M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, Eds., Malware Detection, Advances in Information Security, Vol. 27, New York, NY: Springer Science+Business Media, LLC, 2007.
Book chapters or sections
D. Brumley, C. Hartwig, Z. Liang, J. Newsome, D. Song, and H. Yin, "Automatically Identifying Trigger-Based Behavior in Malware," in Botnet Detection: Countering the Largest Security Threat, W. Lee, C. Wang, and D. Dagon, Eds., Advances in Information Security, Vol. 36, New York, NY: Springer Science+Business Media, LLC, 2007, pp. 65-88.
M. G. Kang, J. Caballero, and D. Song, "Distributed evasive scan techniques and countermeasures," in Detection of Intrusions and Malware, and Vulnerability Assessment: Proc. 4th Intl. Conf. (DIMVA 2007), B. M. Hammerli and R. Sommer, Eds., Lecture Notes in Computer Science, Vol. 4579, Berlin, Germany: Springer-Verlag, 2007, pp. 157-174.
D. Brumley, J. Newsome, and D. Song, "Sting: An End-to-End Self-Healing System for Defending against Internet Worms," in Malware Detection, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, Eds., Advances in Information Security, Vol. 27, New York, NY: Springer Science+Business Media, LLC, 2006, pp. 147-170.
D. Gao, M. K. Reiter, and D. Song, "Behavioral distance for intrusion detection," in Recent Advances in Intrusion Detection: Proc. 8th Intl. Symp. (RAID 2005). Revised Papers, A. Valdez and D. Zamboni, Eds., Lecture Notes on Computer Science, Vol. 3858, Berlin, Germany: Springer-Verlag, 2006, pp. 63-81.
J. Newsome, B. Karp, and D. Song, "Paragraph: Thwarting signature learning by training maliciously," in Recent Advances in Intrusion Detection: Proc. 9th Intl. Symp. (RAID 2006), D. Zamboni and C. Kruegel, Eds., Lecture Notes in Computer Science, Vol. 4219, Berlin, Germany: Springer-Verlag, 2006, pp. 81-105.
D. Gao, M. K. Reiter, and D. Song, "Behavioral distance measurement using hidden Markov models," in Recent Advances in Intrusion Detection: Proc. 9th Intl. Symp. (RAID 2006), D. Zamboni and C. Kruegel, Eds., Lecture Notes in Computer Science, Vol. 4219, Berlin, Germany: Springer-Verlag, 2006, pp. 19-40.
L. Kissner and D. Song, "Privacy-preserving set operations," in Advances in Cryptology: Proc. 25th Annual Intl. Cryptology Conf. (CRYPTO 2005), V. Shoup, Ed., Lecture Notes in Computer Science, Vol. 3621, Berlin, Germany: Springer-Verlag, 2005, pp. 241-257.
A. Blum, D. Song, and S. Venkataraman, "Detection of interactive stepping stones: Algorithms and confidence bounds," in Recent Advances in Intrusion Detection: Proc. 7th Intl. Symp. (RAID 2004), E. Jonsson, A. Valdes, and M. Almgren, Eds., Lecture Notes in Computer Science, Vol. 3224, Berlin, Germany: Springer-Verlag, 2004, pp. 258-277.
G. Ateniese, D. Song, and G. Tsudik, "Quasi-efficient revocation of group signatures," in Financial Cryptography: Proc. 6th Intl. Conf. (FC 2002). Revised Papers, M. Blaze, Ed., Lecture Notes in Computer Science, Vol. 2357, Berlin, Germany: Springer-Verlag, 2003, pp. 183-197.
R. Johnson, D. Molnar, D. Song, and D. Wagner, "Homomorphic signature schemes," in Topics in Cryptography: The Cryptographer's Track at the RSA Conf. (CT-RSA 2002), B. Preneel, Ed., Lecture Notes in Computer Science, Vol. 2271, Berlin, Germany: Springer-Verlag, 2002, pp. 244-262.
