Dawn Song

Results: 140



#Item
71Internet privacy / Privacy / Polynomial / Ethics / Multiset / Carnegie Mellon University

Privacy-Preserving Set Operations Lea Kissner Dawn Song

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-08-31 11:28:35
72HTTP / Computer network security / URI schemes / Uniform resource locator / Ajax / Cross-site request forgery / HTTP cookie / Cross-site scripting / DNS rebinding / Computing / Software / Internet

Towards a Formal Foundation of Web Security Devdatta Akhawe∗ , Adam Barth∗ , Peifung E. Lam† , John Mitchell† and Dawn Song∗ ∗ University of California, Berkeley {devdatta,abarth,dawnsong}@cs.berkeley.edu †

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-05-02 17:49:28
73Data / IP traceback / Denial-of-service attack / IP address spoofing / IP fragmentation attacks / Firewall / Transmission Control Protocol / Ping / Communications protocol / Computer network security / Computing / Network architecture

Pi: A Path Identification Mechanism to Defend against DDoS Attacks Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.edu Abstract

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2007-07-15 10:32:33
74Computer network security / Internet / Botnets / Email / Email spam / Storm botnet / Mega-D botnet / McColo / Spam / Computing / Spamming / Multi-agent systems

Insights from the Inside: A View of Botnet Management from Infiltration Chia Yuan Cho§ , Juan Caballero†§ , Chris Grier§ , Vern Paxson‡§ , and Dawn Song§ § UC Berkeley † Carnegie Mellon University ‡ ICSI

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2010-04-19 15:24:05
75Science / Academia / Ron Rivest / Shafi Goldwasser / Computer science / Michael J. Fischer / Dawn Song

An Open Letter from US Researchers in Cryptography and Information Security Media reports since last June have revealed that the US government conducts domestic and international surveillance on a massive sca

Add to Reading List

Source URL: masssurveillance.info

Language: English - Date: 2015-01-18 13:07:57
76Denial-of-service attack / IP traceback / IP address spoofing / Router / Firewall / Transmission Control Protocol / Traffic flow / Ping / Network congestion / Computer network security / Computing / Network architecture

SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks∗ Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.edu

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:10
77Cipher / RSA / Advantage / Ciphertext stealing / Three-pass protocol / Cryptography / Public-key cryptography / Electronic commerce

Multi-Dimensional Range Query over Encrypted Data ∗ Elaine Shi John Bethencourt T-H. Hubert Chan Dawn Song Carnegie Mellon University Abstract We design an encryption scheme called Multi-dimensional

Add to Reading List

Source URL: i.cs.hku.hk

Language: English - Date: 2007-09-09 14:20:24
78Dataflow / Symbolic execution / Algorithm / Information flow / Dependence analysis / Pointer / Information / Taint checking / Computing / Software engineering / Parallel computing

DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation Min Gyung Kang∗† Stephen McCamant† Pongsin Poosankam∗† Dawn Song† † UC Berkeley ∗ Carnegie Mellon University {mgkang,ppoosank}@cmu.edu

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
79Computer security / Malware / Rootkit / Microsoft Security Essentials / Computer virus / Keystroke logging / Antivirus software / System software / Cyberwarfare

Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis Heng Yin∗† Dawn Song‡∗ Manuel Egele, Christopher Kruegel, Engin Kirda§ {pizzaman,chri

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
80Software testing / Predicate transformer semantics / Program logic / Fuzz testing / X Window System / Function / KeY / Errors and residuals in statistics / Network Time Protocol / Statistics / Software / Mathematics

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, and Dawn Song Carnegie Mell

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2009-08-03 23:33:32
UPDATE