Biblio

Export 23 results:
Filters: Author is Dawn Song  [Clear All Filters]
2019
Guo W, Mu D, Xing X, Du M, Song D.  2019.  DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis. 28th {USENIX} Security Symposium ({USENIX} Security 19). :1787--1804.
Carlini N, Liu C, Erlingsson Ú, Kos J, Song D.  2019.  The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. 28th {USENIX} Security Symposium ({USENIX} Security 19). :267--284.
2018
Song D, Eykholt K, Evtimov I, Fernandes E, Li B, Rahmati A, Tramèr F, Prakash A, Kohno T.  2018.  Physical Adversarial Examples for Object Detectors. 12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18).
2017
He W, Wei J, Chen X, Carlini N, Song D.  2017.  Adversarial Example Defense: Ensembles of Weak Defenses are not Strong. 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17).
2015
Chen K, He W, Akhawe D, D'Silva V, Mittal P, Song D.  2015.  ASPIRE: Iterative Specification Synthesis for Security. 15th Workshop on Hot Topics in Operating Systems (HotOS {XV}).
Shin EChul Richa, Song D, Moazzezi R.  2015.  Recognizing Functions in Binaries with Neural Networks. 24th {USENIX} Security Symposium ({USENIX} Security 15). :611--626.
2014
Akhawe D, He W, Li Z, Moazzezi R, Song D.  2014.  Clickjacking Revisited: A Perceptual View of UI Security. 8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14).
Kuznetsov V, Szekeres L, Payer M, Candea G, Sekar R., Song D.  2014.  Code-Pointer Integrity. 11th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 14). :147--163.
Li Z, He W, Akhawe D, Song D.  2014.  The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :465--479.
2012
Martignoni L, Poosankam P, Zaharia M, Han J, McCamant S, Song D, Paxson V, Perrig A, Shenker S, Stoica I.  2012.  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 2012 {USENIX} Annual Technical Conference ({USENIX} {ATC} 12). :165--182.
Martinovic I, Davies D, Frank M, Perito D, Ros T, Song D.  2012.  On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces. 21st {USENIX} Security Symposium ({USENIX} Security 12). :143--158.
Akhawe D, Saxena P, Song D.  2012.  Privilege Separation in HTML5 Applications. 21st {USENIX} Security Symposium ({USENIX} Security 12). :429--444.
2010
Cho CYuan, Caballero J, Grier C, Paxson V, Song D.  2010.  Insights from the Inside: A View of Botnet Management from Infiltration. 3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 10).
Song D, California Uof, Joseph BA, I.  2010.  Research Agendas: Picking Good Ones and Publishing Successfully. 2nd Workshop on Supporting Diversity in Systems Research (Diversity 10).
2007
Egele M, Kruegel C, Kirda E, Yin H, Song D.  2007.  Dynamic Spyware Analysis. 2007 {USENIX} Annual Technical Conference ({USENIX} {ATC} 07).
Venkataraman S, Sen S, Spatscheck O, Haffner P, Song D.  2007.  Exploiting Network Structure for Proactive Spam Mitigation. 16th {USENIX} Security Symposium ({USENIX} Security 07).
2006
Brumley D, Song D.  2006.  Towards Attack-Agnostic Defenses . First {USENIX} Workshop on Hot Topics in Security (HotSec 06).
2004
Brumley D, Song D.  2004.  Privtrans: Automatically Partitioning Programs for Privilege Separation. 13th {USENIX} Security Symposium ({USENIX} Security 04).