@InProceedings{MMPSM2012,
author = {Lorenzo Martignoni and Stephen McCamant and Pongsin Poosankam
and Dawn Song and Petros Maniatis},
title = {Path-Exploration Lifting: Hi-Fi Tests for Lo-Fi Emulators},
booktitle = {Proceedings of the 17th International Conference on
Architectural Support for Programming Languages and
Operating Systems (ASPLOS)},
address = {London, UK},
year = 2012,
month = mar,
}
@InProceedings{CBPCWS2011,
author = {Chia Yuan Cho and Domagoj Babi\'c and Pongsin Poosankam and Kevin
Zhijie Chen and Edward XueJun Wu and Dawn Song},
title = {{MACE}: Model-inference-Assisted Concolic Exploration for
Protocol and Vulnerability Discovery},
booktitle = {Proceedings of the 20th USENIX Security Symposium},
address = {San Francisco, CA},
year = 2011,
month = aug,
}
@InProceedings{HRMPFS2011,
author = {Steve Hanna and Rolf Rolles and Andr\'es Molina-Markham and Pongsin Poosankam and Kevin Fu and Dawn Song},
title = {Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices},
booktitle = {Proceedings of the 2nd USENIX Workshop on Health Security and Privacy (HealthSec)},
address = {San Francisco, CA},
year = 2011,
month = aug,
}
@InProceedings{BRS2011,
author = {Domagoj Babi\'c and Daniel Reynaud and Dawn Song},
title = {Malware Analysis with Tree Automata Inference},
booktitle = {Proceedings of the 23rd Int. Conference on Computer Aided Verification (CAV)},
address = {Snowbird, UT},
year = 2011,
month = jul,
}
@InProceedings{BMMS2011,
author = {Domagoj Babi\'c and Lorenzo Martignoni and Stephen McCamant and Dawn Song},
title = {Statically-Directed Dynamic Automated Test Generation},
booktitle = {Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)},
address = {Toronto, ON, Canada},
year = 2011,
month = jul,
}
@Inproceedings{JCCMPRS2011,
author = {Noah M. Johnson and Juan Caballero and Kevin Zhijie Chen and
Stephen McCamant and Pongsin Poosankam and Daniel Reynaud and Dawn Song},
title = {Differential Slicing: Identifying Causal Execution Differences for Security Applications},
booktitle = {Proceedings of the 32nd IEEE Symposium on Security and Privacy},
address = {Oakland, CA},
month = {May},
year = 2011,
}
@Inproceedings{KMPS2011,
author = {Min Gyung Kang and Stephen McCamant and Pongsin Poosankam and Dawn Song},
title = {{DTA}++: Dynamic Taint Analysis with Targeted Control-Flow Propagation},
booktitle = {Proceedings of the 18th Annual Network and Distributed System Security Symposium},
address = {San Diego, CA},
year = 2011,
month = feb,
}
@Inproceedings{CBSS10,
author = {Chia Yuan Cho and Domagoj Babi\'c and Richard Shin and Dawn Song},
title = {Inference and Analysis of Formal Models of Botnet Command and Control Protocols},
booktitle = {Proceedings of the 17th ACM Conference on Computer and Communication Security},
address = {Chicago, IL},
month = {October},
year = {2010},
}
@Inproceedings{CPMBS10,
author = {Juan Caballero and Pongsin Poosankam and Stephen McCamant and Domagoj Babic and Dawn Song},
title = {Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware},
booktitle = {Proceedings of the 17th ACM Conference on Computer and Communication Security},
address = {Chicago, IL},
month = {October},
year = {2010},
}
@Inproceedings{YPHS2010,
author = {Heng Yin and Pongsin Poosankam and Steve Hanna and Dawn Song},
title = {HookScout: Proactive Binary-Centric Hook Detection},
booktitle = {Proceedings of the 7th Conference on Detection of Intrusions and Malware & Vulnerability Assessment},
address = {Bonn, Germany},
month = {July},
year = {2010},
}
@Inproceedings{CCGPS10,
author = {Chia Yuan Cho and Juan Caballero and Chris Grier and Vern Paxson and Dawn Song},
title = {Insights from the Inside: A View of Botnet Management from Infiltration },
