Dawn Song
#10,608
Most Influential Person Now
American computer security expert
Dawn Song's AcademicInfluence.com Rankings
Dawn Songcriminal-justice Degrees
Criminal Justice
#75
World Rank
#88
Historical Rank
Cyber Security
#5
World Rank
#5
Historical Rank
Dawn Songcomputer-science Degrees
Computer Science
#784
World Rank
#811
Historical Rank
Cybersecurity
#3
World Rank
#3
Historical Rank
Database
#364
World Rank
#381
Historical Rank
Download Badge
Criminal Justice Computer Science
Dawn Song's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Computer Science Tsinghua University
Similar Degrees You Can Earn
Why Is Dawn Song Influential?
(Suggest an Edit or Addition)According to Wikipedia, Dawn Song is a Chinese American academic and is a professor at the University of California, Berkeley, in the Electrical Engineering and Computer Science Department. She received a MacArthur Foundation Fellowship in 2010.
Dawn Song's Published Works
Published Works
- Practical techniques for searches on encrypted data (2000) (3550)
- Random key predistribution schemes for sensor networks (2003) (3326)
- Provable data possession at untrusted stores (2007) (3114)
- Advances and Open Problems in Federated Learning (2019) (2826)
- The Sybil attack in sensor networks: analysis & defenses (2004) (1666)
- Android permissions demystified (2011) (1476)
- Delving into Transferable Adversarial Examples and Black-box Attacks (2016) (1341)
- Robust Physical-World Attacks on Deep Learning Visual Classification (2018) (1268)
- Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software (2005) (1196)
- Efficient authentication and signing of multicast streams over lossy channels (2000) (1118)
- SIA: secure information aggregation in sensor networks (2003) (1037)
- The TESLA Broadcast Authentication Protocol (2002) (1013)
- Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning (2017) (945)
- Advanced and authenticated marking schemes for IP traceback (2001) (921)
- Panorama: capturing system-wide information flow for malware detection and analysis (2007) (792)
- Semantics-aware malware detection (2005) (786)
- BitBlaze: A New Approach to Computer Security via Binary Analysis (2008) (778)
- Efficient and Secure Source Authentication for Multicast (2001) (774)
- Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication (2012) (752)
- Polygraph: automatically generating signatures for polymorphic worms (2005) (735)
- Privacy-Preserving Set Operations (2005) (731)
- The Many Faces of Robustness: A Critical Analysis of Out-of-Distribution Generalization (2020) (653)
- The Honey Badger of BFT Protocols (2016) (621)
- SoK: Eternal War in Memory (2013) (615)
- Generating Adversarial Examples with Adversarial Networks (2018) (601)
- Using Self-Supervised Learning Can Improve Model Robustness and Uncertainty (2019) (596)
- The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks (2018) (576)
- Timing Analysis of Keystrokes and Timing Attacks on SSH (2001) (576)
- Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality (2018) (548)
- Natural Adversarial Examples (2019) (542)
- Multi-Dimensional Range Query over Encrypted Data (2007) (538)
- Design and Evaluation of a Real-Time URL Spam Filtering Service (2011) (529)
- Extracting Training Data from Large Language Models (2020) (516)
- Robust Physical-World Attacks on Deep Learning Models (2017) (512)
- Privacy-Preserving Aggregation of Time-Series Data (2011) (508)
- Suspended accounts in retrospect: an analysis of twitter spam (2011) (502)
- Practical Control Flow Integrity and Randomization for Binary Executables (2013) (491)
- Homomorphic Signature Schemes (2002) (480)
- Pi: a path identification mechanism to defend against DDoS attacks (2003) (480)
- On Scaling Decentralized Blockchains - (A Position Paper) (2016) (478)
- A Symbolic Execution Framework for JavaScript (2010) (452)
- Code-pointer integrity (2014) (444)
- Private and Continual Release of Statistics (2010) (435)
- SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks (2004) (432)
- Secure hierarchical in-network aggregation in sensor networks (2006) (424)
- Remote data checking using provable data possession (2011) (416)
- ELK, a new protocol for efficient large-group key distribution (2001) (414)
- Spatially Transformed Adversarial Examples (2018) (413)
