Biblio

Export 24 results:
Filters: Author is Dawn Song  [Clear All Filters]
2021
Carlini N, Tramèr F, Wallace E, Jagielski M, Herbert-Voss A, Lee K, Roberts A, Brown T, Song D, Erlingsson Ú et al..  2021.  Extracting Training Data from Large Language Models. 30th USENIX Security Symposium (USENIX Security 21). :2633--2650.
2017
He W, Wei J, Chen X, Carlini N, Song D.  2017.  Adversarial Example Defense: Ensembles of Weak Defenses are not Strong. 11th USENIX Workshop on Offensive Technologies (WOOT 17).
2015
Chen K, He W, Akhawe D, D'Silva V, Mittal P, Song D.  2015.  ASPIRE: Iterative Specification Synthesis for Security. 15th Workshop on Hot Topics in Operating Systems (HotOS XV).
Shin EChul Richa, Song D, Moazzezi R.  2015.  Recognizing Functions in Binaries with Neural Networks. 24th USENIX Security Symposium (USENIX Security 15). :611--626.
2014
Akhawe D, He W, Li Z, Moazzezi R, Song D.  2014.  Clickjacking Revisited: A Perceptual View of UI Security. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
Kuznetsov V, Szekeres L, Payer M, Candea G, Sekar R., Song D.  2014.  Code-Pointer Integrity. 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). :147--163.
Li Z, He W, Akhawe D, Song D.  2014.  The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers. 23rd USENIX Security Symposium (USENIX Security 14). :465--479.
2012
Martignoni L, Poosankam P, Zaharia M, Han J, McCamant S, Song D, Paxson V, Perrig A, Shenker S, Stoica I.  2012.  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 2012 USENIX Annual Technical Conference (USENIX ATC 12). :165--182.
Martinovic I, Davies D, Frank M, Perito D, Ros T, Song D.  2012.  On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces. 21st USENIX Security Symposium (USENIX Security 12). :143--158.
Akhawe D, Saxena P, Song D.  2012.  Privilege Separation in HTML5 Applications. 21st USENIX Security Symposium (USENIX Security 12). :429--444.
2010
Cho CYuan, Caballero J, Grier C, Paxson V, Song D.  2010.  Insights from the Inside: A View of Botnet Management from Infiltration. 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 10).
Song D, California Uof, Joseph BA, I.  2010.  Research Agendas: Picking Good Ones and Publishing Successfully. 2nd Workshop on Supporting Diversity in Systems Research (Diversity 10).
2007
Egele M, Kruegel C, Kirda E, Yin H, Song D.  2007.  Dynamic Spyware Analysis. 2007 USENIX Annual Technical Conference (USENIX ATC 07).
Venkataraman S, Sen S, Spatscheck O, Haffner P, Song D.  2007.  Exploiting Network Structure for Proactive Spam Mitigation. 16th USENIX Security Symposium (USENIX Security 07).
2006
Brumley D, Song D.  2006.  Towards Attack-Agnostic Defenses . First USENIX Workshop on Hot Topics in Security (HotSec 06).
2004
Brumley D, Song D.  2004.  Privtrans: Automatically Partitioning Programs for Privilege Separation. 13th USENIX Security Symposium (USENIX Security 04).