BibTeX records: Dawn Song

download as .bib file

@article{DBLP:journals/ieeesp/NairROS24,
  author       = {Vivek Nair and
                  Louis B. Rosenberg and
                  James F. O'Brien and
                  Dawn Song},
  title        = {Truth in Motion: The Unprecedented Risks and Opportunities of Extended
                  Reality Motion Data},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {1},
  pages        = {24--32},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3330392},
  doi          = {10.1109/MSEC.2023.3330392},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/NairROS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GarridoNS24,
  author       = {Gonzalo Munilla Garrido and
                  Vivek Nair and
                  Dawn Song},
  title        = {SoK: Data Privacy in Virtual Reality},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {1},
  pages        = {21--40},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0003},
  doi          = {10.56553/POPETS-2024-0003},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/GarridoNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-12292,
  author       = {Weixin Chen and
                  Dawn Song and
                  Bo Li},
  title        = {{GRATH:} Gradual Self-Truthifying for Large Language Models},
  journal      = {CoRR},
  volume       = {abs/2401.12292},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.12292},
  doi          = {10.48550/ARXIV.2401.12292},
  eprinttype    = {arXiv},
  eprint       = {2401.12292},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-12292.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-03181,
  author       = {Mintong Kang and
                  Nezihe Merve G{\"{u}}rel and
                  Ning Yu and
                  Dawn Song and
                  Bo Li},
  title        = {{C-RAG:} Certified Generation Risks for Retrieval-Augmented Language
                  Models},
  journal      = {CoRR},
  volume       = {abs/2402.03181},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.03181},
  doi          = {10.48550/ARXIV.2402.03181},
  eprinttype    = {arXiv},
  eprint       = {2402.03181},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-03181.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-12590,
  author       = {Shiyang Lai and
                  Yujin Potter and
                  Junsol Kim and
                  Richard Zhuang and
                  Dawn Song and
                  James Evans},
  title        = {Evolving {AI} Collectives to Enhance Human Diversity and Enable Self-Regulation},
  journal      = {CoRR},
  volume       = {abs/2402.12590},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.12590},
  doi          = {10.48550/ARXIV.2402.12590},
  eprinttype    = {arXiv},
  eprint       = {2402.12590},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-12590.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-07918,
  author       = {Sayash Kapoor and
                  Rishi Bommasani and
                  Kevin Klyman and
                  Shayne Longpre and
                  Ashwin Ramaswami and
                  Peter Cihon and
                  Aspen Hopkins and
                  Kevin Bankston and
                  Stella Biderman and
                  Miranda Bogen and
                  Rumman Chowdhury and
                  Alex Engler and
                  Peter Henderson and
                  Yacine Jernite and
                  Seth Lazar and
                  Stefano Maffulli and
                  Alondra Nelson and
                  Joelle Pineau and
                  Aviya Skowron and
                  Dawn Song and
                  Victor Storchan and
                  Daniel Zhang and
                  Daniel E. Ho and
                  Percy Liang and
                  Arvind Narayanan},
  title        = {On the Societal Impact of Open Foundation Models},
  journal      = {CoRR},
  volume       = {abs/2403.07918},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.07918},
  doi          = {10.48550/ARXIV.2403.07918},
  eprinttype    = {arXiv},
  eprint       = {2403.07918},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-07918.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-10499,
  author       = {Chenguang Wang and
                  Ruoxi Jia and
                  Xin Liu and
                  Dawn Song},
  title        = {Benchmarking Zero-Shot Robustness of Multimodal Foundation Models:
                  {A} Pilot Study},
  journal      = {CoRR},
  volume       = {abs/2403.10499},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.10499},
  doi          = {10.48550/ARXIV.2403.10499},
  eprinttype    = {arXiv},
  eprint       = {2403.10499},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-10499.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-13031,
  author       = {Zhuowen Yuan and
                  Zidi Xiong and
                  Yi Zeng and
                  Ning Yu and
                  Ruoxi Jia and
                  Dawn Song and
                  Bo Li},
  title        = {RigorLLM: Resilient Guardrails for Large Language Models against Undesired
                  Content},
  journal      = {CoRR},
  volume       = {abs/2403.13031},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.13031},
  doi          = {10.48550/ARXIV.2403.13031},
  eprinttype    = {arXiv},
  eprint       = {2403.13031},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-13031.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-15447,
  author       = {Junyuan Hong and
                  Jinhao Duan and
                  Chenhui Zhang and
                  Zhangheng Li and
                  Chulin Xie and
                  Kelsey Lieberman and
                  James Diffenderfer and
                  Brian R. Bartoldson and
                  Ajay Jaiswal and
                  Kaidi Xu and
                  Bhavya Kailkhura and
                  Dan Hendrycks and
                  Dawn Song and
                  Zhangyang Wang and
                  Bo Li},
  title        = {Decoding Compressed Trust: Scrutinizing the Trustworthiness of Efficient
                  LLMs Under Compression},
  journal      = {CoRR},
  volume       = {abs/2403.15447},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.15447},
  doi          = {10.48550/ARXIV.2403.15447},
  eprinttype    = {arXiv},
  eprint       = {2403.15447},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-15447.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23,
  author       = {Clark W. Barrett and
                  Brad Boyd and
                  Elie Bursztein and
                  Nicholas Carlini and
                  Brad Chen and
                  Jihye Choi and
                  Amrita Roy Chowdhury and
                  Mihai Christodorescu and
                  Anupam Datta and
                  Soheil Feizi and
                  Kathleen Fisher and
                  Tatsunori Hashimoto and
                  Dan Hendrycks and
                  Somesh Jha and
                  Daniel Kang and
                  Florian Kerschbaum and
                  Eric Mitchell and
                  John C. Mitchell and
                  Zulfikar Ramzan and
                  Khawaja Shams and
                  Dawn Song and
                  Ankur Taly and
                  Diyi Yang},
  title        = {Identifying and Mitigating the Security Risks of Generative {AI}},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {1--52},
  year         = {2023},
  url          = {https://doi.org/10.1561/3300000041},
  doi          = {10.1561/3300000041},
  timestamp    = {Sun, 24 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/GoldblumTXCSSML23,
  author       = {Micah Goldblum and
                  Dimitris Tsipras and
                  Chulin Xie and
                  Xinyun Chen and
                  Avi Schwarzschild and
                  Dawn Song and
                  Aleksander Madry and
                  Bo Li and
                  Tom Goldstein},
  title        = {Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks,
                  and Defenses},
  journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
  volume       = {45},
  number       = {2},
  pages        = {1563--1580},
  year         = {2023},
  url          = {https://doi.org/10.1109/TPAMI.2022.3162397},
  doi          = {10.1109/TPAMI.2022.3162397},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pami/GoldblumTXCSSML23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GarridoLMS23,
  author       = {Gonzalo Munilla Garrido and
                  Xiaoyuan Liu and
                  Florian Matthes and
                  Dawn Song},
  title        = {Lessons Learned: Surveying the Practicality of Differential Privacy
                  in the Industry},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {2},
  pages        = {151--170},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0045},
  doi          = {10.56553/POPETS-2023-0045},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/GarridoLMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/NairGSO23,
  author       = {Vivek Nair and
                  Gonzalo Munilla Garrido and
                  Dawn Song and
                  James F. O'Brien},
  title        = {Exploring the Privacy Risks of Adversarial {VR} Game Design},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {4},
  pages        = {238--256},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0108},
  doi          = {10.56553/POPETS-2023-0108},
  timestamp    = {Thu, 17 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/NairGSO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aistats/ZhuWPWJSJ23,
  author       = {Banghua Zhu and
                  Lun Wang and
                  Qi Pang and
                  Shuai Wang and
                  Jiantao Jiao and
                  Dawn Song and
                  Michael I. Jordan},
  editor       = {Francisco J. R. Ruiz and
                  Jennifer G. Dy and
                  Jan{-}Willem van de Meent},
  title        = {Byzantine-Robust Federated Learning with Optimal Statistical Rates},
  booktitle    = {International Conference on Artificial Intelligence and Statistics,
                  25-27 April 2023, Palau de Congressos, Valencia, Spain},
  series       = {Proceedings of Machine Learning Research},
  volume       = {206},
  pages        = {3151--3178},
  publisher    = {{PMLR}},
  year         = {2023},
  url          = {https://proceedings.mlr.press/v206/zhu23b.html},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aistats/ZhuWPWJSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/ChenS023,
  author       = {Weixin Chen and
                  Dawn Song and
                  Bo Li},
  title        = {TrojDiff: Trojan Attacks on Diffusion Models with Diverse Targets},
  booktitle    = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2023, Vancouver, BC, Canada, June 17-24, 2023},
  pages        = {4035--4044},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CVPR52729.2023.00393},
  doi          = {10.1109/CVPR52729.2023.00393},
  timestamp    = {Mon, 28 Aug 2023 16:14:07 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/ChenS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/NairS23,
  author       = {Vivek Nair and
                  Dawn Song},
  title        = {Multi-Factor Credential Hashing for Asymmetric Brute-Force Attack
                  Resistance},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {56--72},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00013},
  doi          = {10.1109/EUROSP57164.2023.00013},
  timestamp    = {Mon, 07 Aug 2023 15:56:23 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/NairS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ErnstbergerLEZSCMGS23,
  author       = {Jens Ernstberger and
                  Jan Lauinger and
                  Fatima Elsheimy and
                  Liyi Zhou and
                  Sebastian Steinhorst and
                  Ran Canetti and
                  Andrew Miller and
                  Arthur Gervais and
                  Dawn Song},
  title        = {SoK: Data Sovereignty},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {122--143},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00017},
  doi          = {10.1109/EUROSP57164.2023.00017},
  timestamp    = {Mon, 07 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ErnstbergerLEZSCMGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbc2/NairS23,
  author       = {Vivek Nair and
                  Dawn Song},
  title        = {Decentralizing Custodial Wallets with {MFKDF}},
  booktitle    = {{IEEE} International Conference on Blockchain and Cryptocurrency,
                  {ICBC} 2023, Dubai, United Arab Emirates, May 1-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICBC56567.2023.10174998},
  doi          = {10.1109/ICBC56567.2023.10174998},
  timestamp    = {Fri, 21 Jul 2023 12:10:41 +0200},
  biburl       = {https://dblp.org/rec/conf/icbc2/NairS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/XiaoCJWNLA0S23,
  author       = {Chaowei Xiao and
                  Zhongzhu Chen and
                  Kun Jin and
                  Jiongxiao Wang and
                  Weili Nie and
                  Mingyan Liu and
                  Anima Anandkumar and
                  Bo Li and
                  Dawn Song},
  title        = {DensePure: Understanding Diffusion Models for Adversarial Robustness},
  booktitle    = {The Eleventh International Conference on Learning Representations,
                  {ICLR} 2023, Kigali, Rwanda, May 1-5, 2023},
  publisher    = {OpenReview.net},
  year         = {2023},
  url          = {https://openreview.net/pdf?id=p7hvOJ6Gq0i},
  timestamp    = {Fri, 30 Jun 2023 14:38:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/XiaoCJWNLA0S23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/LiHS23,
  author       = {Qinbin Li and
                  Bingsheng He and
                  Dawn Song},
  editor       = {Andreas Krause and
                  Emma Brunskill and
                  Kyunghyun Cho and
                  Barbara Engelhardt and
                  Sivan Sabato and
                  Jonathan Scarlett},
  title        = {Adversarial Collaborative Learning on Non-IID Features},
  booktitle    = {International Conference on Machine Learning, {ICML} 2023, 23-29 July
                  2023, Honolulu, Hawaii, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {202},
  pages        = {19504--19526},
  publisher    = {{PMLR}},
  year         = {2023},
  url          = {https://proceedings.mlr.press/v202/li23j.html},