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection (2017) (406)
- Polyglot: automatic extraction of protocol message format using dynamic binary analysis (2007) (378)
- GEM: Graph EMbedding for routing and data-centric storage in sensor networks without geographic information (2003) (371)
- Adversarial Example Defense: Ensembles of Weak Defenses are not Strong (2017) (337)
- Towards Practical Oblivious RAM (2011) (326)
- Towards automatic generation of vulnerability-based signatures (2006) (317)
- On the Feasibility of Internet-Scale Author Identification (2012) (306)
- Physical Adversarial Examples for Object Detectors (2018) (303)
- DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation (2011) (282)
- Robust Physical-World Attacks on Machine Learning Models (2017) (277)
- SQLNet: Generating Structured Queries From Natural Language Without Reinforcement Learning (2017) (275)
- Hash Visualization: a New Technique to improve Real-World Security (1999) (273)
- Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications (2008) (270)
- GUPT: privacy preserving data analysis made easy (2012) (261)
- Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis (2001) (261)
- Dynamic Spyware Analysis (2007) (255)
- FIT: fast Internet traceback (2005) (252)
- Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts (2018) (250)
- Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications (2012) (250)
- Pretrained Transformers Improve Out-of-Distribution Robustness (2020) (250)
- Privtrans: Automatically Partitioning Programs for Privilege Separation (2004) (249)
- Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering (2009) (248)
- Athena: a new efficient automatic checker for security protocol analysis (1999) (247)
- Quasi-Efficient Revocation in Group Signatures (2002) (247)
- Recognizing Functions in Binaries with Neural Networks (2015) (244)
- BinHunt: Automatically Finding Semantic Differences in Binary Programs (2008) (239)
- PHANTOM: practical oblivious computation in a secure processor (2013) (234)
- Automatically Identifying Trigger-based Behavior in Malware (2008) (232)
- Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds (2004) (231)
- Adversarial Examples for Generative Models (2017) (229)
- Smart Locks: Lessons for Securing Commodity Internet of Things Devices (2016) (222)
- New Streaming Algorithms for Fast Detection of Superspreaders (2005) (221)
- Towards a Formal Foundation of Web Security (2010) (221)
- Evolution of social-attribute networks: measurements, modeling, and implications using google+ (2012) (217)
- Paragraph: Thwarting Signature Learning by Training Maliciously (2006) (215)
- Towards Practical Differential Privacy for SQL Queries (2017) (214)
- StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense (2006) (213)
- Privacy-Preserving Stream Aggregation with Fault Tolerance (2012) (211)
- Towards Efficient Data Valuation Based on the Shapley Value (2019) (208)
- Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense (2009) (199)
- Keystone: an open framework for architecting trusted execution environments (2020) (196)
- The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks (2019) (195)
- Tree-to-tree Neural Networks for Program Translation (2018) (186)
- Loop-extended symbolic execution on binary programs (2009) (185)
- Inference and analysis of formal models of botnet command and control protocols (2010) (184)
- Practical forward secure group signature schemes (2001) (184)
- Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms (2018) (183)
- Model-Contrastive Federated Learning (2021) (182)
- Joint Link Prediction and Attribute Inference Using a Social-Attribute Network (2014) (182)
- Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction (2005) (181)
- NetworkProfiler: Towards automatic fingerprinting of Android apps (2013) (181)
- Cloud Data Protection for the Masses (2012) (178)
- TaintEraser: protecting sensitive data leaks using application-level taint tracking (2011) (173)
- A Berkeley View of Systems Challenges for AI (2017) (171)
- Delving into adversarial attacks on deep policies (2017) (165)
- The Secret Sharer: Measuring Unintended Neural Network Memorization & Extracting Secrets (2018) (164)
- Assessing Generalization in Deep Reinforcement Learning (2018) (161)
- Gray-box extraction of execution graphs for anomaly detection (2004) (157)