booktitle = {Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats},
address = {San Jose, CA},
month = {April},
year = {2010},
}
@InProceedings{CJMS2010,
author = {Juan Caballero and Noah M. Johnson and Stephen McCamant and Dawn Song},
title = {Binary Code Extraction and Interface Identification for Security Applications},
booktitle = {Proceedings of the 17th Annual Network and Distributed System Security Symposium},
address = {San Diego, CA},
year = 2010,
month = feb,
}
@InProceedings{CPKS2009,
author = {Juan Caballero and Pongsin Poosankam and Christian Kreibich and Dawn Song},
title = {Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering},
booktitle = {Proceedings of the 16th ACM Conference on Computer and Communication Security},
address = {Chicago, IL},
year = 2009,
month = nov,
}
@InProceedings{KYHMS2009,
author = {Min Gyung Kang and Heng Yin and Steve Hanna and Steve McCamant and Dawn Song},
title = {Emulating Emulation-Resistant Malware},
booktitle = {Proceedings of the 2nd Workshop on Virtual Machine Security},
address = {Chicago, IL},
year = 2009,
month = nov,
}
@InProceedings{SPMS2009,
author = {Prateek Saxena and Pongsin Poosankam and Stephen McCamant and Dawn Song},
title = {Loop-Extended Symbolic Execution on Binary Programs},
booktitle = {Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)},
address = {Chicago, IL},
year = 2009,
month = jul,
}
@InProceedings{NMS2009,
author = {James Newsome and Stephen McCamant and Dawn Song},
title = {Measuring Channel Capacity to Distinguish Undue Influence},
booktitle = {Proceedings of the Fourth ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS)},
address = {Dublin, Ireland},
year = 2009,
month = jun,
}
@InProceedings{BCS09,
author = {Adam Barth and Juan Caballero and Dawn Song},
title = {Secure Content Sniffing for Web Browsers {\em or} How to Stop Papers from Reviewing Themselves},
booktitle = {Proceedings of the 30th IEEE Symposium on Security & Privacy},
address = {Oakland, CA},
year = 2009,
month = may,
}
@InProceedings{GRS08,
author = {Debin Gao and Michael K. Reiter and Dawn Song},
title = {{BinHunt}: Automatically Finding Semantic Differences in Binary Programs},
booktitle = {Proceedings of the 4th International Conference on Information Systems Security},
address = {Hyderabad, India},
year = 2008,
month = dec,
}
@InProceedings{SBYCJKLNPS2008,
author = {Dawn Song and David Brumley and Heng Yin and Juan Caballero and
Ivan Jager and Min Gyung Kang and Zhenkai Liang and James Newsome and
Pongsin Poosankam and Prateek Saxena},
title = {{BitBlaze}: A New Approach to Computer Security via Binary Analysis},
booktitle = {Proceedings of the 4th International Conference on Information Systems Security. Keynote invited paper.},
address = {Hyderabad, India},
year = 2008,
month = dec,
}
@InProceedings{BPSZ2008,
author = {David Brumley and Pongsin Poosankam and Dawn Song and Jiang Zheng},
title = {Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications},
booktitle = {Proceedings of the 29th IEEE Symposium on Security & Privacy},
address = {Oakland, CA},
year = 2008,
month = may,
}
@InProceedings{YLS2008,
author = {Heng Yin and Zhenkai Liang and Dawn Song},
title = {{HookFinder}: Identifying and Understanding Malware Hooking Behaviors},
booktitle = {Proceedings of 15th Annual Network and Distributed System Security Symposium},
year = 2008,
month = feb
}
@InProceedings{CYLS2007,
author = {Juan Caballero and Heng Yin and Zhenkai Liang and Dawn Song},
title = {{Polyglot}: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis},
booktitle = {Proceedings of ACM Conference on Computer and Communication
Security},
year = 2007,
month = oct
}
@InProceedings{YSEKK2007,
author = {Heng Yin and Dawn Song and Manuel Egele and Christopher Kruegel
and Engin Kirda},