  timestamp    = {Mon, 28 Aug 2023 17:23:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/LiHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/PangWWZS23,
  author       = {Qi Pang and
                  Lun Wang and
                  Shuai Wang and
                  Wenting Zheng and
                  Dawn Song},
  editor       = {Andreas Krause and
                  Emma Brunskill and
                  Kyunghyun Cho and
                  Barbara Engelhardt and
                  Sivan Sabato and
                  Jonathan Scarlett},
  title        = {Secure Federated Correlation Test and Entropy Estimation},
  booktitle    = {International Conference on Machine Learning, {ICML} 2023, 23-29 July
                  2023, Honolulu, Hawaii, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {202},
  pages        = {26990--27010},
  publisher    = {{PMLR}},
  year         = {2023},
  url          = {https://proceedings.mlr.press/v202/pang23a.html},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icml/PangWWZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/Chen000S23,
  author       = {Xuan Chen and
                  Wenbo Guo and
                  Guanhong Tao and
                  Xiangyu Zhang and
                  Dawn Song},
  editor       = {Alice Oh and
                  Tristan Naumann and
                  Amir Globerson and
                  Kate Saenko and
                  Moritz Hardt and
                  Sergey Levine},
  title        = {{BIRD:} Generalizable Backdoor Detection and Removal for Deep Reinforcement
                  Learning},
  booktitle    = {Advances in Neural Information Processing Systems 36: Annual Conference
                  on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans,
                  LA, USA, December 10 - 16, 2023},
  year         = {2023},
  url          = {http://papers.nips.cc/paper\_files/paper/2023/hash/802e90325f4c8546e13e5763b2ecab88-Abstract-Conference.html},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/Chen000S23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/KangSL23,
  author       = {Mintong Kang and
                  Dawn Song and
                  Bo Li},
  editor       = {Alice Oh and
                  Tristan Naumann and
                  Amir Globerson and
                  Kate Saenko and
                  Moritz Hardt and
                  Sergey Levine},
  title        = {DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification},
  booktitle    = {Advances in Neural Information Processing Systems 36: Annual Conference
                  on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans,
                  LA, USA, December 10 - 16, 2023},
  year         = {2023},
  url          = {http://papers.nips.cc/paper\_files/paper/2023/hash/ea0b28cbbd0cbc45ec4ac38e92da9cb2-Abstract-Conference.html},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/KangSL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/WangCPXKZXXDSTA23,
  author       = {Boxin Wang and
                  Weixin Chen and
                  Hengzhi Pei and
                  Chulin Xie and
                  Mintong Kang and
                  Chenhui Zhang and
                  Chejian Xu and
                  Zidi Xiong and
                  Ritik Dutta and
                  Rylan Schaeffer and
                  Sang T. Truong and
                  Simran Arora and
                  Mantas Mazeika and
                  Dan Hendrycks and
                  Zinan Lin and
                  Yu Cheng and
                  Sanmi Koyejo and
                  Dawn Song and
                  Bo Li},
  editor       = {Alice Oh and
                  Tristan Naumann and
                  Amir Globerson and
                  Kate Saenko and
                  Moritz Hardt and
                  Sergey Levine},
  title        = {DecodingTrust: {A} Comprehensive Assessment of Trustworthiness in
                  {GPT} Models},
  booktitle    = {Advances in Neural Information Processing Systems 36: Annual Conference
                  on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans,
                  LA, USA, December 10 - 16, 2023},
  year         = {2023},
  url          = {http://papers.nips.cc/paper\_files/paper/2023/hash/63cb9921eecf51bfad27a99b2c53dd6d-Abstract-Datasets\_and\_Benchmarks.html},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/WangCPXKZXXDSTA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhouXECWWQWSG23,
  author       = {Liyi Zhou and
                  Xihan Xiong and
                  Jens Ernstberger and
                  Stefanos Chaliasos and
                  Zhipeng Wang and
                  Ye Wang and
                  Kaihua Qin and
                  Roger Wattenhofer and
                  Dawn Song and
                  Arthur Gervais},
  title        = {SoK: Decentralized Finance (DeFi) Attacks},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {2444--2461},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179435},
  doi          = {10.1109/SP46215.2023.10179435},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhouXECWWQWSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uist/NairGS23,
  author       = {Vivek C. Nair and
                  Gonzalo Munilla Garrido and
                  Dawn Song},
  editor       = {Sean Follmer and
                  Jeff Han and
                  J{\"{u}}rgen Steimle and
                  Nathalie Henry Riche},
  title        = {Going Incognito in the Metaverse: Achieving Theoretically Optimal
                  Privacy-Usability Tradeoffs in {VR}},
  booktitle    = {Proceedings of the 36th Annual {ACM} Symposium on User Interface Software
                  and Technology, {UIST} 2023, San Francisco, CA, USA, 29 October 2023-
                  1 November 2023},
  pages        = {61:1--61:16},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3586183.3606754},
  doi          = {10.1145/3586183.3606754},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uist/NairGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Nair0MWORS23,
  author       = {Vivek Nair and
                  Wenbo Guo and
                  Justus Mattern and
                  Rui Wang and
                  James F. O'Brien and
                  Louis B. Rosenberg and
                  Dawn Song},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Unique Identification of 50, 000+ Virtual Reality Users from Head
                  {\&} Hand Motion Data},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {895--910},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/nair-identification},
  timestamp    = {Tue, 26 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Nair0MWORS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NairS23,
  author       = {Vivek Nair and
                  Dawn Song},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Multi-Factor Key Derivation Function {(MFKDF)} for Fast, Flexible,
                  Secure, {\&} Practical Key Management},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {2097--2114},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/nair-mfkdf},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/NairS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0002WWXS23,
  author       = {Wenbo Guo and
                  Xian Wu and
                  Lun Wang and
                  Xinyu Xing and
                  Dawn Song},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {{PATROL:} Provable Defense against Adversarial Policy in Two-player
                  Games},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3943--3960},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/guo-wenbo},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0002WWXS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/QinCZLSG23,
  author       = {Kaihua Qin and
                  Stefanos Chaliasos and
                  Liyi Zhou and
                  Benjamin Livshits and
                  Dawn Song and
                  Arthur Gervais},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {The Blockchain Imitation Game},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3961--3978},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/qin},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/QinCZLSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RatheeB00S23,
  author       = {Deevashwer Rathee and
                  Anwesh Bhattacharya and
                  Divya Gupta and
                  Rahul Sharma and
                  Dawn Song},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Secure Floating-Point Training},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {6329--6346},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/rathee},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RatheeB00S23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-05940,
  author       = {Gonzalo Munilla Garrido and
                  Vivek Nair and
                  Dawn Song},
  title        = {SoK: Data Privacy in Virtual Reality},
  journal      = {CoRR},
  volume       = {abs/2301.05940},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.05940},
  doi          = {10.48550/ARXIV.2301.05940},
  eprinttype    = {arXiv},
  eprint       = {2301.05940},
  timestamp    = {Thu, 19 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-05940.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-08927,
  author       = {Vivek Nair and
                  Wenbo Guo and
                  Justus Mattern and
                  Rui Wang and
                  James F. O'Brien and
                  Louis B. Rosenberg and
                  Dawn Song},
  title        = {Unique Identification of 50, 000+ Virtual Reality Users from Head
                  {\&} Hand Motion Data},
  journal      = {CoRR},
  volume       = {abs/2302.08927},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.08927},
  doi          = {10.48550/ARXIV.2302.08927},
  eprinttype    = {arXiv},
  eprint       = {2302.08927},
  timestamp    = {Tue, 26 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-08927.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-05762,
  author       = {Weixin Chen and
                  Dawn Song and
                  Bo Li},
  title        = {TrojDiff: Trojan Attacks on Diffusion Models with Diverse Targets},
  journal      = {CoRR},
  volume       = {abs/2303.05762},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.05762},
  doi          = {10.48550/ARXIV.2303.05762},
  eprinttype    = {arXiv},
  eprint       = {2303.05762},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-05762.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-17877,
  author       = {Kaihua Qin and
                  Stefanos Chaliasos and
                  Liyi Zhou and
                  Benjamin Livshits and
                  Dawn Song and
                  Arthur Gervais},
  title        = {The Blockchain Imitation Game},
  journal      = {CoRR},
  volume       = {abs/2303.17877},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.17877},
  doi          = {10.48550/ARXIV.2303.17877},
  eprinttype    = {arXiv},
  eprint       = {2303.17877},
  timestamp    = {Mon, 17 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-17877.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-09822,
  author       = {Tanusree Sharma and
                  Yujin Kwon and
                  Kornrapat Pongmala and
                  Henry Wang and
                  Andrew Miller and
                  Dawn Song and
                  Yang Wang},
  title        = {Unpacking How Decentralized Autonomous Organizations (DAOs) Work in
                  Practice},
  journal      = {CoRR},
  volume       = {abs/2304.09822},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.09822},
  doi          = {10.48550/ARXIV.2304.09822},
  eprinttype    = {arXiv},
  eprint       = {2304.09822},
  timestamp    = {Wed, 09 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-09822.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-12749,
  author       = {Yu Gai and
                  Liyi Zhou and
                  Kaihua Qin and
                  Dawn Song and
                  Arthur Gervais},
  title        = {Blockchain Large Language Models},
  journal      = {CoRR},
  volume       = {abs/2304.12749},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.12749},
  doi          = {10.48550/ARXIV.2304.12749},
  eprinttype    = {arXiv},
  eprint       = {2304.12749},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-12749.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-14046,
  author       = {Kaihua Qin and
                  Zhe Ye and
                  Zhun Wang and
                  Weilin Li and
                  Liyi Zhou and
                  Chao Zhang and
                  Dawn Song and
                  Arthur Gervais},
  title        = {Towards Automated Security Analysis of Smart Contracts based on Execution
                  Property Graph},
  journal      = {CoRR},
  volume       = {abs/2305.14046},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.14046},
  doi          = {10.48550/ARXIV.2305.14046},
  eprinttype    = {arXiv},
  eprint       = {2305.14046},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-14046.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-15717,
  author       = {Arnav Gudibande and
                  Eric Wallace and
                  Charlie Snell and
                  Xinyang Geng and
                  Hao Liu and
                  Pieter Abbeel and
                  Sergey Levine and
                  Dawn Song},
  title        = {The False Promise of Imitating Proprietary LLMs},
  journal      = {CoRR},
  volume       = {abs/2305.15717},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.15717},
  doi          = {10.48550/ARXIV.2305.15717},
  eprinttype    = {arXiv},
  eprint       = {2305.15717},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-15717.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-19198,
  author       = {Vivek Nair and
                  Christian Rack and
                  Wenbo Guo and
                  Rui Wang and
                  Shuixian Li and
                  Brandon Huang and
                  Atticus Cull and
                  James F. O'Brien and
                  Louis B. Rosenberg and
                  Dawn Song},
  title        = {Inferring Private Personal Attributes of Virtual Reality Users from
                  Head and Hand Motion Data},
  journal      = {CoRR},
  volume       = {abs/2305.19198},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.19198},
  doi          = {10.48550/ARXIV.2305.19198},
  eprinttype    = {arXiv},
  eprint       = {2305.19198},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-19198.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-05007,
