@InProceedings{caselden13esorics,
  author = {Dan Caselden and Alex Bazhanyuk and Mathias Payer and
            Stephen McCamant and Dawn Song},
  title = {HI-CFG: Construction by Binary Analysis, and Application to
           Attack Polymorphism},
  booktitle = {ESORICS'13: European Symposium on Research in
               Computer Security},
  address = {London, UK},
  year = 2013,
  month = sep,
}

@InProceedings{szekeres13oakland,
  author = {Laszlo Szekeres and Mathias Payer and Tao Wei and Dawn Song},
  title = {SoK: Eternel war in memory},
  booktitle = {Proc. Int'l Symp. on Security and Privacy, 2013},
  address = {San Francisco, USA},
  year = 2013,
  month = may,
}

@InProceedings{MMPSM2012,
  author = {Lorenzo Martignoni and Stephen McCamant and Pongsin Poosankam
            and Dawn Song and Petros Maniatis},
  title = {Path-Exploration Lifting: Hi-Fi Tests for Lo-Fi Emulators},
  booktitle = {Proceedings of the 17th International Conference on
               Architectural Support for Programming Languages and
               Operating Systems (ASPLOS)},
  address = {London, UK},
  year = 2012,
  month = mar,
}

@InProceedings{CBPCWS2011,
  author = {Chia Yuan Cho and Domagoj Babi\'c and Pongsin Poosankam and Kevin
    Zhijie Chen and Edward XueJun Wu and Dawn Song},
  title = {{MACE}: Model-inference-Assisted Concolic Exploration for
    Protocol and Vulnerability Discovery},
  booktitle = {Proceedings of the 20th USENIX Security Symposium}, 
  address = {San Francisco, CA},
  year = 2011,
  month = aug,
}

@InProceedings{HRMPFS2011,
  author = {Steve Hanna and Rolf Rolles and Andr\'es Molina-Markham and Pongsin Poosankam and Kevin Fu and Dawn Song},
  title = {Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices},
  booktitle = {Proceedings of the 2nd USENIX Workshop on Health Security and Privacy (HealthSec)},
  address = {San Francisco, CA},
  year = 2011,
  month = aug,
}

@InProceedings{BRS2011,
  author = {Domagoj Babi\'c and Daniel Reynaud and Dawn Song},
  title = {Malware Analysis with Tree Automata Inference},
  booktitle = {Proceedings of the 23rd Int. Conference on Computer Aided Verification (CAV)},
  address = {Snowbird, UT},
  year = 2011,
  month = jul,
}

@InProceedings{BMMS2011,
  author = {Domagoj Babi\'c and Lorenzo Martignoni and Stephen McCamant and Dawn Song},
  title = {Statically-Directed Dynamic Automated Test Generation},
  booktitle = {Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)},
  address = {Toronto, ON, Canada},
  year = 2011,
  month = jul,
}

@Inproceedings{JCCMPRS2011,
  author = {Noah M. Johnson and Juan Caballero and Kevin Zhijie Chen and 
    Stephen McCamant and Pongsin Poosankam and Daniel Reynaud and Dawn Song},
  title = {Differential Slicing: Identifying Causal Execution Differences for Security Applications},
  booktitle = {Proceedings of the 32nd IEEE Symposium on Security and Privacy},
  address = {Oakland, CA},
  month = {May},
  year = 2011,
}

@Inproceedings{KMPS2011,
  author = {Min Gyung Kang and Stephen McCamant and Pongsin Poosankam and Dawn Song},
  title = {{DTA}++: Dynamic Taint Analysis with Targeted Control-Flow Propagation},
  booktitle = {Proceedings of the 18th Annual Network and Distributed System Security Symposium},
  address = {San Diego, CA},
  year = 2011,
  month = feb,
}

@Inproceedings{CBSS10,
  author = {Chia Yuan Cho and Domagoj Babi\'c and Richard Shin and Dawn Song},
  title = {Inference and Analysis of Formal Models of Botnet Command and Control Protocols},
  booktitle = {Proceedings of the 17th ACM Conference on Computer and Communication Security},
  address = {Chicago, IL},
  month = {October},
  year = {2010},
}

@Inproceedings{CPMBS10,
  author = {Juan Caballero and Pongsin Poosankam and Stephen McCamant and Domagoj Babic and Dawn Song},
  title = {Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware},
  booktitle = {Proceedings of the 17th ACM Conference on Computer and Communication Security},
  address = {Chicago, IL},
  month = {October},
  year = {2010},
}

@Inproceedings{YPHS2010,
  author = {Heng Yin and Pongsin Poosankam and Steve Hanna and Dawn Song},
  title = {HookScout: Proactive Binary-Centric Hook Detection},
  booktitle = {Proceedings of the 7th Conference on Detection of Intrusions and Malware & Vulnerability Assessment},
  address = {Bonn, Germany},
  month = {July},
  year = {2010},
}