- Contextual Policy Enforcement in Android Applications with Permission Event Graphs (2013) (153)
- Mitigating buffer overflows by operating system randomization (2002) (151)
- On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces (2012) (150)
- TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems (2019) (149)
- HookFinder: Identifying and Understanding Malware Hooking Behaviors (2008) (148)
- The Emperor's New Password Manager: Security Analysis of Web-based Password Managers (2014) (148)
- FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications (2010) (141)
- Cyber SA: Situational Awareness for Cyber Defense (2010) (138)
- A Systematic Analysis of XSS Sanitization in Web Application Frameworks (2011) (136)
- Making Neural Programming Architectures Generalize via Recursion (2017) (134)
- Statically-directed dynamic automated test generation (2011) (133)
- Binary Code Extraction and Interface Identification for Security Applications (2009) (132)
- PerfFuzz: automatically generating pathological inputs (2018) (130)
- Measuring Massive Multitask Language Understanding (2020) (128)
- RICH: Automatically Protecting Against Integer-Based Vulnerabilities (2007) (128)
- Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation (2019) (127)
- ExploreKit: Automatic Feature Generation and Selection (2016) (125)
- Towards Practical Differentially Private Convex Optimization (2019) (122)
- Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software (2006) (121)
- Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves (2009) (119)
- MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery (2011) (118)
- Replayer: automatic protocol replay by binary analysis (2006) (117)
- Characterizing Audio Adversarial Examples Using Temporal Dependency (2018) (117)
- Measuring Mathematical Problem Solving With the MATH Dataset (2021) (111)
- Scaling Out-of-Distribution Detection for Real-World Settings (2022) (109)
- Mining Permission Request Patterns from Android and Facebook Applications (2012) (109)
- Behavioral Distance Measurement Using Hidden Markov Models (2006) (107)
- Key distribution techniques for sensor networks (2004) (104)
- Execution-Guided Neural Program Synthesis (2018) (104)
- Behavioral Distance for Intrusion Detection (2005) (104)
- Aligning AI With Shared Human Values (2020) (103)
- Curriculum Adversarial Training (2018) (103)
- Preserving Link Privacy in Social Network Based Systems (2012) (102)
- Decision Boundary Analysis of Adversarial Examples (2018) (102)
- Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy (2019) (102)
- Epione: Lightweight Contact Tracing with Strong Privacy (2020) (101)
- On Gray-Box Program Tracking for Anomaly Detection (2004) (101)
- Emulating emulation-resistant malware (2009) (100)
- Efficient Task-Specific Data Valuation for Nearest Neighbor Algorithms (2019) (98)
- Measuring Coding Challenge Competence With APPS (2021) (97)
- Path-exploration lifting: hi-fi tests for lo-fi emulators (2012) (95)
- Insights from the Inside: A View of Botnet Management from Infiltration (2010) (95)
- Anomalous Example Detection in Deep Learning: A Survey (2020) (94)
- Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution (2018) (94)
- VTint: Protecting Virtual Function Tables' Integrity (2015) (93)
- ShadowCrypt: Encrypted Web Applications for Everyone (2014) (93)
- Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses (2020) (91)
- The Correctness-Security Gap in Compiler Optimization (2015) (91)
- VTrust: Regaining Trust on Virtual Calls (2016) (90)
- BitScope: Automatically Dissecting Malicious Binaries (2007) (90)
- Creating Vulnerability Signatures Using Weakest Preconditions (2007) (89)
- New constructions and practical applications for private stream searching (2006) (88)
- Efficient Deep Learning on Multi-Source Private Data (2018) (87)
- Measuring channel capacity to distinguish undue influence (2009) (86)
- Looking for diamonds in the desert - extending automatic protocol generation to three-party authentication and key agreement protocols (2000) (84)
- Understanding Mobile App Usage Patterns Using In-App Advertisements (2013) (84)
- Optimal Lower Bound for Differentially Private Multi-party Aggregation (2012) (84)
- Differentiable Neural Network Architecture Search (2018) (81)
- Sweeper: a lightweight end-to-end system for defending against fast worms (2007) (81)