  author       = {Jian Liu and
                  Peilun Li and
                  Raymond Cheng and
                  N. Asokan and
                  Dawn Song},
  title        = {Parallel and Asynchronous Smart Contract Execution},
  journal      = {CoRR},
  volume       = {abs/2306.05007},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.05007},
  doi          = {10.48550/ARXIV.2306.05007},
  eprinttype    = {arXiv},
  eprint       = {2306.05007},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-05007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-06459,
  author       = {Vivek Nair and
                  Louis B. Rosenberg and
                  James F. O'Brien and
                  Dawn Song},
  title        = {Truth in Motion: The Unprecedented Risks and Opportunities of Extended
                  Reality Motion Data},
  journal      = {CoRR},
  volume       = {abs/2306.06459},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.06459},
  doi          = {10.48550/ARXIV.2306.06459},
  eprinttype    = {arXiv},
  eprint       = {2306.06459},
  timestamp    = {Tue, 26 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-06459.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-08168,
  author       = {Vivek Nair and
                  Dawn Song},
  title        = {Decentralizing Custodial Wallets with {MFKDF}},
  journal      = {CoRR},
  volume       = {abs/2306.08168},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.08168},
  doi          = {10.48550/ARXIV.2306.08168},
  eprinttype    = {arXiv},
  eprint       = {2306.08168},
  timestamp    = {Sun, 18 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-08168.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-08169,
  author       = {Vivek Nair and
                  Dawn Song},
  title        = {Multi-Factor Credential Hashing for Asymmetric Brute-Force Attack
                  Resistance},
  journal      = {CoRR},
  volume       = {abs/2306.08169},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.08169},
  doi          = {10.48550/ARXIV.2306.08169},
  eprinttype    = {arXiv},
  eprint       = {2306.08169},
  timestamp    = {Sun, 18 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-08169.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-11698,
  author       = {Boxin Wang and
                  Weixin Chen and
                  Hengzhi Pei and
                  Chulin Xie and
                  Mintong Kang and
                  Chenhui Zhang and
                  Chejian Xu and
                  Zidi Xiong and
                  Ritik Dutta and
                  Rylan Schaeffer and
                  Sang T. Truong and
                  Simran Arora and
                  Mantas Mazeika and
                  Dan Hendrycks and
                  Zinan Lin and
                  Yu Cheng and
                  Sanmi Koyejo and
                  Dawn Song and
                  Bo Li},
  title        = {DecodingTrust: {A} Comprehensive Assessment of Trustworthiness in
                  {GPT} Models},
  journal      = {CoRR},
  volume       = {abs/2306.11698},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.11698},
  doi          = {10.48550/ARXIV.2306.11698},
  eprinttype    = {arXiv},
  eprint       = {2306.11698},
  timestamp    = {Tue, 18 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-11698.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-12338,
  author       = {Isaac David and
                  Liyi Zhou and
                  Kaihua Qin and
                  Dawn Song and
                  Lorenzo Cavallaro and
                  Arthur Gervais},
  title        = {Do you still need a manual smart contract audit?},
  journal      = {CoRR},
  volume       = {abs/2306.12338},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.12338},
  doi          = {10.48550/ARXIV.2306.12338},
  eprinttype    = {arXiv},
  eprint       = {2306.12338},
  timestamp    = {Fri, 23 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-12338.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-14746,
  author       = {Vivek Nair and
                  Dawn Song},
  title        = {{MFDPG:} Multi-Factor Authenticated Password Management With Zero
                  Stored Secrets},
  journal      = {CoRR},
  volume       = {abs/2306.14746},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.14746},
  doi          = {10.48550/ARXIV.2306.14746},
  eprinttype    = {arXiv},
  eprint       = {2306.14746},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-14746.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-02106,
  author       = {Yuzheng Hu and
                  Fan Wu and
                  Qinbin Li and
                  Yunhui Long and
                  Gonzalo Munilla Garrido and
                  Chang Ge and
                  Bolin Ding and
                  David A. Forsyth and
                  Bo Li and
                  Dawn Song},
  title        = {SoK: Privacy-Preserving Data Synthesis},
  journal      = {CoRR},
  volume       = {abs/2307.02106},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.02106},
  doi          = {10.48550/ARXIV.2307.02106},
  eprinttype    = {arXiv},
  eprint       = {2307.02106},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-02106.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-08912,
  author       = {Pengcheng Fang and
                  Peng Gao and
                  Yun Peng and
                  Qingzhao Zhang and
                  Tao Xie and
                  Dawn Song and
                  Prateek Mittal and
                  Sanjeev R. Kulkarni and
                  Zhuotao Liu and
                  Xusheng Xiao},
  title        = {{CONTRACTFIX:} {A} Framework for Automatically Fixing Vulnerabilities
                  in Smart Contracts},
  journal      = {CoRR},
  volume       = {abs/2307.08912},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.08912},
  doi          = {10.48550/ARXIV.2307.08912},
  eprinttype    = {arXiv},
  eprint       = {2307.08912},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-08912.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-11754,
  author       = {Yujin Kwon and
                  Kornrapat Pongmala and
                  Kaihua Qin and
                  Ariah Klages{-}Mundt and
                  Philipp Jovanovic and
                  Christine A. Parlour and
                  Arthur Gervais and
                  Dawn Song},
  title        = {What Drives the (In)stability of a Stablecoin?},
  journal      = {CoRR},
  volume       = {abs/2307.11754},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.11754},
  doi          = {10.48550/ARXIV.2307.11754},
  eprinttype    = {arXiv},
  eprint       = {2307.11754},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-11754.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-14840,
  author       = {Clark W. Barrett and
                  Brad Boyd and
                  Ellie Burzstein and
                  Nicholas Carlini and
                  Brad Chen and
                  Jihye Choi and
                  Amrita Roy Chowdhury and
                  Mihai Christodorescu and
                  Anupam Datta and
                  Soheil Feizi and
                  Kathleen Fisher and
                  Tatsunori Hashimoto and
                  Dan Hendrycks and
                  Somesh Jha and
                  Daniel Kang and
                  Florian Kerschbaum and
                  Eric Mitchell and
                  John C. Mitchell and
                  Zulfikar Ramzan and
                  Khawaja Shams and
                  Dawn Song and
                  Ankur Taly and
                  Diyi Yang},
  title        = {Identifying and Mitigating the Security Risks of Generative {AI}},
  journal      = {CoRR},
  volume       = {abs/2308.14840},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.14840},
  doi          = {10.48550/ARXIV.2308.14840},
  eprinttype    = {arXiv},
  eprint       = {2308.14840},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-14840.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-00430,
  author       = {Vivek Nair and
                  Wenbo Guo and
                  Rui Wang and
                  James F. O'Brien and
                  Louis B. Rosenberg and
                  Dawn Song},
  title        = {Berkeley Open Extended Reality Recordings 2023 {(BOXRR-23):} 4.7 Million
                  Motion Capture Recordings from 105, 852 Extended Reality Device Users},
  journal      = {CoRR},
  volume       = {abs/2310.00430},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.00430},
  doi          = {10.48550/ARXIV.2310.00430},
  eprinttype    = {arXiv},
  eprint       = {2310.00430},
  timestamp    = {Tue, 26 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-00430.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-01405,
  author       = {Andy Zou and
                  Long Phan and
                  Sarah Chen and
                  James Campbell and
                  Phillip Guo and
                  Richard Ren and
                  Alexander Pan and
                  Xuwang Yin and
                  Mantas Mazeika and
                  Ann{-}Kathrin Dombrowski and
                  Shashwat Goel and
                  Nathaniel Li and
                  Michael J. Byun and
                  Zifan Wang and
                  Alex Mallen and
                  Steven Basart and
                  Sanmi Koyejo and
                  Dawn Song and
                  Matt Fredrikson and
                  J. Zico Kolter and
                  Dan Hendrycks},
  title        = {Representation Engineering: {A} Top-Down Approach to {AI} Transparency},
  journal      = {CoRR},
  volume       = {abs/2310.01405},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.01405},
  doi          = {10.48550/ARXIV.2310.01405},
  eprinttype    = {arXiv},
  eprint       = {2310.01405},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-01405.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-03710,
  author       = {Nicholas Crispino and
                  Kyle Montgomery and
                  Fankun Zeng and
                  Dawn Song and
                  Chenguang Wang},
  title        = {Agent Instructs Large Language Models to be General Zero-Shot Reasoners},
  journal      = {CoRR},
  volume       = {abs/2310.03710},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.03710},
  doi          = {10.48550/ARXIV.2310.03710},
  eprinttype    = {arXiv},
  eprint       = {2310.03710},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-03710.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-11865,
  author       = {Qinbin Li and
                  Chulin Xie and
                  Xiaojun Xu and
                  Xiaoyuan Liu and
                  Ce Zhang and
                  Bo Li and
                  Bingsheng He and
                  Dawn Song},
  title        = {Effective and Efficient Federated Tree Learning on Hybrid Data},
  journal      = {CoRR},
  volume       = {abs/2310.11865},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.11865},
  doi          = {10.48550/ARXIV.2310.11865},
  eprinttype    = {arXiv},
  eprint       = {2310.11865},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-11865.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-17688,
  author       = {Yoshua Bengio and
                  Geoffrey E. Hinton and
                  Andrew Yao and
                  Dawn Song and
                  Pieter Abbeel and
                  Yuval Noah Harari and
                  Ya{-}Qin Zhang and
                  Lan Xue and
                  Shai Shalev{-}Shwartz and
                  Gillian K. Hadfield and
                  Jeff Clune and
                  Tegan Maharaj and
                  Frank Hutter and
                  Atilim G{\"{u}}nes Baydin and
                  Sheila A. McIlraith and
                  Qiqi Gao and
                  Ashwin Acharya and
                  David Krueger and
                  Anca D. Dragan and
                  Philip H. S. Torr and
                  Stuart Russell and
                  Daniel Kahneman and
                  Jan Brauner and
                  S{\"{o}}ren Mindermann},
  title        = {Managing {AI} Risks in an Era of Rapid Progress},
  journal      = {CoRR},
  volume       = {abs/2310.17688},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.17688},
  doi          = {10.48550/ARXIV.2310.17688},
  eprinttype    = {arXiv},
  eprint       = {2310.17688},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-17688.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-05090,
  author       = {Vivek Nair and
                  Wenbo Guo and
                  James F. O'Brien and
                  Louis B. Rosenberg and
                  Dawn Song},
  title        = {Deep Motion Masking for Secure, Usable, and Scalable Real-Time Anonymization
                  of Virtual Reality Motion Data},
  journal      = {CoRR},
  volume       = {abs/2311.05090},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.05090},
  doi          = {10.48550/ARXIV.2311.05090},
  eprinttype    = {arXiv},
  eprint       = {2311.05090},
  timestamp    = {Tue, 26 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-05090.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-11225,
  author       = {Hengzhi Pei and
                  Jinyuan Jia and
                  Wenbo Guo and
                  Bo Li and
                  Dawn Song},
  title        = {TextGuard: Provable Defense against Backdoor Attacks on Text Classification},
  journal      = {CoRR},
  volume       = {abs/2311.11225},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.11225},
  doi          = {10.48550/ARXIV.2311.11225},
  eprinttype    = {arXiv},
  eprint       = {2311.11225},
  timestamp    = {Thu, 23 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-11225.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-16124,
  author       = {Mintong Kang and
                  Dawn Song and
                  Bo Li},
  title        = {DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification},
  journal      = {CoRR},
  volume       = {abs/2311.16124},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.16124},
  doi          = {10.48550/ARXIV.2311.16124},
  eprinttype    = {arXiv},
  eprint       = {2311.16124},
  timestamp    = {Fri, 01 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-16124.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-01511,
  author       = {Yujin Kwon and
                  Ella Corren and
                  Gonzalo Munilla Garrido and
                  Chris Jay Hoofnagle and