I. Stoica, D. Song, R. A. Popa, D. A. Patterson, M. W. Mahoney, R. H. Katz, A. D. Joseph, M. Jordan, J. M. Hellerstein, J. Gonzalez, and et al, "A berkeley view of systems challenges for AI," arXiv preprint arXiv:1712.05855, 2017.
A. Barth, B. I. P. Rubinstein, M. Sundararajan, J. C. Mitchell, D. Song, and P. Bartlett, "A Learning-Based Approach to Reactive Security.," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 4, pp. 482-493, July 2012.
J. Caballero and D. Song, "Automatic Protocol Reverse-Engineering: Message Format Extraction and Field Semantics Inference.," Computer Networks, June 2012.
Z. Gong, N. Matzke, B. Ermentrout, D. Song, J. E. Vendetti, M. Slatkin, and G. Oster, "The evolution of patterns on Conus shells," Proceedings of the National Academy of Sciences (PNAS), vol. 109, no. 5, Jan. 2012.
G. Atenisesef, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, "Remote Data Checking Using Provable Data Possession," ACM Transactions on Information and System Security (TISSEC), vol. 14, no. 1, May 2011.
H. Chan, H. Hsiao, A. Perrig, and D. Song, "Secure Distributed Data Aggregation," Foundations and Trends in Databases, vol. 3, no. 3, pp. 149-201, March 2011.
J. Bethencourt, D. Song, and B. Waters, "New techniques for private stream searching," ACM Transactions on Information and System Security (TISSEC), vol. 12, no. 3, pp. 16, Jan. 2009.
H. Chen, A. Perrig, B. Przydatek, and D. Song, "SIA: Secure Information Aggregation in sensor networks," J. Computer Security: Special Issue on Security of Ad Hoc and Sensor Networks, vol. 15, no. 1, pp. 69-102, Jan. 2007.
X. Chen, L. Gong, A. Cheung, and D. Song, "PlotCoder: Hierarchical Decoding for Synthesizing Visualization Code in Programmatic Context," in Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing (Volume 1: Long Papers), Online: Association for Computational Linguistics, 2021, pp. 2169--2181.
D. Lee, D. Kohlbrenner, S. Shinde, K. Asanović, and D. Song, "Keystone: An Open Framework for Architecting Trusted Execution Environments," in Proceedings of the Fifteenth European Conference on Computer Systems, EuroSys'20, 2020.
M. Maas, E. Love, E. Stefanov, M. Tiwari, E. Shi, K. Asanović, J. D. Kubiatowicz, and D. Song, "Phantom: Practical oblivious computation in a secure processor," in Proceedings of the 2013 ACM SIGSAC conference on Computer \& communications security, 2013, pp. 311--324.
M. Tiwari, P. Mohan, A. Osheroff, H. Alkaff, E. Love, E. Shi, D. Song, and K. Asanović, "Context-centric Security," in Proceedings of the 7th USENIX Workshop on Hot Topics in Security, HotSec'12, Usenix, 2012.
R. Biedert, M. Frank, I. Martinovic, and D. Song, "Stimuli for Gaze Based Intrusion Detection," in Proceedings of the 6th International Symposium on Digital Forensics and Information Security, 2012.
P. Mohan, A. Thakurta, E. Shi, D. Song, and D. E. Culler, "GUPT: privacy preserving data analysis made easy," in Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, SIGMOD '12, New York, NY, USA: ACM, 2012, pp. 349--360.
L. Martignoni,, S. McCamant, P. Poosankam, D. Song, and P. Maniatis, "Path-Exploration Lifting: Hi-Fi Tests for Lo-Fi Emulators," in Proceedings of Seventeenth International Conference on Architectural Support for Programming Languages and Operating Systems, 2012, pp. 337-348.
E. Stefanov, E. Shi, and D. Song, "Towards Practical Oblivious RAM," in Proceedings of the 19th Annual Network & Distributed System Security Symposium, 2012.
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, "Android permissions demystified," in Proceedings of the 18th ACM conference on Computer and Communications Security, 2011, pp. 627-638.
