[Back to main page]
Here you may find some of my conference
papers, journal papers, books and book chapters, technical reports, IETF Drafts, and
patents. Comments are most welcome.
- Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
-
David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, and Dawn Song. To appear in Proceedings of USENIX Security Symposium, Aug 2007.
- Exploiting Network Structure for Proactive Spam Mitigation.
-
Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, and Dawn Song. To appear in Proceedings of USENIX Security Symposium, Aug 2007.
- Creating Vulnerability Signatures Using Weakest Pre-conditions.
-
David Brumley, Hao Wang, Somesh Jha, and Dawn Song.
To appear in Proceedings of Computer Security Foundations Symposium, Jul 2007.
- Dynamic Spyware Analysis.
-
Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, and Dawn Song. To appear in Proceedings of USENIX Annual Technical Conference, Jun 2007.
- Distributed Evasive Scan Techniques and Countermeasures.
- Min Gyyng Kang, Juan Caballero, and Dawn Song. To appear in Proceedings of International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA), Jun 2007.
- Multi-Dimensional Range Query over Encrypted Data.
- Elaine Shi, John Bethencourt, Hubert Chan, Dawn Song, and Adrian Perrig. To appear in Proceedings of IEEE Security and Privacy Symposium, May 2007.
- Sweeper: a Lightweight End-to-End System for Defending against Fast Worms.
-
Joseph Tucek,
James Newsome,
Shan Lu, Chengdu Huang, Spiros Xanthos,
David Brumley,
Yuanyuan Zhou,
and Dawn Song. In Proceedings of European Conference on Computer Systems (EuroSys), Mar 2007.
- FiG: Automatic Fingerprint Generation.
- Juan Caballero,Shobha Venkataraman, Pongsin Poosankam, Min Gyung Kang, Dawn Song and Avrim Blum. In Proceedings of NDSS, Feb 2007.
- Efficient and Accurate Detection of Integer-based Attacks.
- David Brumley, Tzi-cker Chiueh, Rob Johnson, Huijia Lin, and Dawn Song. In Proceedings of NDSS, Feb 2007.
- Black-box Anomaly Detection---Is it Utopian?
-
Shobha Venkataraman, Juan Caballero, Dawn Song, Avrim Blum, Jennifer Yates. In Proceedings of HotNets, Nov 2006.
- Replayer: Automatic Protocol Replay by Binary Analysis.
-
James Newsome, David Brumley, Jason Franklin, and Dawn Song. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), October 2006.
- Secure Hierarchical In-Network Aggregation in Sensor Networks.
- Haowen Chan, Adrian Perrig, and Dawn Song. ACM CCS, November 2006.
- Thwarting Signature Learning by Training Maliciously.
-
James Newsome, Brad Karp, and Dawn Song. In Proceedings of the 9th International Symposium On Recent Advances In Intrusion Detection (RAID 2006), September 2006.
- Behavioral Distance Measurement Using Hidden Markov Models.
-
Debin Gao, Michael K. Reiter and Dawn Song
In Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006), Hamburg, Germany, September 2006.
- Towards Attack-Agnostic Defenses.
-
David Brumley and Dawn Song.
In the Proceedings of the First Workshop on Hot Topics in Security (HOTSEC 06).
- Towards Automatic Generation of Vulnerability Signatures
-
David Brumley, James Newsome, Dawn Song, Hao Wang, and Somesh Jha.
In the Proceedings of the IEEE Symposium on Security and Privacy, May 2006.
- New Constructions and Applications for Private Stream Search (Extended Abstract)
-
John Bethencourt, Dawn Song, and Brent Waters.
In the Proceedings of the IEEE Symposium on Security and Privacy, May 2006.
- Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software
-
James Newsome, David Brumley, and Dawn Song.
In the Proceedings of the 13th Annual Network and Distributed Systems Security Symposium (NDSS), 2006.
-
Behavioral Distance for Intrusion Detection
-
Debin Gao, Mike Reiter and Dawn Song. Symposium on Recent Advance in Intrusion Detection (RAID), Sep 2005.
-
Privacy Preserving Set Operations
-
Lea Kissner and Dawn Song. CRYPTO, Aug 2005.
-
Semantics-Aware Malware Detection
-
Mihai Christodorescu, Somesh Jha, Sanjit Seshia, Dawn Song, Randal E. Bryant. In IEEE Security and Privacy Symposium, May 2005.
- Polygraph: Automatic Signature Generation for Polymorphic Worms
- James Newsome, Brad Karp, Dawn Song. In IEEE Security and Privacy Symposium, May 2005.
- FIT: Fast Internet Traceback
- Abraham Yaar, Adrian Perrig, and Dawn Song. In IEEE InfoCom, March 2005.
- New Streaming Algorithms for Superspreader Detection
- Shobha Venkataraman, Dawn Song, Phil Gibbons, and Avrim Blum. In Network and Distributed Systems Security Symposium, Feb 2005.
- Dynamic Taint Analysis: Automatic Detection, Analysis, and Signature Generation of Exploit Attacks on Commodity Software
- James Newsome and Dawn Song. In Network and Distributed Systems Security Symposium, Feb 2005.
- Gray-box Extraction of Execution Graphs for Anomaly Detection
- Debin Gao, Mike Reiter, and Dawn Song. In ACM Computer and Communication Security (CCS) 2004 .
- Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds
- Avrim Blum, Dawn Song, and Shobha Venkataraman. In Conference of Recent Advance in Intrusion Detection (RAID) 2004.
- Privtrans: Automatic Privilege Separation
- David Brumley and Dawn Song. In USENIX Security Symposium 2004.
- Graybox Program Tracking for Hostbased Intrusion Detection
- Debin Gao, Mike Reiter, and Dawn Song. In USENIX Security Symposium 2004.