                  Dawn Song},
  title        = {SoK: The Gap Between Data Rights Ideals and Reality},
  journal      = {CoRR},
  volume       = {abs/2312.01511},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.01511},
  doi          = {10.48550/ARXIV.2312.01511},
  eprinttype    = {arXiv},
  eprint       = {2312.01511},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-01511.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RatheeBGSS23,
  author       = {Deevashwer Rathee and
                  Anwesh Bhattacharya and
                  Divya Gupta and
                  Rahul Sharma and
                  Dawn Song},
  title        = {Secure Floating-Point Training},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/467},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RatheeBGSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaiZQSG23,
  author       = {Yu Gai and
                  Liyi Zhou and
                  Kaihua Qin and
                  Dawn Song and
                  Arthur Gervais},
  title        = {Blockchain Large Language Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {592},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/592},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaiZQSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ErnstbergerLEZSCMGS23,
  author       = {Jens Ernstberger and
                  Jan Lauinger and
                  Fatima Elsheimy and
                  Liyi Zhou and
                  Sebastian Steinhorst and
                  Ran Canetti and
                  Andrew Miller and
                  Arthur Gervais and
                  Dawn Song},
  title        = {SoK: Data Sovereignty},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {967},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/967},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ErnstbergerLEZSCMGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuXZSZ23,
  author       = {Tianyi Liu and
                  Tiancheng Xie and
                  Jiaheng Zhang and
                  Dawn Song and
                  Yupeng Zhang},
  title        = {Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1271},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1271},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuXZSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiSHBQWLSM23,
  author       = {Yunqi Li and
                  Kyle Soska and
                  Zhen Huang and
                  Sylvain Bellemare and
                  Mikerah Quintyne{-}Collins and
                  Lun Wang and
                  Xiaoyuan Liu and
                  Dawn Song and
                  Andrew Miller},
  title        = {Ratel: MPC-extensions for Smart Contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1909},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1909},
  timestamp    = {Tue, 16 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiSHBQWLSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BarrosoCGOPSP22,
  author       = {Luiz Andr{\'{e}} Barroso and
                  Tanzeem Choudhury and
                  Manish Gupta and
                  Oyekunle A. Olukotun and
                  Raluca Ada Popa and
                  Dawn Xiaodong Song and
                  David A. Patterson},
  title        = {Global perspectives of diversity, equity, and inclusion},
  journal      = {Commun. {ACM}},
  volume       = {65},
  number       = {12},
  pages        = {30--31},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548454},
  doi          = {10.1145/3548454},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/BarrosoCGOPSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/LiuLCAS22,
  author       = {Jian Liu and
                  Peilun Li and
                  Raymond Cheng and
                  N. Asokan and
                  Dawn Song},
  title        = {Parallel and Asynchronous Smart Contract Execution},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {33},
  number       = {5},
  pages        = {1097--1108},
  year         = {2022},
  url          = {https://doi.org/10.1109/TPDS.2021.3095234},
  doi          = {10.1109/TPDS.2021.3095234},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/LiuLCAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acl/WangLCH0S22,
  author       = {Chenguang Wang and
                  Xiao Liu and
                  Zui Chen and
                  Haoyun Hong and
                  Jie Tang and
                  Dawn Song},
  editor       = {Smaranda Muresan and
                  Preslav Nakov and
                  Aline Villavicencio},
  title        = {DeepStruct: Pretraining of Language Models for Structure Prediction},
  booktitle    = {Findings of the Association for Computational Linguistics: {ACL} 2022,
                  Dublin, Ireland, May 22-27, 2022},
  pages        = {803--823},
  publisher    = {Association for Computational Linguistics},
  year         = {2022},
  url          = {https://doi.org/10.18653/v1/2022.findings-acl.67},
  doi          = {10.18653/V1/2022.FINDINGS-ACL.67},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acl/WangLCH0S22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/PanXHYPSLLS22,
  author       = {Xinlei Pan and
                  Chaowei Xiao and
                  Warren He and
                  Shuang Yang and
                  Jian Peng and
                  Mingjie Sun and
                  Mingyan Liu and
                  Bo Li and
                  Dawn Song},
  editor       = {Piotr Faliszewski and
                  Viviana Mascardi and
                  Catherine Pelachaud and
                  Matthew E. Taylor},
  title        = {Characterizing Attacks on Deep Reinforcement Learning},
  booktitle    = {21st International Conference on Autonomous Agents and Multiagent
                  Systems, {AAMAS} 2022, Auckland, New Zealand, May 9-13, 2022},
  pages        = {1010--1018},
  publisher    = {International Foundation for Autonomous Agents and Multiagent Systems
                  {(IFAAMAS)}},
  year         = {2022},
  url          = {https://www.ifaamas.org/Proceedings/aamas2022/pdfs/p1010.pdf},
  doi          = {10.5555/3535850.3535963},
  timestamp    = {Mon, 18 Jul 2022 17:13:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/PanXHYPSLLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeeCTLGVVSSA22,
  author       = {Dayeol Lee and
                  Kevin Cheang and
                  Alexander Thomas and
                  Catherine Lu and
                  Pranav Gaddamadugu and
                  Anjo Vahldiek{-}Oberwagner and
                  Mona Vij and
                  Dawn Song and
                  Sanjit A. Seshia and
                  Krste Asanovic},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Cerberus: {A} Formal Approach to Secure and Efficient Enclave Memory
                  Sharing},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1871--1885},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560595},
  doi          = {10.1145/3548606.3560595},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LeeCTLGVVSSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XieZCZ0JBS22,
  author       = {Tiancheng Xie and
                  Jiaheng Zhang and
                  Zerui Cheng and
                  Fan Zhang and
                  Yupeng Zhang and
                  Yongzheng Jia and
                  Dan Boneh and
                  Dawn Song},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {zkBridge: Trustless Cross-chain Bridges Made Practical},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3003--3017},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560652},
  doi          = {10.1145/3548606.3560652},
  timestamp    = {Mon, 12 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XieZCZ0JBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SoaresSV22,
  author       = {Jorge M. Soares and
                  Dawn Song and
                  Marko Vukolic},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {ConsensusDay '22: {ACM} Workshop on Developments in Consensus},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3543--3544},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3563286},
  doi          = {10.1145/3548606.3563286},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SoaresSV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coling/Shen0GS22,
  author       = {Jianhao Shen and
                  Chenguang Wang and
                  Linyuan Gong and
                  Dawn Song},
  editor       = {Nicoletta Calzolari and
                  Chu{-}Ren Huang and
                  Hansaem Kim and
                  James Pustejovsky and
                  Leo Wanner and
                  Key{-}Sun Choi and
                  Pum{-}Mo Ryu and
                  Hsin{-}Hsi Chen and
                  Lucia Donatelli and
                  Heng Ji and
                  Sadao Kurohashi and
                  Patrizia Paggio and
                  Nianwen Xue and
                  Seokhwan Kim and
                  Younggyun Hahm and
                  Zhong He and
                  Tony Kyungil Lee and
                  Enrico Santus and
                  Francis Bond and
                  Seung{-}Hoon Na},
  title        = {Joint Language Semantic and Structure Embedding for Knowledge Graph
                  Completion},
  booktitle    = {Proceedings of the 29th International Conference on Computational
                  Linguistics, {COLING} 2022, Gyeongju, Republic of Korea, October 12-17,
                  2022},
  pages        = {1965--1978},
  publisher    = {International Committee on Computational Linguistics},
  year         = {2022},
  url          = {https://aclanthology.org/2022.coling-1.171},
  timestamp    = {Thu, 13 Oct 2022 17:29:38 +0200},
  biburl       = {https://dblp.org/rec/conf/coling/Shen0GS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/XieZS22,
  author       = {Tiancheng Xie and
                  Yupeng Zhang and
                  Dawn Song},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Orion: Zero Knowledge Proof with Linear Prover Time},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {299--328},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_11},
  doi          = {10.1007/978-3-031-15985-5\_11},
  timestamp    = {Wed, 19 Oct 2022 17:37:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/XieZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/HendrycksZMTLSS22,
  author       = {Dan Hendrycks and
                  Andy Zou and
                  Mantas Mazeika and
                  Leonard Tang and
                  Bo Li and
                  Dawn Song and
                  Jacob Steinhardt},
  title        = {PixMix: Dreamlike Pictures Comprehensively Improve Safety Measures},
  booktitle    = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022},
  pages        = {16762--16771},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CVPR52688.2022.01628},
  doi          = {10.1109/CVPR52688.2022.01628},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/HendrycksZMTLSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/ShenCWSS22,
  author       = {Da Shen and
                  Xinyun Chen and
                  Chenguang Wang and
                  Koushik Sen and
                  Dawn Song},
  editor       = {Yoav Goldberg and
                  Zornitsa Kozareva and
                  Yue Zhang},
  title        = {Benchmarking Language Models for Code Syntax Understanding},
  booktitle    = {Findings of the Association for Computational Linguistics: {EMNLP}
                  2022, Abu Dhabi, United Arab Emirates, December 7-11, 2022},
  pages        = {3071--3093},
  publisher    = {Association for Computational Linguistics},
  year         = {2022},
  url          = {https://doi.org/10.18653/v1/2022.findings-emnlp.224},
  doi          = {10.18653/V1/2022.FINDINGS-EMNLP.224},
  timestamp    = {Sat, 03 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/emnlp/ShenCWSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/ShenWYHJS0S22,
  author       = {Jianhao Shen and
                  Chenguang Wang and
                  Ye Yuan and
                  Jiawei Han and
                  Heng Ji and
                  Koushik Sen and
                  Ming Zhang and
                  Dawn Song},
  editor       = {Yoav Goldberg and
                  Zornitsa Kozareva and
                  Yue Zhang},
  title        = {{PALT:} Parameter-Lite Transfer of Language Models for Knowledge Graph
                  Completion},
  booktitle    = {Findings of the Association for Computational Linguistics: {EMNLP}
                  2022, Abu Dhabi, United Arab Emirates, December 7-11, 2022},
  pages        = {3833--3847},
  publisher    = {Association for Computational Linguistics},
  year         = {2022},
  url          = {https://doi.org/10.18653/v1/2022.findings-emnlp.281},
  doi          = {10.18653/V1/2022.FINDINGS-EMNLP.281},
  timestamp    = {Thu, 10 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/emnlp/ShenWYHJS0S22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/0001LS22,
  author       = {Chenguang Wang and
                  Xiao Liu and
                  Dawn Song},
  editor       = {Yoav Goldberg and
                  Zornitsa Kozareva and
                  Yue Zhang},
  title        = {{IELM:} An Open Information Extraction Benchmark for Pre-Trained Language
                  Models},
  booktitle    = {Proceedings of the 2022 Conference on Empirical Methods in Natural
                  Language Processing, {EMNLP} 2022, Abu Dhabi, United Arab Emirates,
                  December 7-11, 2022},
  pages        = {8417--8437},
  publisher    = {Association for Computational Linguistics},
  year         = {2022},
  url          = {https://doi.org/10.18653/v1/2022.emnlp-main.576},
  doi          = {10.18653/V1/2022.EMNLP-MAIN.576},
  timestamp    = {Thu, 10 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/emnlp/0001LS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/WangPS22,
  author       = {Lun Wang and
                  Iosif Pinelis and
                  Dawn Song},
  title        = {Differentially Private Fractional Frequency Moments Estimation with
                  Polylogarithmic Space},
  booktitle    = {The Tenth International Conference on Learning Representations, {ICLR}
                  2022, Virtual Event, April 25-29, 2022},
  publisher    = {OpenReview.net},
  year         = {2022},
  url          = {https://openreview.net/forum?id=7I8LPkcx8V},
  timestamp    = {Sat, 20 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/WangPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/HendrycksBMZKMS22,