@Inproceedings{CCGPS10,
  author = {Chia Yuan Cho and Juan Caballero and Chris Grier and Vern Paxson and Dawn Song},
  title = {Insights from the Inside: A View of Botnet Management from Infiltration },
  booktitle = {Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats},
  address = {San Jose, CA},
  month = {April},
  year = {2010},
}

@InProceedings{CJMS2010,
  author = {Juan Caballero and Noah M. Johnson and Stephen McCamant and Dawn Song},
  title = {Binary Code Extraction and Interface Identification for Security Applications},
  booktitle = {Proceedings of the 17th Annual Network and Distributed System Security Symposium},
  address = {San Diego, CA},
  year = 2010,
  month = feb,
}

@InProceedings{CPKS2009,
  author = {Juan Caballero and Pongsin Poosankam and Christian Kreibich and Dawn Song},
  title = {Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering},
  booktitle = {Proceedings of the 16th ACM Conference on Computer and Communication Security},
  address = {Chicago, IL},
  year = 2009,
  month = nov,
}

@InProceedings{KYHMS2009,
  author = {Min Gyung Kang and Heng Yin and Steve Hanna and Steve McCamant and Dawn Song},
  title = {Emulating Emulation-Resistant Malware},
  booktitle = {Proceedings of the 2nd Workshop on Virtual Machine Security},
  address = {Chicago, IL},
  year = 2009,
  month = nov,
}

@InProceedings{SPMS2009,
  author = {Prateek Saxena and Pongsin Poosankam and Stephen McCamant and Dawn Song},
  title = {Loop-Extended Symbolic Execution on Binary Programs},
  booktitle = {Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)},
  address = {Chicago, IL},
  year = 2009,
  month = jul,
}

@InProceedings{NMS2009,
  author = {James Newsome and Stephen McCamant and Dawn Song},
  title = {Measuring Channel Capacity to Distinguish Undue Influence},
  booktitle = {Proceedings of the Fourth ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS)},
  address = {Dublin, Ireland},
  year = 2009,
  month = jun,
}

@InProceedings{BCS09,
  author = {Adam Barth and Juan Caballero and Dawn Song},
  title = {Secure Content Sniffing for Web Browsers {\em or} How to Stop Papers from Reviewing Themselves},
  booktitle = {Proceedings of the 30th IEEE Symposium on Security & Privacy},
  address = {Oakland, CA},
  year = 2009,
  month = may,
}

@InProceedings{GRS08,
  author = {Debin Gao and Michael K. Reiter and Dawn Song},
  title = {{BinHunt}: Automatically Finding Semantic Differences in Binary Programs},
  booktitle = {Proceedings of the 4th International Conference on Information Systems Security},
  address = {Hyderabad, India},
  year = 2008,
  month = dec,
}

@InProceedings{SBYCJKLNPS2008,
  author = {Dawn Song and David Brumley and Heng Yin and Juan Caballero and
    Ivan Jager and Min Gyung Kang and Zhenkai Liang and James Newsome and
    Pongsin Poosankam and Prateek Saxena},
  title = {{BitBlaze}: A New Approach to Computer Security via Binary Analysis},
  booktitle = {Proceedings of the 4th International Conference on Information Systems Security. Keynote invited paper.},
  address = {Hyderabad, India},
  year = 2008,
  month = dec,
}

@InProceedings{BPSZ2008,
  author = {David Brumley and Pongsin Poosankam and Dawn Song and Jiang Zheng},
  title = {Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications},
  booktitle = {Proceedings of the 29th IEEE Symposium on Security & Privacy},
  address = {Oakland, CA},
  year = 2008,
  month = may,
}

@InProceedings{YLS2008,
  author    = {Heng Yin and Zhenkai Liang and Dawn Song},
  title     = {{HookFinder}: Identifying and Understanding Malware Hooking Behaviors},
  booktitle = {Proceedings of 15th Annual Network and Distributed System Security Symposium},
  year      = 2008,
  month     = feb
}

@InProceedings{CYLS2007,
  author    = {Juan Caballero and Heng Yin and Zhenkai Liang and Dawn Song},
  title     = {{Polyglot}: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis},
  booktitle = {Proceedings of ACM Conference on Computer and Communication
	Security},
  year      = 2007,
  month     = oct
}

@InProceedings{YSEKK2007,
  author    = {Heng Yin and Dawn Song and Manuel Egele and Christopher Kruegel
	and Engin Kirda},
  title     = {{Panorama}: Capturing System-wide Information Flow for Malware
	Detection and Analysis},
  booktitle = {Proceedings of ACM Conference on Computer and Communication
	Security},
  year      = 2007,
  month     = oct
}

@InProceedings{KPY2007,
  author    = {Min Gyung Kang and Pongsin Poosankam and Heng Yin},
  title     = {{Renovo}: A Hidden Code Extractor for Packed Executables},
  booktitle = {Proceedings of the 5th ACM Workshop on Recurring Malcode (WORM)},
  year      = 2007,
  month     = oct
}