- Differential Slicing: Identifying Causal Execution Differences for Security Applications (2011) (79)
- New Techniques for Private Stream Searching (2009) (79)
- Context-sensitive auto-sanitization in web templating languages using type qualifiers (2011) (79)
- GamePad: A Learning Environment for Theorem Proving (2018) (79)
- A Principled Approach to Data Valuation for Federated Learning (2020) (79)
- Dynamic quarantine of Internet worms (2004) (78)
- Exploring the Space of Black-box Attacks on Deep Neural Networks (2017) (77)
- Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation (2018) (77)
- Fig: Automatic Fingerprint Generation (2007) (74)
- Expander graphs for digital stream authentication and robust overlay networks (2002) (72)
- Neural Symbolic Reader: Scalable Integration of Distributed and Symbolic Representations for Reading Comprehension (2020) (72)
- REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited Data (2019) (71)
- Exploiting Network Structure for Proactive Spam Mitigation (2007) (70)
- Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices (2011) (70)
- AGVI - Automatic Generation, Verification, and Implementation of Security Protocols (2001) (69)
- Automatic protocol reverse-engineering: Message format extraction and field semantics inference (2013) (69)
- Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN) (2011) (68)
- Input generation via decomposition and re-stitching: finding bugs in Malware (2010) (65)
- Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof (2020) (65)
- Privilege Separation in HTML5 Applications (2012) (65)
- Imitation Attacks and Defenses for Black-box Machine Translation Systems (2020) (65)
- Language Models are Open Knowledge Graphs (2020) (64)
- Malware Detection (2010) (63)
- Adversarial Texts with Gradient Methods (2018) (63)
- A Learning-Based Approach to Reactive Security (2009) (61)
- Limits of Learning-based Signature Generation with Adversaries (2008) (61)
- Lifelong Anomaly Detection Through Unlearning (2019) (61)
- Compositional Generalization via Neural-Symbolic Stack Machines (2020) (60)
- Private and threshold set-intersection (2004) (60)
- Latent Attention For If-Then Program Synthesis (2016) (59)
- Malware Detection (Advances in Information Security) (2006) (59)
- Malware Analysis with Tree Automata Inference (2011) (58)
- A First Step Towards the Automatic Generation of Security Protocols (2000) (57)
- Data Poisoning Attack against Unsupervised Node Embedding Methods (2018) (56)
- Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection (2011) (55)
- Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense (2009) (54)
- A Benchmark for Anomaly Segmentation (2019) (51)
- Fooling Vision and Language Models Despite Localization and Attention Mechanism (2017) (51)
- A Clean-Slate Design for the Next-Generation Secure Internet (2006) (48)
- StackPi: A New Defense Mechanism against IP Spoofing and DDoS Attacks (2003) (48)
- TeraPipe: Token-Level Pipeline Parallelism for Training Large-Scale Language Models (2021) (47)
- Detecting Fake Accounts in Online Social Networks at the Time of Registrations (2019) (46)
- Impossibility of Full Decentralization in Permissionless Blockchains (2019) (46)
- Characterizing Attacks on Deep Reinforcement Learning (2019) (46)
- CHURP: Dynamic-Committee Proactive Secret Sharing (2019) (46)
- Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems (2012) (46)
- FalconDB: Blockchain-based Collaborative Database (2020) (45)
- Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance (2009) (45)
- Towards Synthesizing Complex Programs From Input-Output Examples (2017) (44)
- The Emperor ’ s New APIs : On the ( In ) Secure Usage of New Client-side Primitives (2010) (44)
- A Demonstration of Sterling: A Privacy-Preserving Data Marketplace (2018) (44)
- How You Act Tells a Lot: Privacy-Leakage Attack on Deep Reinforcement Learning (2019) (43)
- RobustART: Benchmarking Robustness on Architecture Design and Training Techniques (2021) (43)
- Keystone: A Framework for Architecting TEEs (2019) (41)
- Signatures of Reputation (2010) (40)
- Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects? (2008) (40)
- TESLA: Multicast Source Authentication Transform (2000) (40)
- DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis (2018) (39)
- HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism (2013) (39)
- Improving Neural Program Synthesis with Inferred Execution Traces (2018) (38)
- Privacy Scope: A Precise Information Flow Tracking System For Finding Application Leaks (2009) (38)
- PixMix: Dreamlike Pictures Comprehensively Improve Safety Measures (2021) (38)
- Can you fool AI with adversarial examples on a visual Turing test? (2017) (37)
- Anomalous Instance Detection in Deep Learning: A Survey (2020) (37)
- Gradients explode - Deep Networks are shallow - ResNet explained (2017) (36)
- AdvIT: Adversarial Frames Identifier Based on Temporal Consistency in Videos (2019) (36)
- Distributed Evasive Scan Techniques and Countermeasures (2007) (36)
- Clickjacking Revisited: A Perceptual View of UI Security (2014) (36)
- Malware (2004) (35)
- Towards Client-side HTML Security Policies (2011) (35)
- Synthetic Datasets for Neural Program Synthesis (2019) (35)
- HookScout: Proactive Binary-Centric Hook Detection (2010) (33)
- Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures (2008) (33)
- Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration (2009) (33)
- Design space and analysis of worm defense strategies (2006) (33)
- Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence (2020) (32)
- Neural Code Completion (2017) (32)
- Note on Attacking Object Detectors with Adversarial Stickers (2017) (32)
- Keystone: An Open Framework for Architecting TEEs (2019) (32)
- Practical Differential Privacy for SQL Queries Using Elastic Sensitivity (2017) (31)
- A Machine Learning Approach to Prevent Malicious Calls over Telephony Networks (2018) (30)
- SAM: a flexible and secure auction architecture using trusted hardware (2001) (30)
- A Cryptanalysis of the High-Bandwidth Digital Content Protection System (2001) (30)
- Synthesize, Execute and Debug: Learning to Repair for Neural Program Synthesis (2020) (29)
- Data Capsule: A New Paradigm for Automatic Compliance with Data Privacy Regulations (2019) (29)
- BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning (2021) (29)
- Data-Confined HTML5 Applications (2013) (28)
- SAFE: Secure authentication with Face and Eyes (2013) (28)
- Towards Inspecting and Eliminating Trojan Backdoors in Deep Neural Networks (2020) (27)
- The exploding gradient problem demystified - definition, prevalence, impact, origin, tradeoffs, and solutions (2017) (27)
- Poster : Getting The Point ( er ) : On the Feasibility of Attacks on Code-Pointer Integrity (2015) (27)
- Practical One-Shot Federated Learning for Cross-Silo Setting (2020) (26)
- Parametrized Hierarchical Procedures for Neural Programming (2018) (26)
- Duet: an expressive higher-order language and linear type system for statically enforcing differential privacy (2019) (26)
- BLITZ: Compositional bounded model checking for real-world programs (2013) (25)
- Signatures of Reputation : Towards Trust Without Identity (2010) (25)
- User Recognition by Keystroke Latency Pattern Analysis (1997) (25)
- Anonymous Multi-Attribute Encryption with Range Query and Conditional Decryption∗ (2006) (24)
- DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis (2019) (23)
- Using EEG-Based BCI Devices to Subliminally Probe for Private Information (2017) (22)
- Data Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses (2020) (22)
- Detecting Stealthy Spreaders Using Online Outdegree Histograms (2007) (22)
- Scalability vs. Utility: Do We Have to Sacrifice One for the Other in Data Importance Quantification? (2021) (22)
- Private Keyword-Based Push and Pull with Applications to Anonymous Communication (2004) (22)
- FreeMarket: Shopping for free in Android applications (2012) (21)
- Zero Knowledge Proofs for Decision Tree Predictions and Accuracy (2020) (21)
- MLSys: The New Frontier of Machine Learning Systems (2019) (21)
- Chorus: Differential Privacy via Query Rewriting (2018) (20)
- SysML: The New Frontier of Machine Learning Systems (2019) (20)
- Quasi-Efficient Revocation of Group Signatures (2003) (20)
- MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs (2020) (20)
- Proceedings of the 2009 ACM workshop on Cloud computing security (2009) (19)
- Sting: An End-to-End Self-Healing System for Defending against Internet Worms (2007) (19)
- Transformation-aware Exploit Generation using a HI-CFG (2013) (19)
