Faculty Publications - Dawn Song

Books

  • M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, Eds., Malware Detection, Advances in Information Security, Vol. 27, New York, NY: Springer Science+Business Media, LLC, 2007.

Book chapters or sections

  • D. Brumley, C. Hartwig, Z. Liang, J. Newsome, D. Song, and H. Yin, "Automatically Identifying Trigger-Based Behavior in Malware," in Botnet Detection: Countering the Largest Security Threat, W. Lee, C. Wang, and D. Dagon, Eds., Advances in Information Security, Vol. 36, New York, NY: Springer Science+Business Media, LLC, 2007, pp. 65-88.
  • M. G. Kang, J. Caballero, and D. Song, "Distributed evasive scan techniques and countermeasures," in Detection of Intrusions and Malware, and Vulnerability Assessment: Proc. 4th Intl. Conf. (DIMVA 2007), B. M. Hammerli and R. Sommer, Eds., Lecture Notes in Computer Science, Vol. 4579, Berlin, Germany: Springer-Verlag, 2007, pp. 157-174.
  • D. Brumley, J. Newsome, and D. Song, "Sting: An End-to-End Self-Healing System for Defending against Internet Worms," in Malware Detection, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, Eds., Advances in Information Security, Vol. 27, New York, NY: Springer Science+Business Media, LLC, 2006, pp. 147-170.
  • D. Gao, M. K. Reiter, and D. Song, "Behavioral distance for intrusion detection," in Recent Advances in Intrusion Detection: Proc. 8th Intl. Symp. (RAID 2005). Revised Papers, A. Valdez and D. Zamboni, Eds., Lecture Notes on Computer Science, Vol. 3858, Berlin, Germany: Springer-Verlag, 2006, pp. 63-81.
  • J. Newsome, B. Karp, and D. Song, "Paragraph: Thwarting signature learning by training maliciously," in Recent Advances in Intrusion Detection: Proc. 9th Intl. Symp. (RAID 2006), D. Zamboni and C. Kruegel, Eds., Lecture Notes in Computer Science, Vol. 4219, Berlin, Germany: Springer-Verlag, 2006, pp. 81-105.
  • D. Gao, M. K. Reiter, and D. Song, "Behavioral distance measurement using hidden Markov models," in Recent Advances in Intrusion Detection: Proc. 9th Intl. Symp. (RAID 2006), D. Zamboni and C. Kruegel, Eds., Lecture Notes in Computer Science, Vol. 4219, Berlin, Germany: Springer-Verlag, 2006, pp. 19-40.
  • L. Kissner and D. Song, "Privacy-preserving set operations," in Advances in Cryptology: Proc. 25th Annual Intl. Cryptology Conf. (CRYPTO 2005), V. Shoup, Ed., Lecture Notes in Computer Science, Vol. 3621, Berlin, Germany: Springer-Verlag, 2005, pp. 241-257.
  • A. Blum, D. Song, and S. Venkataraman, "Detection of interactive stepping stones: Algorithms and confidence bounds," in Recent Advances in Intrusion Detection: Proc. 7th Intl. Symp. (RAID 2004), E. Jonsson, A. Valdes, and M. Almgren, Eds., Lecture Notes in Computer Science, Vol. 3224, Berlin, Germany: Springer-Verlag, 2004, pp. 258-277.
  • L. Kissner, A. Oprea, M. K. Reiter, D. Song, and K. Yang, "Private keyword-based push and pull with applications to anonymous communication (Extended Abstract)," in pplied Cryptography and Network Security: Proc. 2nd Intl. Conf. (ACNS 2004), M. Jakobsson, M. Yung, and J. Zhou, Eds., Lecture Notes in Computer Science, Vol. 3089, Berlin, German y: Springer-Verlag, 2004, pp. 16-30.
  • G. Ateniese, D. Song, and G. Tsudik, "Quasi-efficient revocation of group signatures," in Financial Cryptography: Proc. 6th Intl. Conf. (FC 2002). Revised Papers, M. Blaze, Ed., Lecture Notes in Computer Science, Vol. 2357, Berlin, Germany: Springer-Verlag, 2003, pp. 183-197.
  • R. Johnson, D. Molnar, D. Song, and D. Wagner, "Homomorphic signature schemes," in Topics in Cryptography: The Cryptographer's Track at the RSA Conf. (CT-RSA 2002), B. Preneel, Ed., Lecture Notes in Computer Science, Vol. 2271, Berlin, Germany: Springer-Verlag, 2002, pp. 244-262.
  • D. Song, A. Perrig, and D. Phan, "AGVI - Automatic Generation, Verification, and Implementation of security protocols," in Computer Aided Verification: Proc. 13th Intl. Conf. (CAV 2001), G. Berry, H. Comon, and A. Finkel, Eds., Lecture Notes in Computer Science, Vol. 2102, Berlin, Germany: Springer-Verlag, 2001, pp. 241-245.

Articles in journals or magazines

Articles in conference proceedings

Technical Reports

Patents

Talks or presentations

Ph.D. Theses

Masters Reports

Miscellaneous