Dawn Song - Publications

Affiliations: 
Electrical Engineering and Computer Science University of California, Berkeley, Berkeley, CA, United States 
Area:
Operating Systems & Networking (OSNT); Security (SEC); Programming Systems (PS)

14 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Shi E, Chan T-H, Rieffel E, Song D. Distributed Private Data Analysis: Lower Bounds and Practical Constructions Acm Transactions On Algorithms. 13: 50. DOI: 10.1145/3146549  0.355
2013 Frank M, Biedert R, Ma E, Martinovic I, Song D. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication Ieee Transactions On Information Forensics and Security. 8: 136-148. DOI: 10.1109/Tifs.2012.2225048  0.392
2013 Caballero J, Song D. Automatic protocol reverse-engineering: Message format extraction and field semantics inference Computer Networks. 57: 451-474. DOI: 10.1016/J.Comnet.2012.08.003  0.354
2012 Barth A, Rubinstein BIP, Sundararajan M, Mitchell JC, Song D, Bartlett PL. A Learning-based approach to reactive security Ieee Transactions On Dependable and Secure Computing. 9: 482-493. DOI: 10.1109/Tdsc.2011.42  0.385
2012 Song D, Shi E, Fischer I, Shankar U. Cloud data protection for the masses Computer. 45: 39-45. DOI: 10.1109/Mc.2012.1  0.348
2011 Chan T-H, Shi E, Song D. Private and Continual Release of Statistics Acm Transactions On Information and System Security. 14: 26. DOI: 10.1145/2043621.2043626  0.334
2011 Ateniese G, Burns R, Curtmola R, Herring J, Khan O, Kissner L, Peterson Z, Song D. Remote data checking using provable data possession Acm Transactions On Information and System Security. 14. DOI: 10.1145/1952982.1952994  0.46
2011 Zhu D(, Jung J, Song D, Kohno T, Wetherall D. TaintEraser Acm Sigops Operating Systems Review. 45: 142-154. DOI: 10.1145/1945023.1945039  0.327
2010 Bethencourt J, Shi E, Song D. Signatures of Reputation Lecture Notes in Computer Science. 6052: 400. DOI: 10.1007/978-3-642-14577-3_35  0.482
2009 Bethencourt J, Song D, Waters B. New Techniques for Private Stream Searching Acm Transactions On Information and System Security. 12: 16. DOI: 10.1145/1455526.1455529  0.486
2009 Gao D, Reiter MK, Song D. Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance Ieee Transactions On Dependable and Secure Computing. 6: 96-110. DOI: 10.1109/Tdsc.2008.39  0.352
2008 Brumley D, Newsome J, Song D, Wang H, Jha S. Theory and techniques for automated generation of vulnerability-based signatures Ieee Transactions On Dependable and Secure Computing. 5: 224-241. DOI: 10.1109/Tdsc.2008.55  0.386
2006 Yaar A, Perrig A, Song D. StackPi: New packet marking and filtering mechanisms for DDoS and IP spoofing defense Ieee Journal On Selected Areas in Communications. 24: 1853-1863. DOI: 10.1109/Jsac.2006.877138  0.44
2004 Chan H, Perrig A, Song D. Key distribution techniques for sensor networks Wireless Sensor Network. 277-303. DOI: 10.1007/978-1-4020-7884-2_13  0.301
Show low-probability matches.