- Subliminal Probing for Private Information via EEG-Based BCI Devices (2013) (19)
- Extracting Models of Security-Sensitive Operations using String-Enhanced White-Box Exploration on Binaries (2009) (18)
- Analysis-Resistant Malware (2008) (18)
- REINAM: reinforcement learning for input-grammar inference (2019) (18)
- Latent Execution for Neural Program Synthesis Beyond Domain-Specific Languages (2021) (18)
- PIANO: Proximity-Based User Authentication on Voice-Powered Internet-of-Things Devices (2017) (17)
- An Empirical and Comparative Analysis of Data Valuation with Scalable Algorithms (2019) (17)
- SoK: Validating Bridges as a Scaling Solution for Blockchains (2021) (17)
- Leveraging Unlabeled Data for Watermark Removal of Deep Neural Networks (2019) (17)
- Rosetta: Extracting Protocol Semantics using Binary Analysis with Applications to Protocol Replay and NATRewriting (2007) (17)
- Opaak: using mobile phones to limit anonymous identities online (2012) (17)
- Zero-Shot Information Extraction as a Unified Text-to-Triple Translation (2021) (17)
- Context-centric Security (2012) (16)
- What Would Jiminy Cricket Do? Towards Agents That Behave Morally (2021) (16)
- Sanctorum: A lightweight security monitor for secure enclaves (2018) (16)
- Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models (2021) (16)
- Exploring the Unprecedented Privacy Risks of the Metaverse (2022) (16)
- D2P-Fed: Differentially Private Federated Learning With Efficient Communication (2020) (15)
- Inter-Disciplinary Research Challenges in Computer Systems for the 2020s (2018) (15)
- Secure Auctions in a Publish/Subscribe System (2000) (14)
- Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies (2012) (14)
- End-to-end Training of Differentiable Pipelines Across Machine Learning Frameworks (2017) (14)
- Analysis and defense of vulnerabilities in binary code (2008) (14)
- Grammar and model extraction for security applications using dynamic program binary analysis (2010) (13)
- Tracking Dynamic Sources of Malicious Activity at Internet Scale (2009) (13)
- Black Box Anomaly Detection: Is It Utopian? (2006) (13)
- A System for Automated Open-Source Threat Intelligence Gathering and Management (2021) (12)
- Learning Neural Programs To Parse Programs (2017) (12)
- Sting: An End-to-End Self-healing System for Defending against Zero-day Worm Attacks on Commodity Software (2006) (12)
- Towards Mitigating Audio Adversarial Perturbations (2018) (12)
- Stimuli for Gaze Based Intrusion Detection (2012) (11)
- Keystone (2020) (11)
- Towards Specification-Directed Program Repair (2018) (11)
- Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study (2019) (11)
- Recognizing malicious software behaviors with tree automata inference (2012) (10)
- Privacy-preserving distributed information sharing (2006) (10)
- PlotCoder: Hierarchical Decoding for Synthesizing Visualization Code in Programmatic Context (2021) (10)
- Model-Agnostic Round-Optimal Federated Learning via Knowledge Transfer (2020) (9)
- Influence : A Quantitative Approach for Data Integrity (2008) (9)
- Automatic Malware Analysis: An Emulator Based Approach (2012) (9)
- SoK: Decentralized Finance (DeFi) Attacks (2022) (8)
- Secure Distributed Data Aggregation (2011) (8)
- A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence (2021) (8)
- Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community (2012) (8)
- Going Incognito in the Metaverse (2022) (7)
- Practical Techniques for Searches on Encrypted Data (cid:3) (7)
- Black-box Attacks on Deep Neural Networks via Gradient Estimation (2018) (7)
- Distributed Private Data Analysis (2017) (7)
- New Directions in Social Authentication (2015) (7)
- BeeTrace: A Unified Platform for Secure Contact Tracing that Breaks Data Silos (2020) (7)
- A High-Performance Oblivious RAM Controller on the Convey HC-2ex Heterogeneous Computing Platform (2013) (7)
- Predicting Congressional Votes Based on Campaign Finance Data (2012) (7)
- Reciprocity in Social Networks: Measurements, Predictions, and Implications (2013) (7)
- Towards Defending Multiple Adversarial Perturbations via Gated Batch Normalization (2020) (6)
- Privacy-breaching Behavior Analysis (2013) (6)
- Influence: A Quantitative Approach for Data Integrity (CMU-CyLab-08-005) (2008) (6)
- A security study of the Internet : an analysis of firewall behavior and anonymous DNS (2004) (6)