title = {{Panorama}: Capturing System-wide Information Flow for Malware
Detection and Analysis},
booktitle = {Proceedings of ACM Conference on Computer and Communication
Security},
year = 2007,
month = oct
}
@InProceedings{KPY2007,
author = {Min Gyung Kang and Pongsin Poosankam and Heng Yin},
title = {{Renovo}: A Hidden Code Extractor for Packed Executables},
booktitle = {Proceedings of the 5th ACM Workshop on Recurring Malcode (WORM)},
year = 2007,
month = oct
}
@InProceedings{BCLNS2007,
author = {David Brumley and Juan Caballero and Zhenkai Liang and James Newsome and Dawn Song},
title = {Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation},
booktitle = {Proceedings of USENIX Security Symposium},
year = 2007,
month = aug
}
@InProceedings{BWJS2007,
author = {David Brumley and Hao Wang and Somesh Jha and Dawn Song},
title = {Creating Vulnerability Signatures Using Weakest Pre-conditions},
booktitle = {Proceedings of Computer Security Foundations Symposium},
year = 2007,
month = jul
}
@InProceedings{EKKYS2007,
author = {Manuel Egele and Christopher Kruegel and Engin Kirda and Heng Yin and Dawn Song},
title = {Dynamic Spyware Analysis},
booktitle = {Proceedings of USENIX Annual Technical Conference},
year = 2007,
month = jun
}
@InProceedings{TNLHXBZS2007,
author = {Joseph Tucek and James Newsome and Shan Lu and Chengdu Huang and Spiros Xanthos and David Brumley and Yuanyuan Zhou and Dawn Song},
title = {{Sweeper}: a Lightweight End-to-End System for Defending against Fast Worms},
booktitle = {Proceedings of European Conference on Computer Systems(EuroSys)},
year = 2007,
month = mar
}
@InProceedings{NBFS2006,
author = {James Newsome and David Brumley and Jason Franklin and Dawn Song},
title = {{Replayer}: Automatic Protocol Replay by Binary Analysis},
booktitle = {Proceedings of the 13th ACM Conference on Computer and Communications Security},
year = 2006,
month = oct
}
@InProceedings{BNSWJ2006,
author = {David Brumley and James Newsome and Dawn Song and Hao Wang and Somesh Jha},
title = {Towards Automatic Generation of Vulnerability Signatures},
booktitle = {Proceedings of the IEEE Symposium on Security and Privacy},
year = 2006,
month = may
}
@InProceedings{NS2005,
author = {James Newsome and Dawn Song},
title = {Dynamic Taint Analysis: Automatic Detection, Analysis, and Signature Generation of Exploit Attacks on Commodity Software},
booktitle = {Proceedings of the Network and Distributed Systems Security Symposium},
year = 2005,
month = feb
}
@InProceedings{BHLNPSY2007,
author = {David Brumley and Cody Hartwig and Zhenkai Liang and James Newsome and Pongsin Poosankam and Dawn Song and Heng Yin},
title = {Automatically Identifying Trigger-based Behavior in Malware},
booktitle = {Book chapter in "Botnet Analysis and Defense", Editors Wenke Lee et. al.},
year = 2007
}
@InProceedings{BNS2007,
author = {David Brumley and James Newsome and Dawn Song},
title = {{Sting}: an End-to-End Self-healing System for Defending against Internet Worms},
booktitle = {Book chapter in "Malware Detection and Defense", Editors Christodorescu, Jha, Maughn, Song},
year = 2007
}
@Techreport{UCB-EECS-2009-47,
author = {James Newsome and Stephen McCamant and Dawn Song},
title = {Measuring Channel Capacity to Distinguish Undue Influence},
institution = {EECS Department, University of California, Berkeley},
number = {UCB/EECS-2009-47},
year = 2009,
month = apr,
}
@Techreport{UCB-EECS-2009-36,
author = {Juan Caballero and Stephen McCamant and Adam Barth and Dawn Song},
title = {Extracting Models of Security-Sensitive Operations using String-Enhanced White-Box Exploration on Binaries},
institution = {EECS Department, University of California, Berkeley},
number = {UCB/EECS-2009-36},
year = 2009,
month = mar,
}