  author       = {Dan Hendrycks and
                  Steven Basart and
                  Mantas Mazeika and
                  Andy Zou and
                  Joseph Kwon and
                  Mohammadreza Mostajabi and
                  Jacob Steinhardt and
                  Dawn Song},
  editor       = {Kamalika Chaudhuri and
                  Stefanie Jegelka and
                  Le Song and
                  Csaba Szepesv{\'{a}}ri and
                  Gang Niu and
                  Sivan Sabato},
  title        = {Scaling Out-of-Distribution Detection for Real-World Settings},
  booktitle    = {International Conference on Machine Learning, {ICML} 2022, 17-23 July
                  2022, Baltimore, Maryland, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {162},
  pages        = {8759--8773},
  publisher    = {{PMLR}},
  year         = {2022},
  url          = {https://proceedings.mlr.press/v162/hendrycks22a.html},
  timestamp    = {Tue, 12 Jul 2022 17:36:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/HendrycksBMZKMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/MazeikaTZBCSFSH22,
  author       = {Mantas Mazeika and
                  Eric Tang and
                  Andy Zou and
                  Steven Basart and
                  Jun Shern Chan and
                  Dawn Song and
                  David A. Forsyth and
                  Jacob Steinhardt and
                  Dan Hendrycks},
  editor       = {Sanmi Koyejo and
                  S. Mohamed and
                  A. Agarwal and
                  Danielle Belgrave and
                  K. Cho and
                  A. Oh},
  title        = {How Would The Viewer Feel? Estimating Wellbeing From Video Scenarios},
  booktitle    = {Advances in Neural Information Processing Systems 35: Annual Conference
                  on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans,
                  LA, USA, November 28 - December 9, 2022},
  year         = {2022},
  url          = {http://papers.nips.cc/paper\_files/paper/2022/hash/75ff01252ab45ce278cb060effce4ca1-Abstract-Datasets\_and\_Benchmarks.html},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/MazeikaTZBCSFSH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/ZouXJKMLSSEH22,
  author       = {Andy Zou and
                  Tristan Xiao and
                  Ryan Jia and
                  Joe Kwon and
                  Mantas Mazeika and
                  Richard Li and
                  Dawn Song and
                  Jacob Steinhardt and
                  Owain Evans and
                  Dan Hendrycks},
  editor       = {Sanmi Koyejo and
                  S. Mohamed and
                  A. Agarwal and
                  Danielle Belgrave and
                  K. Cho and
                  A. Oh},
  title        = {Forecasting Future World Events With Neural Networks},
  booktitle    = {Advances in Neural Information Processing Systems 35: Annual Conference
                  on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans,
                  LA, USA, November 28 - December 9, 2022},
  year         = {2022},
  url          = {http://papers.nips.cc/paper\_files/paper/2022/hash/aec870a6772336c15dac992c16f2e7c9-Abstract-Datasets\_and\_Benchmarks.html},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/ZouXJKMLSSEH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChenWPS0JM0S22,
  author       = {Jialuo Chen and
                  Jingyi Wang and
                  Tinglan Peng and
                  Youcheng Sun and
                  Peng Cheng and
                  Shouling Ji and
                  Xingjun Ma and
                  Bo Li and
                  Dawn Song},
  title        = {Copy, Right? {A} Testing Framework for Copyright Protection of Deep
                  Learning Models},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {824--841},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833747},
  doi          = {10.1109/SP46214.2022.9833747},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ChenWPS0JM0S22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uai/MainiCLS22,
  author       = {Pratyush Maini and
                  Xinyun Chen and
                  Bo Li and
                  Dawn Song},
  editor       = {James Cussens and
                  Kun Zhang},
  title        = {Perturbation type categorization for multiple adversarial perturbation
                  robustness},
  booktitle    = {Uncertainty in Artificial Intelligence, Proceedings of the Thirty-Eighth
                  Conference on Uncertainty in Artificial Intelligence, {UAI} 2022,
                  1-5 August 2022, Eindhoven, The Netherlands},
  series       = {Proceedings of Machine Learning Research},
  volume       = {180},
  pages        = {1317--1327},
  publisher    = {{PMLR}},
  year         = {2022},
  url          = {https://proceedings.mlr.press/v180/maini22a.html},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uai/MainiCLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangKNPSS0LS22,
  author       = {Lun Wang and
                  Usmann Khan and
                  Joseph P. Near and
                  Qi Pang and
                  Jithendaraa Subramanian and
                  Neel Somani and
                  Peng Gao and
                  Andrew Low and
                  Dawn Song},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {PrivGuard: Privacy Regulation Compliance Made Easier},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3753--3770},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/wang-lun},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WangKNPSS0LS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/consensusday/2022,
  editor       = {Jorge M. Soares and
                  Dawn Song and
                  Marko Vukolic},
  title        = {Proceedings of the 2022 {ACM} Workshop on Developments in Consensus,
                  ConsensusDay 2022, Los Angeles, CA, USA, 7 November 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560829},
  doi          = {10.1145/3560829},
  isbn         = {978-1-4503-9879-4},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/consensusday/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-07920,
  author       = {Bennet Yee and
                  Dawn Song and
                  Patrick McCorry and
                  Chris Buckland},
  title        = {Shades of Finality and Layer 2 Scaling},
  journal      = {CoRR},
  volume       = {abs/2201.07920},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.07920},
  eprinttype    = {arXiv},
  eprint       = {2201.07920},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-07920.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-07147,
  author       = {Sarah E. Chasins and
                  Alvin Cheung and
                  Natacha Crooks and
                  Ali Ghodsi and
                  Ken Goldberg and
                  Joseph E. Gonzalez and
                  Joseph M. Hellerstein and
                  Michael I. Jordan and
                  Anthony D. Joseph and
                  Michael W. Mahoney and
                  Aditya G. Parameswaran and
                  David A. Patterson and
                  Raluca Ada Popa and
                  Koushik Sen and
                  Scott Shenker and
                  Dawn Song and
                  Ion Stoica},
  title        = {The Sky Above The Clouds},
  journal      = {CoRR},
  volume       = {abs/2205.07147},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.07147},
  doi          = {10.48550/ARXIV.2205.07147},
  eprinttype    = {arXiv},
  eprint       = {2205.07147},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-07147.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-10475,
  author       = {Chenguang Wang and
                  Xiao Liu and
                  Zui Chen and
                  Haoyun Hong and
                  Jie Tang and
                  Dawn Song},
  title        = {DeepStruct: Pretraining of Language Models for Structure Prediction},
  journal      = {CoRR},
  volume       = {abs/2205.10475},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.10475},
  doi          = {10.48550/ARXIV.2205.10475},
  eprinttype    = {arXiv},
  eprint       = {2205.10475},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-10475.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-11765,
  author       = {Banghua Zhu and
                  Lun Wang and
                  Qi Pang and
                  Shuai Wang and
                  Jiantao Jiao and
                  Dawn Song and
                  Michael I. Jordan},
  title        = {Byzantine-Robust Federated Learning with Optimal Statistical Rates
                  and Privacy Guarantees},
  journal      = {CoRR},
  volume       = {abs/2205.11765},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.11765},
  doi          = {10.48550/ARXIV.2205.11765},
  eprinttype    = {arXiv},
  eprint       = {2205.11765},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-11765.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-15474,
  author       = {Andy Zou and
                  Tristan Xiao and
                  Ryan Jia and
                  Joe Kwon and
                  Mantas Mazeika and
                  Richard Li and
                  Dawn Song and
                  Jacob Steinhardt and
                  Owain Evans and
                  Dan Hendrycks},
  title        = {Forecasting Future World Events with Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2206.15474},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.15474},
  doi          = {10.48550/ARXIV.2206.15474},
  eprinttype    = {arXiv},
  eprint       = {2206.15474},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-15474.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-09087,
  author       = {Yuzheng Hu and
                  Tianle Cai and
                  Jinyong Shan and
                  Shange Tang and
                  Chaochao Cai and
                  Ethan Song and
                  Bo Li and
                  Dawn Song},
  title        = {Is Vertical Logistic Regression Privacy-Preserving? {A} Comprehensive
                  Privacy Analysis and Beyond},
  journal      = {CoRR},
  volume       = {abs/2207.09087},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.09087},
  doi          = {10.48550/ARXIV.2207.09087},
  eprinttype    = {arXiv},
  eprint       = {2207.09087},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-09087.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-10308,
  author       = {Xiaoyuan Liu and
                  Tianneng Shi and
                  Chulin Xie and
                  Qinbin Li and
                  Kangping Hu and
                  Haoyu Kim and
                  Xiaojun Xu and
                  Bo Li and
                  Dawn Song},
  title        = {UniFed: {A} Benchmark for Federated Learning Frameworks},
  journal      = {CoRR},
  volume       = {abs/2207.10308},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.10308},
  doi          = {10.48550/ARXIV.2207.10308},
  eprinttype    = {arXiv},
  eprint       = {2207.10308},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-10308.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-13176,
  author       = {Vivek Nair and
                  Gonzalo Munilla Garrido and
                  Dawn Song},
  title        = {Exploring the Unprecedented Privacy Risks of the Metaverse},
  journal      = {CoRR},
  volume       = {abs/2207.13176},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.13176},
  doi          = {10.48550/ARXIV.2207.13176},
  eprinttype    = {arXiv},
  eprint       = {2207.13176},
  timestamp    = {Mon, 01 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-13176.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-05586,
  author       = {Vivek Nair and
                  Dawn Song},
  title        = {Multi-Factor Key Derivation Function {(MFKDF)}},
  journal      = {CoRR},
  volume       = {abs/2208.05586},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.05586},
  doi          = {10.48550/ARXIV.2208.05586},
  eprinttype    = {arXiv},
  eprint       = {2208.05586},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-05586.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-05604,
  author       = {Vivek Nair and
                  Gonzalo Munilla Garrido and
                  Dawn Song},
  title        = {Going Incognito in the Metaverse},
  journal      = {CoRR},
  volume       = {abs/2208.05604},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.05604},
  doi          = {10.48550/ARXIV.2208.05604},
  eprinttype    = {arXiv},
  eprint       = {2208.05604},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-05604.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-13035,
  author       = {Liyi Zhou and
                  Xihan Xiong and
                  Jens Ernstberger and
                  Stefanos Chaliasos and
                  Zhipeng Wang and
                  Ye Wang and
                  Kaihua Qin and
                  Roger Wattenhofer and
                  Dawn Song and
                  Arthur Gervais},
  title        = {SoK: Decentralized Finance (DeFi) Incidents},
  journal      = {CoRR},
  volume       = {abs/2208.13035},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.13035},
  doi          = {10.48550/ARXIV.2208.13035},
  eprinttype    = {arXiv},
  eprint       = {2208.13035},
  timestamp    = {Thu, 01 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-13035.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-08721,
  author       = {Jianhao Shen and
                  Chenguang Wang and
                  Linyuan Gong and
                  Dawn Song},
  title        = {Joint Language Semantic and Structure Embedding for Knowledge Graph
                  Completion},
  journal      = {CoRR},
  volume       = {abs/2209.08721},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.08721},
  doi          = {10.48550/ARXIV.2209.08721},
  eprinttype    = {arXiv},
  eprint       = {2209.08721},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-08721.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-15253,
  author       = {Dayeol Lee and
                  Kevin Cheang and
                  Alexander Thomas and
                  Catherine Lu and
                  Pranav Gaddamadugu and
                  Anjo Vahldiek{-}Oberwagner and
                  Mona Vij and
                  Dawn Song and
                  Sanjit A. Seshia and
                  Krste Asanovic},
  title        = {Cerberus: {A} Formal Approach to Secure and Efficient Enclave Memory
                  Sharing},
  journal      = {CoRR},