@InProceedings{BCLNS2007,
  author    = {David Brumley and Juan Caballero and Zhenkai Liang and James Newsome and Dawn Song},
  title     = {Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation},
  booktitle = {Proceedings of USENIX Security Symposium},
  year      = 2007,
  month     = aug
}

@InProceedings{BWJS2007,
  author    = {David Brumley and Hao Wang and Somesh Jha and Dawn Song},
  title     = {Creating Vulnerability Signatures Using Weakest Pre-conditions},
  booktitle = {Proceedings of Computer Security Foundations Symposium},
  year      = 2007,
  month     = jul
}

@InProceedings{EKKYS2007,
  author    = {Manuel Egele and Christopher Kruegel and Engin Kirda and Heng Yin and Dawn Song},
  title     = {Dynamic Spyware Analysis},
  booktitle = {Proceedings of USENIX Annual Technical Conference},
  year      = 2007,
  month     = jun
}

@InProceedings{TNLHXBZS2007,
  author    = {Joseph Tucek and James Newsome and Shan Lu and Chengdu Huang and Spiros Xanthos and David Brumley and Yuanyuan Zhou and Dawn Song},
  title     = {{Sweeper}: a Lightweight End-to-End System for Defending against Fast Worms},
  booktitle = {Proceedings of European Conference on Computer Systems(EuroSys)},
  year      = 2007,
  month     = mar
}

@InProceedings{NBFS2006,
  author    = {James Newsome and David Brumley and Jason Franklin and Dawn Song},
  title     = {{Replayer}: Automatic Protocol Replay by Binary Analysis},
  booktitle = {Proceedings of the 13th ACM Conference on Computer and Communications Security},
  year      = 2006,
  month     = oct
}

@InProceedings{BNSWJ2006,
  author    = {David Brumley and James Newsome and Dawn Song and Hao Wang and Somesh Jha},
  title     = {Towards Automatic Generation of Vulnerability Signatures},
  booktitle = {Proceedings of the IEEE Symposium on Security and Privacy},
  year      = 2006,
  month     = may
}

@InProceedings{NS2005,
  author    = {James Newsome and Dawn Song},
  title     = {Dynamic Taint Analysis: Automatic Detection, Analysis, and Signature Generation of Exploit Attacks on Commodity Software},
  booktitle = {Proceedings of the Network and Distributed Systems Security Symposium},
  year      = 2005,
  month     = feb
}

@InProceedings{BHLNPSY2007,
  author    = {David Brumley and Cody Hartwig and Zhenkai Liang and James Newsome and Pongsin Poosankam and Dawn Song and Heng Yin},
  title     = {Automatically Identifying Trigger-based Behavior in Malware},
  booktitle = {Book chapter in "Botnet Analysis and Defense", Editors Wenke Lee et. al.},
  year      = 2007
}

@InProceedings{BNS2007,
  author    = {David Brumley and James Newsome and Dawn Song},
  title     = {{Sting}: an End-to-End Self-healing System for Defending against Internet Worms},
  booktitle = {Book chapter in "Malware Detection and Defense", Editors Christodorescu, Jha, Maughn, Song},
  year      = 2007
}

@Techreport{UCB-EECS-2009-47,
  author = {James Newsome and Stephen McCamant and Dawn Song},
  title = {Measuring Channel Capacity to Distinguish Undue Influence},
  institution = {EECS Department, University of California, Berkeley},
  number = {UCB/EECS-2009-47},
  year = 2009,
  month = apr,
}

@Techreport{UCB-EECS-2009-36,
  author = {Juan Caballero and Stephen McCamant and Adam Barth and Dawn Song},
  title = {Extracting Models of Security-Sensitive Operations using String-Enhanced White-Box Exploration on Binaries},
  institution = {EECS Department, University of California, Berkeley},
  number = {UCB/EECS-2009-36},
  year = 2009,
  month = mar,
}

@Techreport{UCB-EECS-2009-34,
  author = {Prateek Saxena and Pongsin Poosankam and Stephen McCamant and Dawn Song},
  title = {Loop-Extended Symbolic Execution on Binary Programs},
  institution = {EECS Department, University of California, Berkeley},
  number = {UCB/EECS-2009-34},
  year = 2009,
  month = mar,
}

@Techreport{BHKLNPS2007,
  author    = {David Brumley and Cody Hartwig and Min Gyung Kang and Zhenkai Liang and James Newsome and Pongsin Poosankam and Dawn Song},
  title     = {{BitScope}: Automatically Dissecting Malicious Binaries},
  institution = {School of Computer Science, Carnegie Mellon University},
  number = {CS-07-133},
  year      = 2007,
  month     = mar,
}

@Techreport{NBS2006,
  author    = {James Newsome and David Brumley and Dawn Song},
  title     = {{Sting}: an End-to-End Self-healing System for Defending against Zero-day Worm Attacks on Commodity Software},
  institution = {School of Computer Science, Carnegie Mellon University},
  number    = {CMU-CS-05-191},
  year      = 2006,
  month     = jun,
}