- Chorus: a Programming Framework for Building Scalable Differential Privacy Mechanisms (2018) (6)
- zkBridge: Trustless Cross-chain Bridges Made Practical (2022) (5)
- Adversarial Training (2018) (5)
- Taxonomy and Effectiveness of Worm Defense Strategies (2005) (5)
- Orion: Zero Knowledge Proof with Linear Prover Time (2022) (5)
- SoK: Decentralized Finance (DeFi) Incidents (2022) (5)
- Shades of Finality and Layer 2 Scaling (2022) (5)
- Towards Attack-Agnostic Defenses (2006) (5)
- Parallel and Asynchronous Smart Contract Execution (2021) (5)
- Bidirectional Protocol Reverse Engineering : Message Format Extraction and Field Semantics Inference (2009) (4)
- On a First Step to the Automatic Generation of Security Protocols (1999) (4)
- DensePure: Understanding Diffusion Models towards Adversarial Robustness (2022) (4)
- ASPIRE: Iterative Specification Synthesis for Security (2015) (4)
- UniFed: A Benchmark for Federated Learning Frameworks (2022) (4)
- DPlis: Boosting Utility of Differentially Private Deep Learning via Randomized Smoothing (2021) (4)
- Automatic Malware Analysis (2013) (4)
- Privacy settings from contextual attributes: A case study using Google Buzz (2011) (4)
- PAKE-Based Web Authentication : the Good , the Bad , and the Hurdles (2009) (4)
- Towards practical differentially private causal graph discovery (2020) (4)
- Privacy-preserving distributed, automated signature-based detection of new internet worms (2010) (4)
- Grounded Graph Decoding Improves Compositional Generalization in Question Answering (2021) (4)
- Byzantine-Robust Federated Learning with Optimal Statistical Rates and Privacy Guarantees (2022) (4)
- PrivGuard: Privacy Regulation Compliance Made Easier (2022) (3)
- Latent Execution for Neural Program Synthesis (2021) (3)
- Analysis of Trigger Conditions and Hidden Behaviors (2013) (3)
- How Open Should Open Source Be? (2011) (3)
- Towards Automatically Eliminating Integer-Based Vulnerabilities (2006) (3)
- Is Vertical Logistic Regression Privacy-Preserving? A Comprehensive Privacy Analysis and Beyond (2022) (3)
- Transformation-Aware Symbolic Execution for System Test Generation (2013) (3)
- Towards Practical Automatic Generation of Multipath Vulnerability Signatures (2007) (3)
- ZEBRA: Anonymous Credentials with Practical On-chain Verification and Applications to KYC in DeFi (2022) (3)
- CHURP (2019) (3)
- A Parallel Method of Deep Packet Inspection based on Message-Passing Interface (2015) (2)
- Hidden Code Extraction (2013) (2)
- Lessons Learned: Surveying the Practicality of Differential Privacy in the Industry (2022) (2)
- Hooking Behavior Analysis (2013) (2)
- Hierarchical Variational Imitation Learning of Control Programs (2019) (2)
- Symbolic Grey-Box Learning of Input-Output Relations (2012) (2)
- Beyond Output Voting: Detecting Compromised Replicas using Behavioral Distance (2006) (2)
- Towards Bidirectional Protection in Federated Learning (2020) (2)
- Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams (2020) (2)
- Classifying Perturbation Types for Robustness Against Multiple Adversarial Perturbations (2020) (2)
- New Directions for User Authentication : Reflex instead of Reflection (2010) (2)
- The Blockchain Imitation Game (2023) (2)
- Version Measuring Channel Capacity to Distinguish Undue Influence (2007) (2)
- Building Open Trusted Execution Environments (2020) (2)
- PrivFramework: A System for Configurable and Automated Privacy Policy Compliance (2020) (2)
- The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts (2020) (2)
- Software-Based Off-Chip Memory Protection for RISC-V Trusted Execution Environments (2020) (2)
- Proceedings of the AAAI-20 Workshop on Intelligent Process Automation (IPA-20) (2020) (1)
- Title Private and continual release of statistics (2010) (1)
- Detecting and preventing control-flow hijacking attacks in commodity software (2008) (1)
- AI and Security: Lessons, Challenges and Future Directions (2020) (1)
- FPGate: The Last Building Block For A Practical CFI Solution (2012) (1)
- Formal verification for computer security: Lessons learned and future directions (2016) (1)
- SoK: Data Privacy in Virtual Reality (2023) (1)
- Perturbation type categorization for multiple adversarial perturbation robustness (2022) (1)
- Hierarchical Imitation Learning via Variational Inference of Control Programs (2018) (1)