J. Weinberger, A. Barth, and D. Song, "Towards client-side HTML security policies," in Proceedings of the 6th USENIX conference on Hot topics in security, HotSec'11, Berkeley, CA, USA: USENIX Association, 2011, pp. 8--8.
D. citeKey Babi\'{c}, D. Reynaud, and D. Song, "Malware analysis with tree automata inference," in Proceedings of the 23rd international conference on Computer aided verification, CAV'11, Berlin, Heidelberg: Springer-Verlag, 2011, pp. 116--131.
D. citeKey Babi\'{c}, L. Martignoni, S. McCamant, and D. Song, "Statically-directed dynamic automated test generation," in Proceedings of the 2011 International Symposium on Software Testing and Analysis, ISSTA '11, New York, NY, USA: ACM, 2011, pp. 12--22.
T. H. Chan, E. Shi, and D. Song, "Private and Continual Release of Statistics.," in Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II, ICALP'10, Berlin, Heidelberg: Springer-Verlag, 2010, pp. 405--417.
H. Yin, P. Poosankam, S. Hanna, and D. Song, "HookScout: Proactive Binary-Centric Hook Detection.," in Seventh Conference on Detection of Intrusions and Malware & Vulnerability Assessment.( DIMVA 2010), 2010.
D. Akhawe, A. Barth, P. Lam, J. C. Mitchell, and D. Song, "Towards a Formal Foundation of Web Security," in Proceedings of the Computer Security Foundations Symposium (CSF 2010), 2010.
P. Saxena, D. Akhawe, S. Hanna, F. Mao, S. McCamant, and D. Song, "A symbolic execution framework for javascript," in Proceedings of the IEEE Symposium on Security and Privacy, 2010.
A. Barth, B. I. P. Rubinstein, M. Sundararajan, J. C. Mitchell, D. Song, and P. Bartlett, "A Learning-Based Approach to Reactive Security," in Financial Cryptography and Data Security '10. Fourteenth International Conference, 2010.
M. G. Kang, H. Yin, S. McCamant, and D. Song, "Emulating Emulation-Resistant Malware.," in Proceedings of the 2nd Workshop on Virtual Machine Security, 2009.
P. Saxena, P. Poosankam, S. McCamant, and D. Song, "Loop-Extended Symbolic Execution on Binary Programs.," in Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), July 2009., 2009.
D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. Gyung Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena, "BitBlaze: A New Approach to Computer Security via Binary Analysis," in Proceedings of the 4th International Conference on Information Systems Security, 2008.
J. Bethencourt, D. Song, and B. Waters, "Analysis-resistant malware," in Proc. 15th Annual Network and Distributed System Security Symp. (NDSS '08), Reston, VA: Internet Society, 2008, pp. 13 pg.
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in Proc. 14th ACM Conf. on Computer and Communications Security (CCS '07), P. Ning, Ed., New York, NY: The Association for Computing Machinery, Inc., 2007, pp. 598-609.
J. Caballero, H. Yin, Z. Liang, and D. Song, "Polyglot: Automatic extraction of protocol message format using dynamic binary analysis," in Proc. 14th ACM Conf. on Computer and Communications Security (CCS '07), P. Ning, S. De Capitani di Vimercati, and P. Syverson, Eds., New York, NY: The Association for Computing Machinery, Inc., 2007, pp. 317-329.
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, "Panorama: Capturing system-wide information flow for malware detection and analysis," in Proc. 14th ACM Conf. on Computer and Communications Security (CCS '07), P. Ning, S. De Capitani di Vimercati, and P. F. Syverson, Eds., New York, NY: The Association for Computing Machinery, Inc., 2007, pp. 116-127.
M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. Song, "Dynamic spyware analysis," in 2007 USENIX Annual Technical Conf. (USENIX '07), Berkeley, CA: USENIX Association, 2007, pp. 233-246.
E. Shi, J. Bethencourt, T. H. Chan, D. Song, and A. Perrig, "Multi-dimensional range query over encrypted data," in Proc. 2007 IEEE Symp. on Security and Privacy (S&P '07), Los Alamitos, CA: IEEE Computer Society, 2007, pp. 350-364.