  volume       = {abs/2209.15253},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.15253},
  doi          = {10.48550/ARXIV.2209.15253},
  eprinttype    = {arXiv},
  eprint       = {2209.15253},
  timestamp    = {Thu, 06 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-15253.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-00264,
  author       = {Tiancheng Xie and
                  Jiaheng Zhang and
                  Zerui Cheng and
                  Fan Zhang and
                  Yupeng Zhang and
                  Yongzheng Jia and
                  Dan Boneh and
                  Dawn Song},
  title        = {zkBridge: Trustless Cross-chain Bridges Made Practical},
  journal      = {CoRR},
  volume       = {abs/2210.00264},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.00264},
  doi          = {10.48550/ARXIV.2210.00264},
  eprinttype    = {arXiv},
  eprint       = {2210.00264},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-00264.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-10039,
  author       = {Mantas Mazeika and
                  Eric Tang and
                  Andy Zou and
                  Steven Basart and
                  Jun Shern Chan and
                  Dawn Song and
                  David A. Forsyth and
                  Jacob Steinhardt and
                  Dan Hendrycks},
  title        = {How Would The Viewer Feel? Estimating Wellbeing From Video Scenarios},
  journal      = {CoRR},
  volume       = {abs/2210.10039},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.10039},
  doi          = {10.48550/ARXIV.2210.10039},
  eprinttype    = {arXiv},
  eprint       = {2210.10039},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-10039.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-13715,
  author       = {Jianhao Shen and
                  Chenguang Wang and
                  Ye Yuan and
                  Jiawei Han and
                  Heng Ji and
                  Koushik Sen and
                  Ming Zhang and
                  Dawn Song},
  title        = {{PALT:} Parameter-Lite Transfer of Language Models for Knowledge Graph
                  Completion},
  journal      = {CoRR},
  volume       = {abs/2210.13715},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.13715},
  doi          = {10.48550/ARXIV.2210.13715},
  eprinttype    = {arXiv},
  eprint       = {2210.13715},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-13715.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-14128,
  author       = {Chenguang Wang and
                  Xiao Liu and
                  Dawn Song},
  title        = {{IELM:} An Open Information Extraction Benchmark for Pre-Trained Language
                  Models},
  journal      = {CoRR},
  volume       = {abs/2210.14128},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.14128},
  doi          = {10.48550/ARXIV.2210.14128},
  eprinttype    = {arXiv},
  eprint       = {2210.14128},
  timestamp    = {Mon, 31 Oct 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-14128.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-14473,
  author       = {Da Shen and
                  Xinyun Chen and
                  Chenguang Wang and
                  Koushik Sen and
                  Dawn Song},
  title        = {Benchmarking Language Models for Code Syntax Understanding},
  journal      = {CoRR},
  volume       = {abs/2210.14473},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.14473},
  doi          = {10.48550/ARXIV.2210.14473},
  eprinttype    = {arXiv},
  eprint       = {2210.14473},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-14473.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-00322,
  author       = {Chaowei Xiao and
                  Zhongzhu Chen and
                  Kun Jin and
                  Jiongxiao Wang and
                  Weili Nie and
                  Mingyan Liu and
                  Anima Anandkumar and
                  Bo Li and
                  Dawn Song},
  title        = {DensePure: Understanding Diffusion Models towards Adversarial Robustness},
  journal      = {CoRR},
  volume       = {abs/2211.00322},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.00322},
  doi          = {10.48550/ARXIV.2211.00322},
  eprinttype    = {arXiv},
  eprint       = {2211.00322},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-00322.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-03898,
  author       = {Gonzalo Munilla Garrido and
                  Xiaoyuan Liu and
                  Florian Matthes and
                  Dawn Song},
  title        = {Lessons Learned: Surveying the Practicality of Differential Privacy
                  in the Industry},
  journal      = {CoRR},
  volume       = {abs/2211.03898},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.03898},
  doi          = {10.48550/ARXIV.2211.03898},
  eprinttype    = {arXiv},
  eprint       = {2211.03898},
  timestamp    = {Wed, 09 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-03898.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-05219,
  author       = {Zhe Ye and
                  Ujval Misra and
                  Dawn Song},
  title        = {Specular: Towards Trust-minimized Blockchain Execution Scalability
                  with EVM-native Fraud Proofs},
  journal      = {CoRR},
  volume       = {abs/2212.05219},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.05219},
  doi          = {10.48550/ARXIV.2212.05219},
  eprinttype    = {arXiv},
  eprint       = {2212.05219},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-05219.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-10388,
  author       = {Peng Gao and
                  Xiaoyuan Liu and
                  Edward Choi and
                  Sibo Ma and
                  Xinyu Yang and
                  Zhengjie Ji and
                  Zilin Zhang and
                  Dawn Song},
  title        = {ThreatKG: {A} Threat Knowledge Graph for Automated Open-Source Cyber
                  Threat Intelligence Gathering and Management},
  journal      = {CoRR},
  volume       = {abs/2212.10388},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.10388},
  doi          = {10.48550/ARXIV.2212.10388},
  eprinttype    = {arXiv},
  eprint       = {2212.10388},
  timestamp    = {Wed, 04 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-10388.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xie0S22,
  author       = {Tiancheng Xie and
                  Yupeng Zhang and
                  Dawn Song},
  title        = {Orion: Zero Knowledge Proof with Linear Prover Time},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1010},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1010},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xie0S22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RatheePXCS22,
  author       = {Deevashwer Rathee and
                  Guru{-}Vamsi Policharla and
                  Tiancheng Xie and
                  Ryan Cottone and
                  Dawn Song},
  title        = {{ZEBRA:} Anonymous Credentials with Practical On-chain Verification
                  and Applications to {KYC} in DeFi},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1286},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1286},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RatheePXCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouXECWWQWSG22,
  author       = {Liyi Zhou and
                  Xihan Xiong and
                  Jens Ernstberger and
                  Stefanos Chaliasos and
                  Zhipeng Wang and
                  Ye Wang and
                  Kaihua Qin and
                  Roger Wattenhofer and
                  Dawn Song and
                  Arthur Gervais},
  title        = {SoK: Decentralized Finance (DeFi) Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1773},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1773},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouXECWWQWSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftml/KairouzMABBBBCC21,
  author       = {Peter Kairouz and
                  H. Brendan McMahan and
                  Brendan Avent and
                  Aur{\'{e}}lien Bellet and
                  Mehdi Bennis and
                  Arjun Nitin Bhagoji and
                  Kallista A. Bonawitz and
                  Zachary Charles and
                  Graham Cormode and
                  Rachel Cummings and
                  Rafael G. L. D'Oliveira and
                  Hubert Eichner and
                  Salim El Rouayheb and
                  David Evans and
                  Josh Gardner and
                  Zachary Garrett and
                  Adri{\`{a}} Gasc{\'{o}}n and
                  Badih Ghazi and
                  Phillip B. Gibbons and
                  Marco Gruteser and
                  Za{\"{\i}}d Harchaoui and
                  Chaoyang He and
                  Lie He and
                  Zhouyuan Huo and
                  Ben Hutchinson and
                  Justin Hsu and
                  Martin Jaggi and
                  Tara Javidi and
                  Gauri Joshi and
                  Mikhail Khodak and
                  Jakub Kone{\v{c}}n{\'y} and
                  Aleksandra Korolova and
                  Farinaz Koushanfar and
                  Sanmi Koyejo and
                  Tancr{\`{e}}de Lepoint and
                  Yang Liu and
                  Prateek Mittal and
                  Mehryar Mohri and
                  Richard Nock and
                  Ayfer {\"{O}}zg{\"{u}}r and
                  Rasmus Pagh and
                  Hang Qi and
                  Daniel Ramage and
                  Ramesh Raskar and
                  Mariana Raykova and
                  Dawn Song and
                  Weikang Song and
                  Sebastian U. Stich and
                  Ziteng Sun and
                  Ananda Theertha Suresh and
                  Florian Tram{\`{e}}r and
                  Praneeth Vepakomma and
                  Jianyu Wang and
                  Li Xiong and
                  Zheng Xu and
                  Qiang Yang and
                  Felix X. Yu and
                  Han Yu and
                  Sen Zhao},
  title        = {Advances and Open Problems in Federated Learning},
  journal      = {Found. Trends Mach. Learn.},
  volume       = {14},
  number       = {1-2},
  pages        = {1--210},
  year         = {2021},
  url          = {https://doi.org/10.1561/2200000083},
  doi          = {10.1561/2200000083},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftml/KairouzMABBBBCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WangWWLZSJ21,
  author       = {Wenxiao Wang and
                  Tianhao Wang and
                  Lun Wang and
                  Nanqing Luo and
                  Pan Zhou and
                  Dawn Song and
                  Ruoxi Jia},
  title        = {DPlis: Boosting Utility of Differentially Private Deep Learning via
                  Randomized Smoothing},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {4},
  pages        = {163--183},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0065},
  doi          = {10.2478/POPETS-2021-0065},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/WangWWLZSJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acl/ChenGCS20,
  author       = {Xinyun Chen and
                  Linyuan Gong and
                  Alvin Cheung and
                  Dawn Song},
  editor       = {Chengqing Zong and
                  Fei Xia and
                  Wenjie Li and
                  Roberto Navigli},
  title        = {PlotCoder: Hierarchical Decoding for Synthesizing Visualization Code
                  in Programmatic Context},
  booktitle    = {Proceedings of the 59th Annual Meeting of the Association for Computational
                  Linguistics and the 11th International Joint Conference on Natural
                  Language Processing, {ACL/IJCNLP} 2021, (Volume 1: Long Papers), Virtual
                  Event, August 1-6, 2021},
  pages        = {2169--2181},
  publisher    = {Association for Computational Linguistics},
  year         = {2021},
  url          = {https://doi.org/10.18653/v1/2021.acl-long.169},
  doi          = {10.18653/V1/2021.ACL-LONG.169},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acl/ChenGCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/Chen0BDJLS21,
  author       = {Xinyun Chen and
                  Wenxiao Wang and
                  Chris Bender and
                  Yiming Ding and
                  Ruoxi Jia and
                  Bo Li and
                  Dawn Song},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {{REFIT:} {A} Unified Watermark Removal Framework For Deep Learning
                  Systems With Limited Data},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {321--335},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453079},
  doi          = {10.1145/3433210.3453079},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiaccs/Chen0BDJLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Song21,
  author       = {Dawn Song},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Towards Building a Responsible Data Economy},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3482789},
  doi          = {10.1145/3460120.3482789},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Song21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangLWZSXZ21,
  author       = {Jiaheng Zhang and
                  Tianyi Liu and
                  Weijie Wang and
                  Yinuo Zhang and
                  Dawn Song and
                  Xiang Xie and
                  Yupeng Zhang},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Doubly Efficient Interactive Proofs for General Arithmetic Circuits
                  with Linear Prover Time},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {159--177},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484767},
  doi          = {10.1145/3460120.3484767},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangLWZSXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/Jia0SXDK00S21,
  author       = {Ruoxi Jia and
                  Fan Wu and
                  Xuehui Sun and
                  Jiacen Xu and
                  David Dao and
                  Bhavya Kailkhura and
                  Ce Zhang and
                  Bo Li and
                  Dawn Song},
  title        = {Scalability vs. Utility: Do We Have To Sacrifice One for the Other
                  in Data Importance Quantification?},
  booktitle    = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR}
                  2021, virtual, June 19-25, 2021},
  pages        = {8239--8247},