- An End-to-End Approach for Natural Language to IFTTT Program Translation (2016) (1)
- 1 Automatically Identifying Trigger-based Behavior in Malware (2007) (1)
- The Trilemma of Stablecoin (2021) (1)
- Dynamic Binary Analysis Platform (2013) (1)
- Measuring channel capacity to distinguish undue influence (abstract only) (2009) (1)
- Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice (2023) (0)
- Unique Identification of 50, 000+ Virtual Reality Users from Head & Hand Motion Data (2023) (0)
- Security cloud service framework for hardening in the field code of mobile software applications (2017) (0)
- Session details: Connecting to the web 2.0 (2009) (0)
- zkBridge (2022) (0)
- Differentially Private Frequency Moments Estimation with Polylogarithmic Space (2021) (0)
- Specular: Towards Trust-minimized Blockchain Execution Scalability with EVM-native Fraud Proofs (2022) (0)
- The Sky Above The Clouds (2022) (0)
- Blockchain Large Language Models (2023) (0)
- ConsensusDay '22: ACM Workshop on Developments in Consensus (2022) (0)
- Imitation Learning of Hierarchical Programs via Variational Inference (2018) (0)
- How things Work and Fail (2012) (0)
- Security of Machine Learning (2019) (0)
- Title Optimal lower bound for differentially private multi-partyaggregation (2012) (0)
- VoteTrust: A System to Defend against Social Network Sybils in Facebook (2018) (0)
- Dynamic Quarantine of Internet Worms (CMU-PDL-03-108) (2003) (0)
- A Critical Analysis of Distribution Shift (2021) (0)
- Estimation based Efficient and Resilient Hierarchical In-Network Data Aggregation Scheme for Wireless Sensor Network (2016) (0)
- Survivable Loosely Coupled Architectures (2003) (0)
- Learning what to learn in a neural program (2018) (0)
- Ecient, Secure, and Privacy-preserving Distributed Hot Item Identification (2006) (0)
- Towards Building a Responsible Data Economy (2021) (0)
- APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED (2018) (0)
- A Generic Scheme for Zero-Knowledge Sets (2005) (0)
- ETWORK A RCHITECTURE S EARCH (2018) (0)
- ADVM'21: 1st International Workshop on Adversarial Learning for Multimedia (2021) (0)
- DAWN SONG CARNEGIE MELLON UNIVERSITY THURSDAY FEBRUARY 16 , 2006 Scaife Hall Auditorium Room 125 4 : 00 PM Refreshments (2006) (0)
- Advanced binary analysis techniques for malware defense (2010) (0)
- Signatures of Reputation (Extended Abstract) (2010) (0)
- FED-χ2: Privacy Preserving Federated Correlation Test (2021) (0)
- Recognizing malicious software behaviors with tree automata inference (2012) (0)
- F2ED-Learning: Good Fences Make Good Neighbors (2020) (0)
- Power Efficient Data Fusion Assurance Scheme for Sensor Network using Silent Negative Voting (2016) (0)
- DeepSeer: Interactive RNN Explanation and Debugging via State Abstraction (2023) (0)
- Verifying Server Computation (2005) (0)
- Homomorphi Signature S (2002) (0)
- GAMEPAD: A LEARNING ENVIRONMENT FOR THEO- (2018) (0)
- Exploring the Application of Deep Learning for Supervised Learning Problems (2017) (0)
- Private and Threshold Set-Intersection Lea Kissner (2004) (0)
- DR AF T VTrust : Regaining Trust on Virtual Calls (2015) (0)
- Sound Over-and Under-Approximations of Complexity and Information Security (SOUCIS) (2018) (0)
- Efficient Oblivious RAM (2011) (0)
- Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing (2022) (0)
- E XPLORING THE A PPLICATION OF D EEP L EARNING FOR S UPERVISED L EARNING P ROBLEMS (2016) (0)
- Safe Machine Learning ( October 19-20 , 2017 ) DARPA workshop at the Simons Institute Organizers : (2018) (0)
- Improving Zero-positive Anomaly Detection with Differential Privacy (2019) (0)
- Proactive Secret Sharing in Dynamic Environments (2019) (0)
- TrojDiff: Trojan Attacks on Diffusion Models with Diverse Targets (2023) (0)
- CS 161 Computer Security Fall 2008 (2008) (0)
- Multi-Factor Key Derivation Function (MFKDF) (2022) (0)
- Cerberus (2022) (0)
- CS 161 Computer Security Fall 2008 Dawn Song Notes 3 1 Modes of Operations : A symmetric encryption scheme allows (2008) (0)
- Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure,&Practical Key Management (2022) (0)
This paper list is powered by the following services:
Other Resources About Dawn Song
What Schools Are Affiliated With Dawn Song?
Dawn Song is affiliated with the following schools: