Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software. J Newsome, DX Song NDSS 5, 3-4, 2005 | 2458 | 2005 |
The sybil attack in sensor networks: analysis & defenses J Newsome, E Shi, D Song, A Perrig Proceedings of the 3rd international symposium on Information processing in …, 2004 | 2204 | 2004 |
Polygraph: Automatically generating signatures for polymorphic worms J Newsome, B Karp, D Song 2005 IEEE Symposium on Security and Privacy (S&P'05), 226-241, 2005 | 1270 | 2005 |
BitBlaze: A new approach to computer security via binary analysis D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ... Information Systems Security: 4th International Conference, ICISS 2008 …, 2008 | 1089 | 2008 |
GEM: Graph embedding for routing and data-centric storage in sensor networks without geographic information J Newsome, D Song Proceedings of the 1st international conference on Embedded networked sensor …, 2003 | 438 | 2003 |
Towards automatic generation of vulnerability-based signatures D Brumley, J Newsome, D Song, H Wang, S Jha 2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-16, 2006 | 418 | 2006 |
Automatically identifying trigger-based behavior in malware D Brumley, C Hartwig, Z Liang, J Newsome, D Song, H Yin Botnet Detection: Countering the Largest Security Threat, 65-88, 2008 | 339 | 2008 |
Paragraph: Thwarting signature learning by training maliciously J Newsome, B Karp, D Song Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006 | 316 | 2006 |
Building verifiable trusted path on commodity x86 computers Z Zhou, VD Gligor, J Newsome, JM McCune 2012 IEEE symposium on security and privacy, 616-630, 2012 | 193 | 2012 |
Design, implementation and verification of an extensible and modular hypervisor framework A Vasudevan, S Chaki, L Jia, J McCune, J Newsome, A Datta 2013 IEEE Symposium on Security and Privacy, 430-444, 2013 | 180 | 2013 |
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation. D Brumley, J Caballero, Z Liang, J Newsome, D Song USENIX Security Symposium 15, 2007 | 168 | 2007 |
Replayer: Automatic protocol replay by binary analysis J Newsome, D Brumley, J Franklin, D Song Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 163 | 2006 |
{MiniBox}: A {Two-Way} Sandbox for x86 Native Code Y Li, J McCune, J Newsome, A Perrig, B Baker, W Drewry 2014 USENIX annual technical conference (USENIX ATC 14), 409-420, 2014 | 146 | 2014 |
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. J Newsome, D Brumley, D Song, J Chamcham, X Kovah NDSS, 2006 | 143 | 2006 |
BitScope: Automatically dissecting malicious binaries D Brumley, C Hartwig, MG Kang, Z Liang, J Newsome, P Poosankam, ... Technical Report CS-07-133, School of Computer Science, Carnegie Mellon …, 2007 | 119 | 2007 |
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? A Vasudevan, E Owusu, Z Zhou, J Newsome, JM McCune Trust and Trustworthy Computing: 5th International Conference, TRUST 2012 …, 2012 | 114 | 2012 |
OASIS: On achieving a sanctuary for integrity and secrecy on untrusted platforms E Owusu, J Guajardo, J McCune, J Newsome, A Perrig, A Vasudevan Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 109 | 2013 |
Measuring channel capacity to distinguish undue influence J Newsome, S McCamant, D Song Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009 | 109 | 2009 |
Sweeper: A lightweight end-to-end system for defending against fast worms J Tucek, J Newsome, S Lu, C Huang, S Xanthos, D Brumley, Y Zhou, ... Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer …, 2007 | 92 | 2007 |
Systems and methods for maintaining integrity and secrecy in untrusted computing platforms JG Merchan, EK Owusu, JMC McCune, JD Newsome, A Vasudevan, ... US Patent 9,367,701, 2016 | 91 | 2016 |