- SIFF: An Endhost Capability Mechanism to Mitigate DDoS Flooding Attacks
- Abraham Yaar, Adrian Perrig, and Dawn Song.
In IEEE Symposium on Security and Privacy 2004, May 2004.
-
The Sybil attack in sensor networks: analysis & defenses.
- James Newsome, Runting Shi, Dawn Song, and Adrian Perrig.
In 3rd International Symposium on Information Processing in Sensor Networks (IPSN 2004), April 2004
-
GEM: Graph Embedding for Routing and Data-Centric Storage in
Sensor Networks without Geographic Information.
- James Newsome and Dawn Song.
In ACM SenSys (Conference on Embedded Networked Sensor Systems), November 2003.
[pdf]
-
SIA: Secure Information Aggregation in
Sensor Networks.
- Bartosz Przydatek, Dawn Song, and Adrian Perrig.
In ACM SenSys (Conference on Embedded Networked Sensor Systems), November 2003.
[pdf]
-
Pi: A Path Identification Mechanism to Defend against DDoS Attacks.
- Avi Yaar, Adrian Perrig, and Dawn Song.
In IEEE Symposium on Security and Privacy 2003.
[pdf]
- Random Key Predistribution Schemes for Sensor Networks
- Haowen Chan, Adrian Perrig, and Dawn Song.
In IEEE Symposium on Security and Privacy 2003.
[pdf]
-
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks
- D. Song, D. Zuckerman, and J. D. Tygar.
In 2002
IEEE Symposium on Research in Security
and Privacy.
[pdf]
-
Quasi-efficient Revocation of Group Signatures
- G. Ateniese, D. Song, and G. Tsudik.
In Financial Crypto'2002
.
[pdf]
-
Homomorphic Signature Schemes
- R. Johnson, D. Molnar, D. Song, and D. Wagner.
In
RSA 2002, Cryptographer's track.
[pdf]
-
Practical Forward Secure Group Signature Schemes
- D. Song.
In 8th ACM Conference on Computer and
Communications Security (CCS-8), 2001.
[pdf]
-
Timing Analysis of Keystrokes and SSH Timing Attacks
- D. Song, D. Wagner, and X. Tian.
In 10th USENIX Security Symposium,
2001.
[pdf]
-
AGVI --- Automatic Generation, Verification, and Implementation of Security Protocols
- D. Song, A. Perrig, and D. Phan.
In 13th Conference on Computer Aided Verification
(CAV), 2001.
[pdf]
-
ELK, a New Protocol for Efficient Large-Group Key Distribution
- A. Perrig, D. Song, and D. Tygar.
In 2001
IEEE Symposium on Research in Security
and Privacy.
[pdf]
-
Advanced and Authenticated Marking Schemes for IP Traceback
- D. Song and A. Perrig.
In IEEE Infocomm 2001.
[pdf]
-
Efficient and Secure Source Authentication for Multicast
- A. Perrig, R. Canetti, D. Song, and J. D. Tygar.
In Symposium on
Network and Distributed Systems Security (NDSS)
2001.
[pdf]
-
Looking for Diamonds in the Desert --- Extending Automatic Protocol
Generation to Three-Party Authentication and Key Agreement Protocols
- A. Perrig and D. Song.
In
13th IEEE Computer Security Foundations Workshop, 2000.
[pdf]
-
Efficient Authentication and Signature of Multicast Streams Over
Lossy Channels
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song.
In 2000 IEEE Symposium on Research in Security
and Privacy.
[pdf]
-
Practical Techniques for Searches on Encrypted Data
- D. Song, D. Wagner, and A. Perrig.
In 2000 IEEE Symposium on Research in Security
and Privacy.
[pdf]
-
A First Step towards the Automatic Generation of Security Protocols
- A. Perrig and D. Song.
In
Symposium on Network and Distributed Systems Security (NDSS)
2000.
[pdf]
-
Hash Visualization: A New Technique to Improve Real-World Security
- A. Perrig and D. Song.
In
International Workshop on Cryptographic Techniques and
E-Commerce (CrypTEC) 1999.
[pdf]
-
Athena, an Automatic Checker for Security Protocol Analysis
- D. Song.
In
12th IEEE Computer Security Foundation Workshop, 1999.
[pdf]
-
SIA: Secure Information Aggregation in Sensor Networks.
- Haowen Chan, Adrian Perrig, Bartosz Przydatek, and Dawn Song. Journal of Computer Security.
-
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense.
- Abraham Yaar, Adrian Perrig, and Dawn Song. To appear in JSAC.
-
Athena, a Novel Approach to Efficient Automatic Security Protocol Analysis
- D. Song, S. Berezin, and A. Perrig.
In Journal of Computer Security, 9(1,2):47--74, 2001.
[pdf]
-
A Clean-Slate Design for the Next-Generation Secure Internet.
- Steven Bellovin, David Clark, Adrian Perrig, and Dawn Song. Report of the NSF workshop on "Next-generation Secure Internet", held at CMU 12-14 July 2005.
- Key Distribution Techniques for Sensor Networks
- Haowen Chan, Adrian Perrig, and Dawn Song. In Wireless Sensor Networks, Kluwer Academic Publishers.
-
Mitigating Buffer Overflows by Operating System Randomization
- M. Chew and D. Song.
Technical Report CMU-CS-02-197.
-
TESLA: Multicast Source Authentication Transform
- A. Perrig, R. Canetti, B. Briscoe, D. Song, and J. D. Tygar.
IETF draft, 2000.
-
Secure Auction Marketplace using a Secure Coprocessor
- A. Perrig, S. Smith, and D. Song.
U.S. Patent pending, filed in 2000.