Dawn Song

Results: 140



#Item
91Tree automaton / Malware / Tree / Directed acyclic graph / Graph coloring / Graph theory / Automata theory / Theoretical computer science

Malware Analysis with Tree Automata Inference ⋆ Domagoj Babi´c, Daniel Reynaud, and Dawn Song University of California, Berkeley {babic, reynaud, dawnsong}@cs.berkeley.edu Abstract. The underground malware-based econ

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
92Computer programming / Pointer / Dangling pointer / Stack buffer overflow / Memory safety / Address space layout randomization / Buffer overflow / C / Memory corruption / Computing / Software engineering / Software bugs

SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:27
93Dataflow / Symbolic execution / Algorithm / Information flow / Dependence analysis / Pointer / Information / Taint checking / Computing / Software engineering / Parallel computing

DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation Min Gyung Kang∗† Stephen McCamant† Pongsin Poosankam∗† Dawn Song† † UC Berkeley ∗ Carnegie Mellon University {mgkang,ppoosank}@cmu.edu

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
94Predicate transformer semantics / Program logic / KeY / IP / Function / Algorithm / NP / Symbolic execution / Communications protocol / Theoretical computer science / Mathematics / Applied mathematics

Replayer: Automatic Protocol Replay by Binary Analysis James Newsome, David Brumley, Jason Franklin, Dawn Song∗ Carnegie Mellon University Pittsburgh, PA, USA {jnewsome,

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
95Object-oriented programming / Virtual method table / Data types / Software bugs / Select / Pointer / Buffer overflow protection / Dynamic-link library / Fortran / Computing / Software engineering / Computer programming

VTint: Protecting Virtual Function Tables’ Integrity Chao Zhang∗ , Chengyu Song‡ , Kevin Zhijie Chen∗ , Zhaofeng Chen† , Dawn Song∗ ∗ University of California, Berkeley {chaoz, kevinchn, dawnsong}@cs.berkel

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2015-02-07 13:00:50
96Information / Internet standards / Data transmission / Petroleum production / Separator / Communications protocol / Transmission Control Protocol / Password authentication protocol / Pointer / Computing / Data / Internet protocols

Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis ∗ Juan Caballero∗ , Heng Yin†∗ , Zhenkai Liang∗ , Dawn Song‡∗ Carnegie Mellon University † College of William and Ma

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
97Database trigger / Trigger / Computer virus / Pointer / Computing / Software engineering / Computer programming / Abstract interpretation / Symbolic execution / Malware

1 Automatically Identifying Trigger-based Behavior in Malware David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Song, Heng Yin Carnegie Mellon University

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
98Symbolic execution / Software engineering / Programming language implementation / Malware / Algorithm / Assembly language / KeY / Computer program / Software bug / Computing / Formal methods / Abstract interpretation

BitScope: Automatically Dissecting Malicious Binaries David Brumley, Cody Hartwig, Min Gyung Kang, Zhenkai Liang James Newsome, Pongsin Poosankam, Dawn Song, Heng Yin March 18, 2007 Last Modified: May 23, 2007 CMU-CS-07-

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
99Remote desktop / Trusted computing / Trusted Platform Module / X Window System / Trusted Execution Technology / Google Chrome OS / Thin client / Desktop virtualization / Hyper-V / Software / System software / Computing

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Lorenzo Martignoni,∗ Pongsin Poosankam,∗† Matei Zaharia,∗ Jun Han,† Stephen McCamant,∗ Dawn Song,∗ Vern Paxson,∗ Adrian Perri

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2014-02-02 20:47:34
UPDATE