  publisher    = {Computer Vision Foundation / {IEEE}},
  year         = {2021},
  url          = {https://openaccess.thecvf.com/content/CVPR2021/html/Jia\_Scalability\_vs.\_Utility\_Do\_We\_Have\_To\_Sacrifice\_One\_for\_CVPR\_2021\_paper.html},
  doi          = {10.1109/CVPR46437.2021.00814},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/Jia0SXDK00S21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/LiHS21,
  author       = {Qinbin Li and
                  Bingsheng He and
                  Dawn Song},
  title        = {Model-Contrastive Federated Learning},
  booktitle    = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR}
                  2021, virtual, June 19-25, 2021},
  pages        = {10713--10722},
  publisher    = {Computer Vision Foundation / {IEEE}},
  year         = {2021},
  url          = {https://openaccess.thecvf.com/content/CVPR2021/html/Li\_Model-Contrastive\_Federated\_Learning\_CVPR\_2021\_paper.html},
  doi          = {10.1109/CVPR46437.2021.01057},
  timestamp    = {Mon, 18 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/LiHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/HendrycksZBSS21,
  author       = {Dan Hendrycks and
                  Kevin Zhao and
                  Steven Basart and
                  Jacob Steinhardt and
                  Dawn Song},
  title        = {Natural Adversarial Examples},
  booktitle    = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR}
                  2021, virtual, June 19-25, 2021},
  pages        = {15262--15271},
  publisher    = {Computer Vision Foundation / {IEEE}},
  year         = {2021},
  url          = {https://openaccess.thecvf.com/content/CVPR2021/html/Hendrycks\_Natural\_Adversarial\_Examples\_CVPR\_2021\_paper.html},
  doi          = {10.1109/CVPR46437.2021.01501},
  timestamp    = {Mon, 18 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/HendrycksZBSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/WangLCH0S21,
  author       = {Chenguang Wang and
                  Xiao Liu and
                  Zui Chen and
                  Haoyun Hong and
                  Jie Tang and
                  Dawn Song},
  editor       = {Marie{-}Francine Moens and
                  Xuanjing Huang and
                  Lucia Specia and
                  Scott Wen{-}tau Yih},
  title        = {Zero-Shot Information Extraction as a Unified Text-to-Triple Translation},
  booktitle    = {Proceedings of the 2021 Conference on Empirical Methods in Natural
                  Language Processing, {EMNLP} 2021, Virtual Event / Punta Cana, Dominican
                  Republic, 7-11 November, 2021},
  pages        = {1225--1238},
  publisher    = {Association for Computational Linguistics},
  year         = {2021},
  url          = {https://doi.org/10.18653/v1/2021.emnlp-main.94},
  doi          = {10.18653/V1/2021.EMNLP-MAIN.94},
  timestamp    = {Fri, 16 Feb 2024 08:27:36 +0100},
  biburl       = {https://dblp.org/rec/conf/emnlp/WangLCH0S21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/Gai0Z0SS21,
  author       = {Yu Gai and
                  Paras Jain and
                  Wendi Zhang and
                  Joseph Gonzalez and
                  Dawn Song and
                  Ion Stoica},
  editor       = {Marie{-}Francine Moens and
                  Xuanjing Huang and
                  Lucia Specia and
                  Scott Wen{-}tau Yih},
  title        = {Grounded Graph Decoding improves Compositional Generalization in Question
                  Answering},
  booktitle    = {Findings of the Association for Computational Linguistics: {EMNLP}
                  2021, Virtual Event / Punta Cana, Dominican Republic, 16-20 November,
                  2021},
  pages        = {1829--1838},
  publisher    = {Association for Computational Linguistics},
  year         = {2021},
  url          = {https://doi.org/10.18653/v1/2021.findings-emnlp.157},
  doi          = {10.18653/V1/2021.FINDINGS-EMNLP.157},
  timestamp    = {Fri, 16 Feb 2024 08:27:36 +0100},
  biburl       = {https://dblp.org/rec/conf/emnlp/Gai0Z0SS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccv/HendrycksBMKWDD21,
  author       = {Dan Hendrycks and
                  Steven Basart and
                  Norman Mu and
                  Saurav Kadavath and
                  Frank Wang and
                  Evan Dorundo and
                  Rahul Desai and
                  Tyler Zhu and
                  Samyak Parajuli and
                  Mike Guo and
                  Dawn Song and
                  Jacob Steinhardt and
                  Justin Gilmer},
  title        = {The Many Faces of Robustness: {A} Critical Analysis of Out-of-Distribution
                  Generalization},
  booktitle    = {2021 {IEEE/CVF} International Conference on Computer Vision, {ICCV}
                  2021, Montreal, QC, Canada, October 10-17, 2021},
  pages        = {8320--8329},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCV48922.2021.00823},
  doi          = {10.1109/ICCV48922.2021.00823},
  timestamp    = {Fri, 11 Mar 2022 10:01:27 +0100},
  biburl       = {https://dblp.org/rec/conf/iccv/HendrycksBMKWDD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/GaoSLXQXMKS21,
  author       = {Peng Gao and
                  Fei Shao and
                  Xiaoyuan Liu and
                  Xusheng Xiao and
                  Zheng Qin and
                  Fengyuan Xu and
                  Prateek Mittal and
                  Sanjeev R. Kulkarni and
                  Dawn Song},
  title        = {Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence},
  booktitle    = {37th {IEEE} International Conference on Data Engineering, {ICDE} 2021,
                  Chania, Greece, April 19-22, 2021},
  pages        = {193--204},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICDE51399.2021.00024},
  doi          = {10.1109/ICDE51399.2021.00024},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icde/GaoSLXQXMKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/GaoSLXLQXMKS21,
  author       = {Peng Gao and
                  Fei Shao and
                  Xiaoyuan Liu and
                  Xusheng Xiao and
                  Haoyuan Liu and
                  Zheng Qin and
                  Fengyuan Xu and
                  Prateek Mittal and
                  Sanjeev R. Kulkarni and
                  Dawn Song},
  title        = {A System for Efficiently Hunting for Cyber Threats in Computer Systems
                  Using Threat Intelligence},
  booktitle    = {37th {IEEE} International Conference on Data Engineering, {ICDE} 2021,
                  Chania, Greece, April 19-22, 2021},
  pages        = {2705--2708},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICDE51399.2021.00309},
  doi          = {10.1109/ICDE51399.2021.00309},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icde/GaoSLXLQXMKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/HendrycksBBC0SS21,
  author       = {Dan Hendrycks and
                  Collin Burns and
                  Steven Basart and
                  Andrew Critch and
                  Jerry Li and
                  Dawn Song and
                  Jacob Steinhardt},
  title        = {Aligning {AI} With Shared Human Values},
  booktitle    = {9th International Conference on Learning Representations, {ICLR} 2021,
                  Virtual Event, Austria, May 3-7, 2021},
  publisher    = {OpenReview.net},
  year         = {2021},
  url          = {https://openreview.net/forum?id=dNy\_RKzJacY},
  timestamp    = {Wed, 23 Jun 2021 17:36:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/HendrycksBBC0SS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/HendrycksBBZMSS21,
  author       = {Dan Hendrycks and
                  Collin Burns and
                  Steven Basart and
                  Andy Zou and
                  Mantas Mazeika and
                  Dawn Song and
                  Jacob Steinhardt},
  title        = {Measuring Massive Multitask Language Understanding},
  booktitle    = {9th International Conference on Learning Representations, {ICLR} 2021,
                  Virtual Event, Austria, May 3-7, 2021},
  publisher    = {OpenReview.net},
  year         = {2021},
  url          = {https://openreview.net/forum?id=d7KBjmI3GmQ},
  timestamp    = {Wed, 23 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/HendrycksBBZMSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/LiZGZZSS21,
  author       = {Zhuohan Li and
                  Siyuan Zhuang and
                  Shiyuan Guo and
                  Danyang Zhuo and
                  Hao Zhang and
                  Dawn Song and
                  Ion Stoica},
  editor       = {Marina Meila and
                  Tong Zhang},
  title        = {TeraPipe: Token-Level Pipeline Parallelism for Training Large-Scale
                  Language Models},
  booktitle    = {Proceedings of the 38th International Conference on Machine Learning,
                  {ICML} 2021, 18-24 July 2021, Virtual Event},
  series       = {Proceedings of Machine Learning Research},
  volume       = {139},
  pages        = {6543--6552},
  publisher    = {{PMLR}},
  year         = {2021},
  url          = {http://proceedings.mlr.press/v139/li21y.html},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icml/LiZGZZSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/LiHS21,
  author       = {Qinbin Li and
                  Bingsheng He and
                  Dawn Song},
  editor       = {Zhi{-}Hua Zhou},
  title        = {Practical One-Shot Federated Learning for Cross-Silo Setting},
  booktitle    = {Proceedings of the Thirtieth International Joint Conference on Artificial
                  Intelligence, {IJCAI} 2021, Virtual Event / Montreal, Canada, 19-27
                  August 2021},
  pages        = {1484--1490},
  publisher    = {ijcai.org},
  year         = {2021},
  url          = {https://doi.org/10.24963/ijcai.2021/205},
  doi          = {10.24963/IJCAI.2021/205},
  timestamp    = {Wed, 25 Aug 2021 17:11:16 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/LiHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/WangJW0XS21,
  author       = {Lun Wang and
                  Zaynah Javed and
                  Xian Wu and
                  Wenbo Guo and
                  Xinyu Xing and
                  Dawn Song},
  editor       = {Zhi{-}Hua Zhou},
  title        = {{BACKDOORL:} Backdoor Attack against Competitive Reinforcement Learning},
  booktitle    = {Proceedings of the Thirtieth International Joint Conference on Artificial
                  Intelligence, {IJCAI} 2021, Virtual Event / Montreal, Canada, 19-27
                  August 2021},
  pages        = {3699--3705},
  publisher    = {ijcai.org},
  year         = {2021},
  url          = {https://doi.org/10.24963/ijcai.2021/509},
  doi          = {10.24963/IJCAI.2021/509},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/WangJW0XS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/LiuCLXYLSTYA21,
  author       = {Aishan Liu and
                  Xinyun Chen and
                  Yingwei Li and
                  Chaowei Xiao and
                  Xun Yang and
                  Xianglong Liu and
                  Dawn Song and
                  Dacheng Tao and
                  Alan L. Yuille and
                  Anima Anandkumar},
  editor       = {Heng Tao Shen and
                  Yueting Zhuang and
                  John R. Smith and
                  Yang Yang and
                  Pablo C{\'{e}}sar and
                  Florian Metze and
                  Balakrishnan Prabhakaran},
  title        = {ADVM'21: 1st International Workshop on Adversarial Learning for Multimedia},
  booktitle    = {{MM} '21: {ACM} Multimedia Conference, Virtual Event, China, October
                  20 - 24, 2021},
  pages        = {5686--5687},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474085.3478572},
  doi          = {10.1145/3474085.3478572},
  timestamp    = {Mon, 22 Apr 2024 21:24:20 +0200},
  biburl       = {https://dblp.org/rec/conf/mm/LiuCLXYLSTYA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/HendrycksBKABTS21,
  author       = {Dan Hendrycks and
                  Collin Burns and
                  Saurav Kadavath and
                  Akul Arora and
                  Steven Basart and
                  Eric Tang and
                  Dawn Song and
                  Jacob Steinhardt},
  editor       = {Joaquin Vanschoren and
                  Sai{-}Kit Yeung},
  title        = {Measuring Mathematical Problem Solving With the {MATH} Dataset},
  booktitle    = {Proceedings of the Neural Information Processing Systems Track on
                  Datasets and Benchmarks 1, NeurIPS Datasets and Benchmarks 2021, December
                  2021, virtual},
  year         = {2021},
  url          = {https://datasets-benchmarks-proceedings.neurips.cc/paper/2021/hash/be83ab3ecd0db773eb2dc1b0a17836a1-Abstract-round2.html},
  timestamp    = {Thu, 05 May 2022 16:30:03 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/HendrycksBKABTS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/HendrycksBKMAGB21,
  author       = {Dan Hendrycks and
                  Steven Basart and
                  Saurav Kadavath and
                  Mantas Mazeika and
                  Akul Arora and
                  Ethan Guo and
                  Collin Burns and
                  Samir Puranik and
                  Horace He and
                  Dawn Song and
                  Jacob Steinhardt},
  editor       = {Joaquin Vanschoren and
                  Sai{-}Kit Yeung},
  title        = {Measuring Coding Challenge Competence With {APPS}},
  booktitle    = {Proceedings of the Neural Information Processing Systems Track on
                  Datasets and Benchmarks 1, NeurIPS Datasets and Benchmarks 2021, December
                  2021, virtual},
  year         = {2021},
  url          = {https://datasets-benchmarks-proceedings.neurips.cc/paper/2021/hash/c24cd76e1ce41366a4bbe8a49b02a028-Abstract-round2.html},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/HendrycksBKMAGB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/HendrycksMZPZNS21,
  author       = {Dan Hendrycks and
                  Mantas Mazeika and
                  Andy Zou and
                  Sahil Patel and
                  Christine Zhu and
                  Jesus Navarro and
                  Dawn Song and
                  Bo Li and
                  Jacob Steinhardt},
  editor       = {Joaquin Vanschoren and
                  Sai{-}Kit Yeung},
  title        = {What Would Jiminy Cricket Do? Towards Agents That Behave Morally},
  booktitle    = {Proceedings of the Neural Information Processing Systems Track on
