automatic protocol replay by binary analysis.
James Newsome
David Brumley
Jason Franklin
Dawn Xiaodong Song
2006
conf/ccs
Secure hierarchical in-network aggregation in sensor networks.
Haowen Chan
Adrian Perrig
Dawn Xiaodong Song
2006
conf/ccs
Design space and analysis of worm defense strategies.
David Brumley
Li-Hao Liu
Pongsin Poosankam
Dawn Xiaodong Song
2006
conf/sp
New Constructions and Practical Applications for Private Stream Searching (Extended Abstract).
John Bethencourt
Dawn Xiaodong Song
Brent Waters
2006
conf/sp
Towards Automatic Generation of Vulnerability-Based Signatures.
David Brumley
James Newsome
Dawn Xiaodong Song
Hao Wang
Somesh Jha
2006
conf/ndss
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.
James Newsome
David Brumley
Dawn Xiaodong Song
2005
conf/crypto
Privacy-Preserving Set Operations.
Lea Kissner
Dawn Xiaodong Song
2005
conf/sp
Polygraph: Automatically Generating Signatures for Polymorphic Worms.
James Newsome
Brad Karp
Dawn Xiaodong Song
2005
conf/sp
Semantics-Aware Malware Detection.
Mihai Christodorescu
Somesh Jha
Sanjit A. Seshia
Dawn Xiaodong Song
Randal E. Bryant
2005
conf/ndss
New Streaming Algorithms for Fast Detection of Superspreaders.
Shobha Venkataraman
Dawn Xiaodong Song
Phillip B. Gibbons
Avrim Blum
2005
conf/ndss
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
James Newsome
Dawn Xiaodong Song
2004
conf/ccs
Gray-box extraction of execution graphs for anomaly detection.
Debin Gao
Michael K. Reiter
Dawn Xiaodong Song
2004
conf/uss
Privtrans: Automatically Partitioning Programs for Privilege Separation.
David Brumley
Dawn Xiaodong Song
2004
conf/uss
On Gray-Box Program Tracking for Anomaly Detection.
Debin Gao
Michael K. Reiter
Dawn Xiaodong Song
2004
conf/sp
SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks.
Abraham Yaar
Adrian Perrig
Dawn Xiaodong Song
2004
conf/acns
Private Keyword-Based Push and Pull with Applications to Anonymous Communication.
Lea Kissner
Alina Oprea
Michael K. Reiter
Dawn Xiaodong Song
Ke Yang
2004
conf/dsn
Dynamic Quarantine of Internet Worms.
Cynthia Wong
Chenxi Wang
Dawn Xiaodong Song
Stan Bielski
Gregory R. Ganger
2003
conf/sp
Random Key Predistribution Schemes for Sensor Networks.
Haowen Chan
Adrian Perrig
Dawn Xiaodong Song
2003
conf/sp
Pi: A Path Identification Mechanism to Defend against DDoS Attack.
Abraham Yaar
Adrian Perrig
Dawn Xiaodong Song
2002
conf/fc
Quasi-Efficient Revocation in Group Signatures.
Giuseppe Ateniese
Dawn Xiaodong Song
Gene Tsudik
2002
conf/sp
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks.
Dawn Xiaodong Song
J. D. Tygar
David Zuckerman
2002
conf/ctrsa
Homomorphic Signature Schemes.
Robert Johnson
David Molnar
Dawn Xiaodong Song
David A. Wagner
2001
conf/ccs
A Cryptanalysis of the High-Bandwidth Digital Content Protection System.
Scott A. Crosby
Ian Goldberg
Robert Johnson
Dawn Xiaodong Song
David A. Wagner
2001
conf/ccs
Practical forward secure group signature schemes.
Dawn Xiaodong Song
2001
conf/uss
Timing Analysis of Keystrokes and Timing Attacks on SSH.
Dawn Xiaodong Song
David A. Wagner
Xuqing Tian
2001
conf/sp
ELK, A New Protocol for Efficient Large-Group Key Distribution.
Adrian Perrig
Dawn Xiaodong Song
J. D. Tygar
2001
conf/ndss
Efficient and Secure Source Authentication for Multicast.
Adrian Perrig
Ran Canetti
Dawn Xiaodong Song
J. D. Tygar
2000
conf/sp
Practical Techniques for Searches on Encrypted Data.
Dawn Xiaodong Song
David A. Wagner
Adrian Perrig
2000
conf/sp
Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
Adrian Perrig
Ran Canetti
J. D. Tygar
Dawn Xiaodong Song
2000
conf/ndss
A First Step Towards the Automatic Generation of Security Protocols.
Adrian Perrig
Dawn Xiaodong Song
Coauthors
Abraham Yaar
(2)
Adrian Perrig
(10)
Alina Oprea
(1)
Avrim Blum
(1)
Brad Karp
(1)
Brent Waters
(1)
Charalampos Papamanthou
(1)
Chenxi Wang
(1)
Christian Kreibich
(1)
Christopher Kruegel
(1)
Cynthia Wong
(1)
Daniel Reynaud
(1)
David A. Wagner
(4)
David Brumley
(8)
David Molnar
(1)
David Zuckerman
(1)
Dawn Xiaodong Song
(46)
Debin Gao
(3)
Devdatta Akhawe
(1)
Edward XueJun Wu
(2)
Elaine Shi
(3)
Emil Stefanov
(1)
Engin Kirda
(1)
Eui Chul Richard Shin
(1)
Gene Tsudik
(1)
Giuseppe Ateniese
(2)
Gregory R. Ganger
(1)
Hao Wang
(1)
Haowen Chan
(2)
Heng Yin
(3)
Huijia Lin
(1)
Ian Goldberg
(1)
Ivan Jager
(1)
J. D. Tygar
(4)
James Newsome
(6)
Jason Franklin
(1)
Jiang Zheng
(1)
John Bethencourt
(2)
Joseph Herring
(1)
Juan Caballero
(4)
Ke Yang
(1)
Kevin Zhijie Chen
(1)
Kyle MacNamara
(1)
Lea Kissner
(3)
Li-Hao Liu
(1)
Manuel Egele
(1)
Martin C. Rinard
(1)
Mathias Payer
(1)
Michael K. Reiter
(4)
Mihai Christodorescu
(1)
Min Gyung Kang
(2)
Noah M. Johnson
(1)
Phillip B. Gibbons
(1)
Pongsin Poosankam
(5)
Prateek Mittal
(1)
Prateek Saxena
(1)
Ran Canetti
(2)
Randal C. Burns
(1)
Randal E. Bryant
(1)
Reza Curtmola
(1)
Rob Johnson
(1)
Robert Johnson
(2)
Sanjit A. Seshia
(1)
Scott A. Crosby
(1)
Shobha Venkataraman
(2)
Shuaifu Dai
(1)
Somesh Jha
(2)
Stan Bielski
(1)
Sumeet Jain
(1)
T.-H. Hubert Chan
(1)
Thomas R. Magrino
(2)
Tzi-cker Chiueh
(1)
Vijay D'Silva
(2)
Warren He
(1)
Xuqing Tian
(1)
Zachary N. J. Peterson
(1)
Zhenkai Liang
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to