J. Tucek, J. Newsome, S. Lu, C. Huang, S. Xanthos, D. Brumley, Y. Zhou, and D. Song, "Sweeper: A lightweight end-to-end system for defending against fast worms," in Proc. 2nd European Conf. on Computer Systems (EuroSys '07), New York, NY: The Association for Computing Machinery, Inc., 2007, pp. 115-128.
S. Venkataraman, J. Caballero, P. Poosankam, M. G. Kang, and D. Song, "FiG: Automatic FIngerprint Generation," in Proc. 14th Annual Network & Distributed System Security Symp. (NDSS '07), Reston, VA: Internet Society, 2007, pp. 16 pg.
S. Venkataraman, J. Caballero, D. Song, A. Blum, and J. Yates, "Black box anomaly detection: Is it Utopian?," in Proc. 5th Workshop on Hot Topics in Networks (HotNets-V), New York, NY: The Association for Computing Machinery, Inc., 2006, pp. 127-132.
J. Newsome, D. Brumley, J. Franklin, and D. Song, "Replayer: Automatic protocol replay by binary analysis," in Proc. 13th ACM Conf. on Computer and Communications Security (CCS '06), A. Juels, R. N. Wright, and S. De Capitani di Vimercati, Eds., New York, NY: The Association for Computing Machinery, Inc., 2006, pp. 311-321.
H. Chan, A. Perrig, and D. Song, "Secure hierarchical in-network aggregation in sensor networks," in Proc. 13th ACM Conf. on Computer and Communications Security (CCS '06), A. Juels, R. N. Wright, and S. De Capitani di Vimercati, Eds., New York, NY: The Association for Computing Machinery, Inc., 2006, pp. 278-287.
D. Brumley and D. Song, "Towards attack-agnostic defenses," in Proc. 1st USENIX Workshop on Hot Topics in Security (HotSec '06), Berkeley, CA: USENIX Association, 2006, pp. 57-62.
D. Brumley, L. H. Liu, P. Poosankam, and D. Song, "Design space and analysis of worm defense strategies," in Proc. 2006 ACM Symp. on Information, Computer and Communications Security (ASIACCS '06), F. C. Lin, D. T. Lee, B. S. Lin, S. Shieh, and S. Jajodia, Eds., New York, NY: The Association for Computing Machinery, Inc., 2006, pp. 125-137.
M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant, "Semantics-aware malware detection," in Proc. 2005 IEEE Symp. on Security and Privacy (S&P '05), Los Alamitos, CA: IEEE Computer Society, 2005, pp. 32-46.
M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. E. Bryant, "Semantics-aware malware detection," in Proc. 2005 IEEE Symp. on Security and Privacy (S&P '05), Los Alamitos, CA: IEEE Computer Society, 2005, pp. 32-46.
A. Yaar, A. Perrig, and D. Song, "FIT: Fast Internet Traceback," in Proc. 24th Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM 2005), K. Makki and E. Knightly, Eds., Vol. 2, Piscataway, NJ: IEEE Press, 2005, pp. 1395-1406.
S. Venkataraman, D. Song, P. B. Gibbons, and A. Blum, "New streaming algorithms for fast detection of superspreaders," in Proc. 12th Annual Network and Distributed System Security Symp. (NDSS '05), Reston, VA: Internet Society, 2005, pp. 18 pg.
D. Gao, M. K. Reiter, and D. Song, "Gray-box extraction of execution graphs for anomaly detection," in Proc. 11th ACM Conf. on computer and Communications Security (CCS '04), New York, NY: The Association for Computing Machinery, Inc., 2004, pp. 318-329.
C. Wong, C. Wang, D. Song, S. Bielski, and G. R. Ganger, "Dynamic quarantine of Internet worms," in Proc. 2004 IEEE Intl. Conf. on Dependable Systems and Networks (DSN 2004), Los Alamitos, CA: IEEE Computer Society, 2004, pp. 73-82.
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in sensor networks: Analysis & defenses," in Proc. 3rd Intl. Symp. on Information Processing in Sensor Networks (IPSN 2004), New York, NY: The Association for Computing Machinery, Inc., 2004, pp. 259-268.
