Export 23 results:
Filters: Author is Dawn Song  [Clear All Filters]
Guo W, Mu D, Xing X, Du M, Song D.  2019.  DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis. 28th {USENIX} Security Symposium ({USENIX} Security 19). :1787--1804.
Carlini N, Liu C, Erlingsson Ú, Kos J, Song D.  2019.  The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. 28th {USENIX} Security Symposium ({USENIX} Security 19). :267--284.
Song D, Eykholt K, Evtimov I, Fernandes E, Li B, Rahmati A, Tramèr F, Prakash A, Kohno T.  2018.  Physical Adversarial Examples for Object Detectors. 12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18).
He W, Wei J, Chen X, Carlini N, Song D.  2017.  Adversarial Example Defense: Ensembles of Weak Defenses are not Strong. 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17).
Chen K, He W, Akhawe D, D'Silva V, Mittal P, Song D.  2015.  ASPIRE: Iterative Specification Synthesis for Security. 15th Workshop on Hot Topics in Operating Systems (HotOS {XV}).
Shin EChul Richa, Song D, Moazzezi R.  2015.  Recognizing Functions in Binaries with Neural Networks. 24th {USENIX} Security Symposium ({USENIX} Security 15). :611--626.
Akhawe D, He W, Li Z, Moazzezi R, Song D.  2014.  Clickjacking Revisited: A Perceptual View of UI Security. 8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14).
Kuznetsov V, Szekeres L, Payer M, Candea G, Sekar R., Song D.  2014.  Code-Pointer Integrity. 11th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 14). :147--163.
Li Z, He W, Akhawe D, Song D.  2014.  The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :465--479.
Martignoni L, Poosankam P, Zaharia M, Han J, McCamant S, Song D, Paxson V, Perrig A, Shenker S, Stoica I.  2012.  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 2012 {USENIX} Annual Technical Conference ({USENIX} {ATC} 12). :165--182.
Martinovic I, Davies D, Frank M, Perito D, Ros T, Song D.  2012.  On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces. 21st {USENIX} Security Symposium ({USENIX} Security 12). :143--158.
Akhawe D, Saxena P, Song D.  2012.  Privilege Separation in HTML5 Applications. 21st {USENIX} Security Symposium ({USENIX} Security 12). :429--444.
Cho CYuan, Caballero J, Grier C, Paxson V, Song D.  2010.  Insights from the Inside: A View of Botnet Management from Infiltration. 3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 10).
Song D, California Uof, Joseph BA, I.  2010.  Research Agendas: Picking Good Ones and Publishing Successfully. 2nd Workshop on Supporting Diversity in Systems Research (Diversity 10).
Egele M, Kruegel C, Kirda E, Yin H, Song D.  2007.  Dynamic Spyware Analysis. 2007 {USENIX} Annual Technical Conference ({USENIX} {ATC} 07).
Venkataraman S, Sen S, Spatscheck O, Haffner P, Song D.  2007.  Exploiting Network Structure for Proactive Spam Mitigation. 16th {USENIX} Security Symposium ({USENIX} Security 07).
Brumley D, Song D.  2006.  Towards Attack-Agnostic Defenses . First {USENIX} Workshop on Hot Topics in Security (HotSec 06).
Brumley D, Song D.  2004.  Privtrans: Automatically Partitioning Programs for Privilege Separation. 13th {USENIX} Security Symposium ({USENIX} Security 04).