Dawn Song
Dawn Song
Professor of Computer Science, UC Berkeley
Verified email at cs.berkeley.edu - Homepage
TitleCited byYear
Random key predistribution schemes for sensor networks
H Chan, A Perrig, D Song
figshare, 2003
39312003
Practical techniques for searches on encrypted data
DX Song, D Wagner, A Perrig
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 44-55, 2000
31582000
Provable data possession at untrusted stores
G Ateniese, R Burns, R Curtmola, J Herring, L Kissner, Z Peterson, ...
Proceedings of the 14th ACM conference on Computer and communications …, 2007
27562007
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
J Newsome, DX Song
NDSS 5, 3-4, 2005
18972005
The sybil attack in sensor networks: analysis & defenses
J Newsome, E Shi, D Song, A Perrig
Third international symposium on information processing in sensor networks …, 2004
18102004
Android permissions demystified
AP Felt, E Chin, S Hanna, D Song, D Wagner
Proceedings of the 18th ACM conference on Computer and communications …, 2011
15672011
Efficient authentication and signing of multicast streams over lossy channels
A Perrig, R Canetti, JD Tygar, D Song
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 56-73, 2000
12432000
Advanced and authenticated marking schemes for IP traceback
DX Song, A Perrig
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
12202001
Polygraph: Automatically generating signatures for polymorphic worms
J Newsome, B Karp, D Song
2005 IEEE Symposium on Security and Privacy (S&P'05), 226-241, 2005
11122005
The TESLA broadcast authentication protocol
A Perrig, R Canetti, JD Tygar, D Song
Rsa Cryptobytes 5 (2), 2-13, 2002
11032002
SIA: Secure information aggregation in sensor networks
B Przydatek, D Song, A Perrig
Proceedings of the 1st international conference on Embedded networked sensor …, 2003
10222003
Semantics-aware malware detection
M Christodorescu, S Jha, SA Seshia, D Song, RE Bryant
2005 IEEE Symposium on Security and Privacy (S&P'05), 32-46, 2005
9042005
Panorama: capturing system-wide information flow for malware detection and analysis
H Yin, D Song, M Egele, C Kruegel, E Kirda
Proceedings of the 14th ACM conference on Computer and communications …, 2007
8962007
Efficient and secure source authentication for multicast
A Perrig, R Canetti, D Song, JD Tygar
Network and Distributed System Security Symposium, NDSS 1 (2001), 35-46, 2001
8922001
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
International Conference on Information Systems Security, 1-25, 2008
7962008
Privacy-preserving set operations
L Kissner, D Song
Annual International Cryptology Conference, 241-257, 2005
7152005
On scaling decentralized blockchains
K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ...
International Conference on Financial Cryptography and Data Security, 106-125, 2016
6072016
Timing analysis of keystrokes and timing attacks on ssh.
DX Song, DA Wagner, X Tian
USENIX Security Symposium 2001, 2001
5842001
Multi-dimensional range query over encrypted data
E Shi, J Bethencourt, THH Chan, D Song, A Perrig
2007 IEEE Symposium on Security and Privacy (SP'07), 350-364, 2007
5792007
Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication
M Frank, R Biedert, E Ma, I Martinovic, D Song
IEEE transactions on information forensics and security 8 (1), 136-148, 2012
5572012
The system can't perform the operation now. Try again later.
Articles 1–20