Dawn Xiaodong Song

According to our database1, Dawn Xiaodong Song
  • authored at least 195 papers between 1999 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2017
Can you fool AI with adversarial examples on a visual Turing test?
CoRR, 2017

Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection.
CoRR, 2017

Delving into adversarial attacks on deep policies.
CoRR, 2017

Adversarial examples for generative models.
CoRR, 2017

Practical Differential Privacy for SQL Queries Using Elastic Sensitivity.
CoRR, 2017

Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong.
CoRR, 2017

PIANO: Proximity-based User Authentication on Voice-Powered Internet-of-Things Devices.
CoRR, 2017

Robust Physical-World Attacks on Machine Learning Models.
CoRR, 2017

Learning Neural Programs To Parse Programs.
CoRR, 2017

Making Neural Programming Architectures Generalize via Recursion.
CoRR, 2017

Using EEG-Based BCI Devices to Subliminally Probe for Private Information.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Adversarial Example Defense: Ensembles of Weak Defenses are not Strong.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

PIANO: Proximity-Based User Authentication on Voice-Powered Internet-of-Things Devices.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
The Honey Badger of BFT Protocols.
IACR Cryptology ePrint Archive, 2016

Delving into Transferable Adversarial Examples and Black-box Attacks.
CoRR, 2016

Latent Attention For If-Then Program Synthesis.
CoRR, 2016

Latent Attention For If-Then Program Synthesis.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

VTrust: Regaining Trust on Virtual Calls.
Proceedings of the 23nd Annual Network and Distributed System Security Symposium, 2016

ExploreKit: Automatic Feature Generation and Selection.
Proceedings of the IEEE 16th International Conference on Data Mining, 2016

Formal verification for computer security: Lessons learned and future directions.
Proceedings of the 2016 Formal Methods in Computer-Aided Design, 2016

On Scaling Decentralized Blockchains - (A Position Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

The Honey Badger of BFT Protocols.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Smart Locks: Lessons for Securing Commodity Internet of Things Devices.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Recognizing Functions in Binaries with Neural Networks.
Proceedings of the 24th USENIX Security Symposium, 2015

The Correctness-Security Gap in Compiler Optimization.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

VTint: Protecting Virtual Function Tables' Integrity.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

JITScope: Protecting web users from control-flow hijacking attacks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

ASPIRE: Iterative Specification Synthesis for Security.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

2014
Joint Link Prediction and Attribute Inference Using a Social-Attribute Network.
ACM TIST, 2014

Clickjacking Revisited: A Perceptual View of UI Security.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

The Emperor's New Password Manager: Security Analysis of Web-based Password Managers.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Code-Pointer Integrity.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

ShadowCrypt: Encrypted Web Applications for Everyone.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Automatic Malware Analysis - An Emulator Based Approach.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-5523-3, 2013

Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication.
IEEE Trans. Information Forensics and Security, 2013

Reciprocity in Social Networks: Measurements, Predictions, and Implications
CoRR, 2013

Subliminal Probing for Private Information via EEG-Based BCI Devices.
CoRR, 2013

Automatic protocol reverse-engineering: Message format extraction and field semantics inference.
Computer Networks, 2013

Practical Control Flow Integrity and Randomization for Binary Executables.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

SoK: Eternal War in Memory.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

SAFE: Secure authentication with Face and Eyes.
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013

Understanding Mobile App Usage Patterns Using In-App Advertisements.
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

Preserving Link Privacy in Social Network Based Systems.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Contextual Policy Enforcement in Android Applications with Permission Event Graphs.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

BLITZ: Compositional bounded model checking for real-world programs.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

NetworkProfiler: Towards automatic fingerprinting of Android apps.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism.
Proceedings of the Computer Security - ESORICS 2013, 2013

Data-Confined HTML5 Applications.
Proceedings of the Computer Security - ESORICS 2013, 2013

PHANTOM: practical oblivious computation in a secure processor.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
A Learning-Based Approach to Reactive Security.
IEEE Trans. Dependable Sec. Comput., 2012

Optimal Lower Bound for Differentially Private Multi-Party Aggregation.
IACR Cryptology ePrint Archive, 2012

Recognizing malicious software behaviors with tree automata inference.
Formal Methods in System Design, 2012

Mining Permission Request Patterns from Android and Facebook Applications (extended author version)
CoRR, 2012

Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+
CoRR, 2012

Preserving Link Privacy in Social Network Based Systems
CoRR, 2012

Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
CoRR, 2012

Cloud Data Protection for the Masses.
IEEE Computer, 2012

Context-centric Security.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Privilege Separation in HTML5 Applications.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

On the Feasibility of Internet-Scale Author Identification.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

GUPT: privacy preserving data analysis made easy.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2012

Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Towards Practical Oblivious RAM.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

FreeMarket: Shopping for free in Android applications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Opaak: using mobile phones to limit anonymous identities online.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Evolution of social-attribute networks: measurements, modeling, and implications using google+.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

Predicting Congressional Votes Based on Campaign Finance Data.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

Mining Permission Request Patterns from Android and Facebook Applications.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Privacy-Preserving Stream Aggregation with Fault Tolerance.
Proceedings of the Financial Cryptography and Data Security, 2012

Optimal Lower Bound for Differentially Private Multi-party Aggregation.
Proceedings of the Algorithms - ESA 2012, 2012

Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

Path-exploration lifting: hi-fi tests for lo-fi emulators.
Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, 2012

2011
Private and Continual Release of Statistics.
ACM Trans. Inf. Syst. Secur., 2011

Remote data checking using provable data possession.
ACM Trans. Inf. Syst. Secur., 2011

TaintEraser: protecting sensitive data leaks using application-level taint tracking.
Operating Systems Review, 2011

Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies.
IACR Cryptology ePrint Archive, 2011

Privacy-Preserving Stream Aggregation with Fault Tolerance.
IACR Cryptology ePrint Archive, 2011

Secure Distributed Data Aggregation.
Foundations and Trends in Databases, 2011

Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN)
CoRR, 2011

How Open Should Open Source Be?
CoRR, 2011

Towards Practical Oblivious RAM
CoRR, 2011

Towards Client-side HTML Security Policies.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery.
Proceedings of the 20th USENIX Security Symposium, 2011

Design and Evaluation of a Real-Time URL Spam Filtering Service.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Differential Slicing: Identifying Causal Execution Differences for Security Applications.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Privacy settings from contextual attributes: A case study using Google Buzz.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Privacy-Preserving Aggregation of Time-Series Data.
Proceedings of the Network and Distributed System Security Symposium, 2011

DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation.
Proceedings of the Network and Distributed System Security Symposium, 2011

Statically-directed dynamic automated test generation.
Proceedings of the 20th International Symposium on Software Testing and Analysis, 2011

Suspended accounts in retrospect: an analysis of twitter spam.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

A Systematic Analysis of XSS Sanitization in Web Application Frameworks.
Proceedings of the Computer Security - ESORICS 2011, 2011

Context-sensitive auto-sanitization in web templating languages using type qualifiers.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Android permissions demystified.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Malware Analysis with Tree Automata Inference.
Proceedings of the Computer Aided Verification - 23rd International Conference, 2011

2010
Cyber SA: Situational Awareness for Cyber Defense.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Private and Continual Release of Statistics.
IACR Cryptology ePrint Archive, 2010

A Symbolic Execution Framework for JavaScript.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.
Proceedings of the Network and Distributed System Security Symposium, 2010

Binary Code Extraction and Interface Identification for Security Applications.
Proceedings of the Network and Distributed System Security Symposium, 2010

Insights from the Inside: A View of Botnet Management from Infiltration.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010

Private and Continual Release of Statistics.
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010

Signatures of Reputation.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

A Learning-Based Approach to Reactive Security.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

HookScout: Proactive Binary-Centric Hook Detection.
Proceedings of the Detection of Intrusions and Malware, 2010

Towards a Formal Foundation of Web Security.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

Inference and analysis of formal models of botnet command and control protocols.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Input generation via decomposition and re-stitching: finding bugs in Malware.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
New Techniques for Private Stream Searching.
ACM Trans. Inf. Syst. Secur., 2009

Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance.
IEEE Trans. Dependable Sec. Comput., 2009

A Learning-Based Approach to Reactive Security
CoRR, 2009

Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense.
Proceedings of the 18th USENIX Security Symposium, 2009

Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves.
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009

Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Measuring channel capacity to distinguish undue influence.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009

Tracking Dynamic Sources of Malicious Activity at Internet Scale.
Proceedings of the Advances in Neural Information Processing Systems 22: 23rd Annual Conference on Neural Information Processing Systems 2009. Proceedings of a meeting held 7-10 December 2009, 2009

Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense.
Proceedings of the Network and Distributed System Security Symposium, 2009

Loop-extended symbolic execution on binary programs.
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009

Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Automatically Identifying Trigger-based Behavior in Malware.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.
IEEE Trans. Dependable Sec. Comput., 2008

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008), 2008

HookFinder: Identifying and Understanding Malware Hooking Behaviors.
Proceedings of the Network and Distributed System Security Symposium, 2008

Limits of Learning-based Signature Generation with Adversaries.
Proceedings of the Network and Distributed System Security Symposium, 2008

Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects?
Proceedings of the Network and Distributed System Security Symposium, 2008

