-
Notifications
You must be signed in to change notification settings - Fork 0
/
past.html
125 lines (99 loc) · 5.48 KB
/
past.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
<html lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"></head><body>
<body style="background-color: rgb(255, 255, 255);margin-top:10;margin-left:30;margin-right:30;">
<h2>Past Projects </h2>
<h3 class="label"><a name="overview"><span style="color: rgb(255, 0, 0);">Source Transformation for Software and Systems Security</span></a></h3>
<ul>
<li>
<dt><a href="https://dawnsong.io/papers/integer.pdf">Efficient and Accurate Detection of Integer-based Attacks. </a> </dt><dd> David Brumley, Tzi-cker Chiueh, Rob Johnson, Huijia Lin, and Dawn Song. In Proceedings of NDSS, Feb 2007.<p>
</p></dd></li>
<li>
<dt><a href="https://dawnsong.io/papers/privtrans.pdf">Privtrans: Automatic Privilege Separation</a>
</dt><dd> David Brumley and Dawn Song. <a href="https://dawnsong.io/past.html"> In USENIX Security Symposium 2004</a>.
<p>
</p></dd></li>
</ul>
<h3 class="label"><a name="overview"><span style="color: rgb(255, 0, 0);">Networking Security</span></a></h3>
<ul>
<li><b>Streaming Algorithm Design</b><br>
<dt><a href="https://dawnsong.io/papers/superspreader.pdf">New Streaming Algorithms for Superspreader Detection</a>
</dt><dd> Shobha Venkataraman, Dawn Song, Phil Gibbons, and Avrim Blum. <a href="https://dawnsong.io/past.html">In Network and Distributed Systems Security Symposium, Feb 2005</a>. <p>
</p></dd></li>
<li><b>Distributed Denial of Service (DDoS) Defense</b><br>
<dt><a href="https://dawnsong.io/papers/fit.pdf">FIT: Fast Internet Traceback</a>
</dt><dd>Abraham Yaar, Adrian Perrig, and Dawn Song. <a href="https://dawnsong.io/past.html">In IEEE InfoCom, March 2005</a>.<p>
</p></dd><dt><a href="https://dawnsong.io/papers/siff.pdf">SIFF: An Endhost Capability Mechanism to Mitigate DDoS Flooding Attacks</a>
</dt><dd> Abraham Yaar, Adrian Perrig, and Dawn Song.
<a href="https://dawnsong.io/past.html">In IEEE Symposium on Security and Privacy 2004, May 2004</a>.
<p>
</p></dd><dt> <a href="https://dawnsong.io/papers/pi.pdf">
Pi: A Path Identification Mechanism to Defend against DDoS Attacks.
</a>
</dt><dd> Avi Yaar, Adrian Perrig, and Dawn Song.
<a href="https://dawnsong.io/past.html"> In IEEE Symposium on Security and Privacy 2003</a>.
<p>
</p></dd><dt><a href="https://dawnsong.io/papers/iptrace.pdf">
Advanced and Authenticated Marking Schemes for IP Traceback
</a></dt><dd> D. Song and A. Perrig.
In <a href="http://www.ieee-infocom.org/2001/">IEEE Infocomm 2001</a>.
<p>
</p></dd></li>
</ul>
<h3 class="label"><a name="overview"><span style="color: rgb(255, 0, 0);">Host-based Intrusion Detection</span></a></h3>
<ul>
<li>
<dt><a href="https://dawnsong.io/papers/hmm-raid06.pdf">Behavioral Distance Measurement Using Hidden Markov Models.</a></dt><dd>
Debin Gao, Michael K. Reiter and Dawn Song
In Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006), Hamburg, Germany, September 2006.<p>
</p></dd></li>
<li>
<dt><a href="https://dawnsong.io/papers/distance.pdf">
Behavioral Distance for Intrusion Detection</a></dt><dd>
Debin Gao, Mike Reiter and Dawn Song. <a href="https://dawnsong.io/past.html">Symposium on Recent Advance in Intrusion Detection (RAID), Sep 2005</a>. <p>
</p></dd></li>
<li>
<dt> <a href="https://dawnsong.io/papers/ccs04.pdf">Gray-box Extraction of Execution Graphs for Anomaly Detection</a> </dt><dd>Debin Gao, Mike Reiter, and Dawn Song. <a href="https://dawnsong.io/past.html">In ACM Computer and Communication Security (CCS) 2004 </a>. <p>
</p></dd></li>
<li>
<dt><a href="https://dawnsong.io/papers/graybox.pdf">Graybox Program Tracking for Hostbased Intrusion Detection</a>
</dt><dd> Debin Gao, Mike Reiter, and Dawn Song. <a href="https://dawnsong.io/past.html"> In USENIX Security Symposium 2004</a>.
<p>
</p></dd></li>
</ul>
<h3 class="label"><a name="overview"><span style="color: rgb(255, 0, 0);">Secure Sensor Networks</span></a></h3>
<ul>
<li>
<dt><a href="https://dawnsong.io/papers/sia-hierachical.pdf"> Secure Hierarchical In-Network Aggregation in Sensor Networks.</a></dt><dd> Haowen Chan, Adrian Perrig, and Dawn Song. ACM CCS, November 2006. <p>
</p></dd></li>
<li>
<dt><a href="https://dawnsong.io/papers/sybil.pdf">
The Sybil attack in sensor networks: analysis & defenses. </a>
</dt><dd> James Newsome, Runting Shi, Dawn Song, and Adrian Perrig.
In 3rd International Symposium on Information Processing in Sensor Networks (IPSN 2004), April 2004
<p>
</p></dd></li>
<li>
<dt> <a href="https://dawnsong.io/papers/gem.pdf">
GEM: Graph Embedding for Routing and Data-Centric Storage in
Sensor Networks without Geographic Information.
</a>
</dt><dd> James Newsome and Dawn Song.
<a href="https://dawnsong.io/past.html"> In ACM SenSys (Conference on Embedded Networked Sensor Systems), November 2003</a>.
<p>
</p></dd></li>
<li>
<dt> <a href="https://dawnsong.io/papers/sia.pdf">
SIA: Secure Information Aggregation in
Sensor Networks.
</a>
</dt><dd> Bartosz Przydatek, Dawn Song, and Adrian Perrig.
<a href="https://dawnsong.io/past.html"> In ACM SenSys (Conference on Embedded Networked Sensor Systems), November 2003</a>.
<p>
</p></dd></li>
<li>
<dt><a href="https://dawnsong.io/papers/key-dist.pdf"> Random Key Predistribution Schemes for Sensor Networks</a>
</dt><dd> Haowen Chan, Adrian Perrig, and Dawn Song.
<a href="https://dawnsong.io/past.html"> In IEEE Symposium on Security and Privacy 2003</a>.
<p>
</p></dd></li>
</ul>
</body></html>