Random key predistribution schemes for sensor networks H Chan, A Perrig, D Song figshare, 2003 | 3935 | 2003 |
Practical techniques for searches on encrypted data DX Song, D Wagner, A Perrig Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 44-55, 2000 | 3176 | 2000 |
Provable data possession at untrusted stores G Ateniese, R Burns, R Curtmola, J Herring, L Kissner, Z Peterson, ... Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 2772 | 2007 |
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. J Newsome, DX Song NDSS 5, 3-4, 2005 | 1902 | 2005 |
The sybil attack in sensor networks: analysis & defenses J Newsome, E Shi, D Song, A Perrig Third international symposium on information processing in sensor networks …, 2004 | 1810 | 2004 |
Android permissions demystified AP Felt, E Chin, S Hanna, D Song, D Wagner Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 1575 | 2011 |
Efficient authentication and signing of multicast streams over lossy channels A Perrig, R Canetti, JD Tygar, D Song Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 56-73, 2000 | 1245 | 2000 |
Advanced and authenticated marking schemes for IP traceback DX Song, A Perrig Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001 | 1222 | 2001 |
Polygraph: Automatically generating signatures for polymorphic worms J Newsome, B Karp, D Song 2005 IEEE Symposium on Security and Privacy (S&P'05), 226-241, 2005 | 1115 | 2005 |
The TESLA broadcast authentication protocol A Perrig, R Canetti, JD Tygar, D Song Rsa Cryptobytes 5 (2), 2-13, 2002 | 1105 | 2002 |
SIA: Secure information aggregation in sensor networks B Przydatek, D Song, A Perrig Proceedings of the 1st international conference on Embedded networked sensor …, 2003 | 1024 | 2003 |
Semantics-aware malware detection M Christodorescu, S Jha, SA Seshia, D Song, RE Bryant 2005 IEEE Symposium on Security and Privacy (S&P'05), 32-46, 2005 | 905 | 2005 |
Panorama: capturing system-wide information flow for malware detection and analysis H Yin, D Song, M Egele, C Kruegel, E Kirda Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 897 | 2007 |
Efficient and secure source authentication for multicast A Perrig, R Canetti, D Song, JD Tygar Network and Distributed System Security Symposium, NDSS 1 (2001), 35-46, 2001 | 892 | 2001 |
BitBlaze: A new approach to computer security via binary analysis D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ... International Conference on Information Systems Security, 1-25, 2008 | 799 | 2008 |
Privacy-preserving set operations L Kissner, D Song Annual International Cryptology Conference, 241-257, 2005 | 715 | 2005 |
On scaling decentralized blockchains K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ... International Conference on Financial Cryptography and Data Security, 106-125, 2016 | 608 | 2016 |
Timing analysis of keystrokes and timing attacks on ssh. DX Song, DA Wagner, X Tian USENIX Security Symposium 2001, 2001 | 585 | 2001 |
Multi-dimensional range query over encrypted data E Shi, J Bethencourt, THH Chan, D Song, A Perrig 2007 IEEE Symposium on Security and Privacy (SP'07), 350-364, 2007 | 581 | 2007 |
Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication M Frank, R Biedert, E Ma, I Martinovic, D Song IEEE transactions on information forensics and security 8 (1), 136-148, 2012 | 561 | 2012 |