Dawn Song [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Adversarial Example Defense: Ensembles of Weak Defenses are not Strong woot-2017 - vancouver,canada
VTrust: Regaining Trust on Virtual Calls NDSS-2016 - california,usa
Next-Generation Security Technologies in a Connected and Intelligent World CRC-2016 - uni of singapore,singapore
Recognizing Functions in Binaries with Neural Networks SecuritySymposium-2015 - washington,USA
ASPIRE: Iterative Specification Synthesis for Security HOTos-2015 - Katause,Switzerland
VTint: Protecting Virtual Function Tables' Integrity NDSS-2015 - san diego,usa
ShadowCrypt: Encrypted Web Applications for Everyone CCS-2014 - Scottsdale,USA
Ask us before you download: Lessons from Analyzing 3 Million Android Apps CANS-2014 - crete,greece
Code-Pointer Integrity OSDI-2014 - broomfield,usa
Apple without a shell - iOS under targeted attack VirusBulletin-2014 - seattle,usa
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers usenix-2014 - san diego,usa
Clickjacking Revisited: A Perceptual View of UI Security Woot-2014 - san diego,usa
Keynote: Ask us before you download: Lessons from Analyzing 3 Million Android Apps MOST-2014 - Sam Framcisco,USA
Next-generation Security Solutions for Emerging Threats ASIACCS-2013 - Hangzhou,China Security
Privacy-Preserving Stream Aggregation with Fault Tolerance Financial Cryptography and Data Security-2013 - Bonaire,Netherlands
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces USENIX-2012 - Washington, D.C.
Privilege Separation in HTML5 Applications USENIX-2012 - Washington, D.C.
Context-Sensitive Auto-Sanitization in Web Templating Languages Using Type Qualifiers Confrence-on-computer-communications-security-2011 - Chicago, USA
Android Permissions Demystified Confrence-on-computer-communications-security-2011 - Chicago, USA
Insights From The Inside: A View Of Botnet Management From Infiltration 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2010 - San Jose, USA Security
Cross-Origin Javascript Capability Leaks: Detection, Exploitation, And Defense 18th USENIX Security Symposium-2009 - Montreal, Canada Security
Towards Automatic Discovery Of Deviations In Binary Implementations With Applications To Error Detection And Fingerprint Generation 16th USENIX Security Symposium-2007 - Boston, USA Security
Toward Attack-Agnostic Defenses 1st USENIX Workshop on Hot Topics in Security-2006 - Vancouver, Canada Security
Privtrans: Automatically Partitioning Programs For Privilege Separation 13th USENIX Security Symposium-2004 - San Diego, USA Security
On Gray-Box Program Tracking For Anomaly Detection 13th USENIX Security Symposium-2004 - San Diego, USA Security
Detection 12th USENIX Security Symposium-2003 - Washington DC, USA Security
Timing Analysis Of Keystrokes And Timing Attacks On Ssh 10th USENIX Security Symposium-2001 - Washington DC, USA Security Analysis