USENIX reaffirms its commitment to diversity, equity, and inclusion.
Biblio
Export 24 results:
Filters: Author is Dawn Song [Clear All Filters]
Extracting Training Data from Large Language Models. 30th USENIX Security Symposium (USENIX Security 21). :2633--2650.
.
2021. MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs. 29th USENIX Security Symposium (USENIX Security 20). :2129--2146.
.
2020. DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis. 28th USENIX Security Symposium (USENIX Security 19). :1787--1804.
.
2019. The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. 28th USENIX Security Symposium (USENIX Security 19). :267--284.
.
2019. Physical Adversarial Examples for Object Detectors. 12th USENIX Workshop on Offensive Technologies (WOOT 18).
.
2018. Adversarial Example Defense: Ensembles of Weak Defenses are not Strong. 11th USENIX Workshop on Offensive Technologies (WOOT 17).
.
2017. ASPIRE: Iterative Specification Synthesis for Security. 15th Workshop on Hot Topics in Operating Systems (HotOS XV).
.
2015. Recognizing Functions in Binaries with Neural Networks. 24th USENIX Security Symposium (USENIX Security 15). :611--626.
.
2015. Clickjacking Revisited: A Perceptual View of UI Security. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
.
2014. Code-Pointer Integrity. 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). :147--163.
.
2014. The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers. 23rd USENIX Security Symposium (USENIX Security 14). :465--479.
.
2014. Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 2012 USENIX Annual Technical Conference (USENIX ATC 12). :165--182.
.
2012. On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces. 21st USENIX Security Symposium (USENIX Security 12). :143--158.
.
2012. Privilege Separation in HTML5 Applications. 21st USENIX Security Symposium (USENIX Security 12). :429--444.
.
2012. Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection 13th Workshop on Hot Topics in Operating Systems (HotOS XIII).
.
2011. MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices. 2nd USENIX Workshop on Health Security and Privacy (HealthSec 11).
.
2011. Towards Client-side HTML Security Policies. 6th USENIX Workshop on Hot Topics in Security (HotSec 11).
.
2011. Insights from the Inside: A View of Botnet Management from Infiltration. 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 10).
.
2010. Research Agendas: Picking Good Ones and Publishing Successfully. 2nd Workshop on Supporting Diversity in Systems Research (Diversity 10).
.
2010. Dynamic Spyware Analysis. 2007 USENIX Annual Technical Conference (USENIX ATC 07).
.
2007. Exploiting Network Structure for Proactive Spam Mitigation. 16th USENIX Security Symposium (USENIX Security 07).
.
2007. Towards Attack-Agnostic Defenses . First USENIX Workshop on Hot Topics in Security (HotSec 06).
.
2006. Privtrans: Automatically Partitioning Programs for Privilege Separation. 13th USENIX Security Symposium (USENIX Security 04).
.
2004.