Analysis-Resistant Malware.
Proceedings of the Network and Distributed System Security Symposium, 2008

BitBlaze: A New Approach to Computer Security via Binary Analysis.
Proceedings of the Information Systems Security, 4th International Conference, 2008

BinHunt: Automatically Finding Semantic Differences in Binary Programs.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

2007
Sting: An End-to-End Self-Healing System for Defending against Internet Worms.
Proceedings of the Malware Detection, 2007

SIA: Secure information aggregation in sensor networks.
Journal of Computer Security, 2007

Provable Data Possession at Untrusted Stores.
IACR Cryptology ePrint Archive, 2007

Exploiting Network Structure for Proactive Spam Mitigation.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Dynamic Spyware Analysis.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Multi-Dimensional Range Query over Encrypted Data.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Fig: Automatic Fingerprint Generation.
Proceedings of the Network and Distributed System Security Symposium, 2007

RICH: Automatically Protecting Against Integer-Based Vulnerabilities.
Proceedings of the Network and Distributed System Security Symposium, 2007

Detecting Stealthy Spreaders Using Online Outdegree Histograms.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

Sweeper: a lightweight end-to-end system for defending against fast worms.
Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, 2007

Distributed Evasive Scan Techniques and Countermeasures.
Proceedings of the Detection of Intrusions and Malware, 2007

Creating Vulnerability Signatures Using Weakest Preconditions.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

Panorama: capturing system-wide information flow for malware detection and analysis.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Polyglot: automatic extraction of protocol message format using dynamic binary analysis.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Provable data possession at untrusted stores.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense.
IEEE Journal on Selected Areas in Communications, 2006

Towards Attack-Agnostic Defenses.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006

Towards Automatic Generation of Vulnerability-Based Signatures.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

New Constructions and Practical Applications for Private Stream Searching (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Paragraph: Thwarting Signature Learning by Training Maliciously.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Behavioral Distance Measurement Using Hidden Markov Models.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.
Proceedings of the Network and Distributed System Security Symposium, 2006

Black Box Anomaly Detection: Is It Utopian?.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006

Replayer: automatic protocol replay by binary analysis.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

Secure hierarchical in-network aggregation in sensor networks.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

Design space and analysis of worm defense strategies.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Polygraph: Automatically Generating Signatures for Polymorphic Worms.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Semantics-Aware Malware Detection.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Behavioral Distance for Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

New Streaming Algorithms for Fast Detection of Superspreaders.
Proceedings of the Network and Distributed System Security Symposium, 2005

Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
Proceedings of the Network and Distributed System Security Symposium, 2005

FIT: fast Internet traceback.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Privacy-Preserving Set Operations.
Proceedings of the Advances in Cryptology, 2005

2004
On Gray-Box Program Tracking for Anomaly Detection.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Privtrans: Automatically Partitioning Programs for Privilege Separation.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

The sybil attack in sensor networks: analysis & defenses.
Proceedings of the Third International Symposium on Information Processing in Sensor Networks, 2004

Dynamic Quarantine of Internet Worms.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Gray-box extraction of execution graphs for anomaly detection.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

Private Keyword-Based Push and Pull with Applications to Anonymous Communication.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Pi: A Path Identification Mechanism to Defend against DDoS Attack.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Random Key Predistribution Schemes for Sensor Networks.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

SIA: secure information aggregation in sensor networks.
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003

GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information.
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003

2002
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Quasi-Efficient Revocation in Group Signatures.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

Homomorphic Signature Schemes.
Proceedings of the Topics in Cryptology, 2002

2001
Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis.
Journal of Computer Security, 2001

Quasi-Efficient Revocation of Group Signatures.
IACR Cryptology ePrint Archive, 2001

Timing Analysis of Keystrokes and Timing Attacks on SSH.
Proceedings of the 10th USENIX Security Symposium, 2001

ELK, A New Protocol for Efficient Large-Group Key Distribution.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Efficient and Secure Source Authentication for Multicast.
Proceedings of the Network and Distributed System Security Symposium, 2001

SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

Advanced and Authenticated Marking Schemes for IP Traceback.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

Practical forward secure group signature schemes.
Proceedings of the CCS 2001, 2001

A Cryptanalysis of the High-Bandwidth Digital Content Protection System.
Proceedings of the Security and Privacy in Digital Rights Management, 2001

AGVI - Automatic Generation, Verification, and Implementation of Security Protocols.
Proceedings of the Computer Aided Verification, 13th International Conference, 2001

2000
Practical Techniques for Searches on Encrypted Data.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

A First Step Towards the Automatic Generation of Security Protocols.
Proceedings of the Network and Distributed System Security Symposium, 2000

Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

1999
Athena: A New Efficient Automatic Checker for Security Protocol Analysis.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999


  Loading...