B. Przydatek, D. Song, and A. Perrig, "SIA: Secure Information Aggregation in sensor networks," in Proc. 1st Intl. Conf. on Embedded Networked Sensor Systems, New York, NY: The Association for Computing Machinery, Inc., 2003, pp. 255-265.
S. Crosby, I. Goldberg, R. Johnson, D. Song, and D. Wagner, "A cryptanalysis of the High-Bandwidth Digital Content Protection system," in Security and Privacy in Digital Right Management: Proc. 2001 Workshop on Security and Privacy in Digital Rights Management. Revised Papers, T. Sander, Ed., Lecture Notes in Computer Science, Vol. 2320, Berlin, Germany: Springer-Verlag, 2002, pp. 159-182.
D. Song, "Practical forward secure group signature schemes," in Proc. 8th ACM Conf. on Computer and Communications Security (CCS '01), P. Samarati, Ed., New York, NY: The Association for Computing Machinery, Inc., 2001, pp. 225-234.
D. Song and A. Perrig, "Advanced and authenticated marking schemes for IP traceback," in Proc. 20th Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM 2001), Vol. 2, Piscataway, NJ: IEEE Press, 2001, pp. 878-886.
A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast," in Proc. 8th Annual Symp. on Network and Distributed System Security (NDSS '01), Reston, VA: Internet Society, 2001, pp. 12 pg.
D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. 2000 IEEE Symp. on Security and Privacy (SP '00), Los Alamitos, CA: IEEE Computer Society, 2000, pp. 44-55.
I. Stoica, D. Song, R. A. Popa, D. A. Patterson, M. W. Mahoney, R. H. Katz, A. D. Joseph, M. Jordan, J. M. Hellerstein, J. Gonzalez, K. Goldberg, A. Ghodsi, D. E. Culler, and P. Abbeel, "A Berkeley View of Systems Challenges for AI," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2017-159, Oct. 2017.
D. Caselden, A. Bazhanyuk, M. Payer, L. Szekeres, S. McCamant, and D. Song, "Transformation-aware Exploit Generation using a HI-CFG," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2013-85, May 2013.
D. Akhawe, F. Li, W. He, P. Saxena, and D. Song, "Data-Confined HTML5 Applications," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2013-20, March 2013.
A. Barth, S. Li, B. I. P. Rubinstein, and D. Song, "How Open Should Open Source Be?," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2011-98, Aug. 2011.
P. Saxena, D. Akhawe, S. Hanna, F. Mao, S. McCamant, and D. Song, "A Symbolic Execution Framework for JavaScript," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2010-26, March 2010.
M. G. Kang, H. Yin, S. Hanna, S. McCamant, and D. Song, "Emulating Emulation-Resistant Malware," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-58, May 2009.
J. Bethencourt, D. Song, and B. Waters, "New Techniques for Private Stream Searching," Carnegie Mellon University, School of Computer Science, Tech. Rep. CMU-CS-06-106, Feb. 2006.
L. Kissner and D. Song, "Privacy-Preserving Set Operations," Carnegie Mellon University, School of Computer Science, Tech. Rep. CMU-CS-05-113, June 2005.
L. Kissner and D. Song, "Private and Threshold Set-Intersection," Carnegie Mellon University, School of Computer Science, Tech. Rep. CMU-CS-04-181, Nov. 2004.
M. Chew and D. Song, "Mitigating Buffer Overflows by Operating System Randomization," Carnegie Mellon University, School of Computer Science, Tech. Rep. CMU-CS-02-197, Dec. 2002.
D. Song, "An Automatic Approach to Building Secure Systems," University of California at Berkeley, Department of EECS, 2002.
Masters Reports
A. Gudibande, "On Imitating Proprietary Language Models," D. Song, Ed., EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2023-149, May 2023.
A. Low, D. Krishna, F. Zhang, L. Wang, Y. Zhang, A. Juels, and D. Song, "Proactive Secret Sharing in Dynamic Environments," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2019-62, May 2019.