                  Datasets and Benchmarks 1, NeurIPS Datasets and Benchmarks 2021, December
                  2021, virtual},
  year         = {2021},
  url          = {https://datasets-benchmarks-proceedings.neurips.cc/paper/2021/hash/39059724f73a9969845dfe4146c5660e-Abstract-round2.html},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/HendrycksMZPZNS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/MazeikaHLXHZRYWTTTSPBSPLF21,
  author       = {Mantas Mazeika and
                  Dan Hendrycks and
                  Huichen Li and
                  Xiaojun Xu and
                  Sidney Q. Hough and
                  Andy Zou and
                  Arezoo Rajabi and
                  Qi Yao and
                  Zihao Wang and
                  Jian Tian and
                  Yao Tang and
                  Di Tang and
                  Roman Smirnov and
                  Pavel Pleskov and
                  Nikita Benkovich and
                  Dawn Song and
                  Radha Poovendran and
                  Bo Li and
                  David A. Forsyth},
  editor       = {Marco Ciccone and
                  Gustavo Stolovitzky and
                  Jacob Albrecht},
  title        = {The Trojan Detection Challenge},
  booktitle    = {NeurIPS 2022 Competition Track, November 28 - December 9, 2022, Online},
  series       = {Proceedings of Machine Learning Research},
  volume       = {220},
  pages        = {279--291},
  publisher    = {{PMLR}},
  year         = {2021},
  url          = {https://proceedings.mlr.press/v220/mazeika22a.html},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/MazeikaHLXHZRYWTTTSPBSPLF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/SitawarinKSW21,
  author       = {Chawin Sitawarin and
                  Evgenios M. Kornaropoulos and
                  Dawn Song and
                  David A. Wagner},
  editor       = {Marc'Aurelio Ranzato and
                  Alina Beygelzimer and
                  Yann N. Dauphin and
                  Percy Liang and
                  Jennifer Wortman Vaughan},
  title        = {Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order
                  Voronoi Diagrams},
  booktitle    = {Advances in Neural Information Processing Systems 34: Annual Conference
                  on Neural Information Processing Systems 2021, NeurIPS 2021, December
                  6-14, 2021, virtual},
  pages        = {15486--15497},
  year         = {2021},
  url          = {https://proceedings.neurips.cc/paper/2021/hash/82ca5dd156cc926b2992f73c2896f761-Abstract.html},
  timestamp    = {Tue, 03 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/SitawarinKSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/ChenST21,
  author       = {Xinyun Chen and
                  Dawn Song and
                  Yuandong Tian},
  editor       = {Marc'Aurelio Ranzato and
                  Alina Beygelzimer and
                  Yann N. Dauphin and
                  Percy Liang and
                  Jennifer Wortman Vaughan},
  title        = {Latent Execution for Neural Program Synthesis Beyond Domain-Specific
                  Languages},
  booktitle    = {Advances in Neural Information Processing Systems 34: Annual Conference
                  on Neural Information Processing Systems 2021, NeurIPS 2021, December
                  6-14, 2021, virtual},
  pages        = {22196--22208},
  year         = {2021},
  url          = {https://proceedings.neurips.cc/paper/2021/hash/ba3c95c2962d3aab2f6e667932daa3c5-Abstract.html},
  timestamp    = {Tue, 03 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/ChenST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/GaoLCSMFS21,
  author       = {Peng Gao and
                  Xiaoyuan Liu and
                  Edward Choi and
                  Bhavna Soman and
                  Chinmaya Mishra and
                  Kate Farris and
                  Dawn Song},
  editor       = {Guoliang Li and
                  Zhanhuai Li and
                  Stratos Idreos and
                  Divesh Srivastava},
  title        = {A System for Automated Open-Source Threat Intelligence Gathering and
                  Management},
  booktitle    = {{SIGMOD} '21: International Conference on Management of Data, Virtual
                  Event, China, June 20-25, 2021},
  pages        = {2716--2720},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448016.3452745},
  doi          = {10.1145/3448016.3452745},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmod/GaoLCSMFS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CarliniTWJHLRBS21,
  author       = {Nicholas Carlini and
                  Florian Tram{\`{e}}r and
                  Eric Wallace and
                  Matthew Jagielski and
                  Ariel Herbert{-}Voss and
                  Katherine Lee and
                  Adam Roberts and
                  Tom B. Brown and
                  Dawn Song and
                  {\'{U}}lfar Erlingsson and
                  Alina Oprea and
                  Colin Raffel},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Extracting Training Data from Large Language Models},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2633--2650},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/carlini-extracting},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CarliniTWJHLRBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2021defi,
  editor       = {Dawn Song and
                  Roger Wattenhofer and
                  Arthur Gervais and
                  Philipp Jovanovic},
  title        = {DeFi '21: Proceedings of the 2021 {ACM} {CCS} Workshop on Decentralized
                  Finance and Security, Virtual Event, Republic of Korea, 19 November
                  2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3464967},
  doi          = {10.1145/3464967},
  isbn         = {978-1-4503-8540-4},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2021defi.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mm/2021advm,
  editor       = {Dawn Song and
                  Dacheng Tao and
                  Alan L. Yuille and
                  Anima Anandkumar and
                  Aishan Liu and
                  Xinyun Chen and
                  Yingwei Li and
                  Chaowei Xiao and
                  Xun Yang and
                  Xianglong Liu},
  title        = {{ADVM} '21: Proceedings of the 1st International Workshop on Adversarial
                  Learning for Multimedia, Virtual Event, China, 20 October 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3475724},
  doi          = {10.1145/3475724},
  isbn         = {978-1-4503-8672-2},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mm/2021advm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-06761,
  author       = {Peng Gao and
                  Fei Shao and
                  Xiaoyuan Liu and
                  Xusheng Xiao and
                  Haoyuan Liu and
                  Zheng Qin and
                  Fengyuan Xu and
                  Prateek Mittal and
                  Sanjeev R. Kulkarni and
                  Dawn Song},
  title        = {A System for Efficiently Hunting for Cyber Threats in Computer Systems
                  Using Threat Intelligence},
  journal      = {CoRR},
  volume       = {abs/2101.06761},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.06761},
  eprinttype    = {arXiv},
  eprint       = {2101.06761},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-06761.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-07769,
  author       = {Peng Gao and
                  Xiaoyuan Liu and
                  Edward Choi and
                  Bhavna Soman and
                  Chinmaya Mishra and
                  Kate Farris and
                  Dawn Song},
  title        = {A System for Automated Open-Source Threat Intelligence Gathering and
                  Management},
  journal      = {CoRR},
  volume       = {abs/2101.07769},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.07769},
  eprinttype    = {arXiv},
  eprint       = {2101.07769},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-07769.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-07988,
  author       = {Zhuohan Li and
                  Siyuan Zhuang and
                  Shiyuan Guo and
                  Danyang Zhuo and
                  Hao Zhang and
                  Dawn Song and
                  Ion Stoica},
  title        = {TeraPipe: Token-Level Pipeline Parallelism for Training Large-Scale
                  Language Models},
  journal      = {CoRR},
  volume       = {abs/2102.07988},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.07988},
  eprinttype    = {arXiv},
  eprint       = {2102.07988},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-07988.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-01496,
  author       = {Wenxiao Wang and
                  Tianhao Wang and
                  Lun Wang and
                  Nanqing Luo and
                  Pan Zhou and
                  Dawn Song and
                  Ruoxi Jia},
  title        = {DPlis: Boosting Utility of Differentially Private Deep Learning via
                  Randomized Smoothing},
  journal      = {CoRR},
  volume       = {abs/2103.01496},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.01496},
  eprinttype    = {arXiv},
  eprint       = {2103.01496},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-01496.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-03874,
  author       = {Dan Hendrycks and
                  Collin Burns and
                  Saurav Kadavath and
                  Akul Arora and
                  Steven Basart and
                  Eric Tang and
                  Dawn Song and
                  Jacob Steinhardt},
  title        = {Measuring Mathematical Problem Solving With the {MATH} Dataset},
  journal      = {CoRR},
  volume       = {abs/2103.03874},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.03874},
  eprinttype    = {arXiv},
  eprint       = {2103.03874},
  timestamp    = {Mon, 15 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-03874.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-16257,
  author       = {Qinbin Li and
                  Bingsheng He and
                  Dawn Song},
  title        = {Model-Contrastive Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2103.16257},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.16257},
  eprinttype    = {arXiv},
  eprint       = {2103.16257},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-16257.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-00579,
  author       = {Lun Wang and
                  Zaynah Javed and
                  Xian Wu and
                  Wenbo Guo and
                  Xinyu Xing and
                  Dawn Song},
  title        = {{BACKDOORL:} Backdoor Attack against Competitive Reinforcement Learning},
  journal      = {CoRR},
  volume       = {abs/2105.00579},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.00579},
  eprinttype    = {arXiv},
  eprint       = {2105.00579},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-00579.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-09938,
  author       = {Dan Hendrycks and
                  Steven Basart and
                  Saurav Kadavath and
                  Mantas Mazeika and
                  Akul Arora and
                  Ethan Guo and
                  Collin Burns and
                  Samir Puranik and
                  Horace He and
                  Dawn Song and
                  Jacob Steinhardt},
  title        = {Measuring Coding Challenge Competence With {APPS}},
  journal      = {CoRR},
  volume       = {abs/2105.09938},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.09938},
  eprinttype    = {arXiv},
  eprint       = {2105.09938},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-09938.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-12363,
  author       = {Lun Wang and
                  Dawn Song},
  title        = {Differentially Private Frequency Moments Estimation with Polylogarithmic
                  Space},
  journal      = {CoRR},
  volume       = {abs/2105.12363},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.12363},
  eprinttype    = {arXiv},
  eprint       = {2105.12363},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-12363.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-14618,
  author       = {Lun Wang and
                  Qi Pang and
                  Shuai Wang and
                  Dawn Song},
  title        = {FED-{\(\chi\)}\({}_{\mbox{2}}\): Privacy Preserving Federated Correlation
                  Test},
  journal      = {CoRR},
  volume       = {abs/2105.14618},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.14618},
  eprinttype    = {arXiv},
  eprint       = {2105.14618},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-14618.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-00101,
  author       = {Xinyun Chen and
                  Dawn Song and
                  Yuandong Tian},
  title        = {Latent Execution for Neural Program Synthesis Beyond Domain-Specific
                  Languages},
  journal      = {CoRR},
  volume       = {abs/2107.00101},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.00101},
  eprinttype    = {arXiv},
  eprint       = {2107.00101},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-00101.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-05211,
  author       = {Shiyu Tang and
                  Ruihao Gong and
                  Yan Wang and
                  Aishan Liu and
                  Jiakai Wang and
                  Xinyun Chen and
                  Fengwei Yu and
                  Xianglong Liu and
                  Dawn Song and
                  Alan L. Yuille and
                  Philip H. S. Torr and
                  Dacheng Tao},
  title        = {RobustART: Benchmarking Robustness on Architecture Design and Training
                  Techniques},
  journal      = {CoRR},
  volume       = {abs/2109.05211},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.05211},
  eprinttype    = {arXiv},
  eprint       = {2109.05211},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-05211.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-11171,
  author       = {Chenguang Wang and
                  Xiao Liu and
                  Zui Chen and
                  Haoyun Hong and
                  Jie Tang and
                  Dawn Song},
  title        = {Zero-Shot Information Extraction as a Unified Text-to-Triple Translation},
  journal      = {CoRR},
  volume       = {abs/2109.11171},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.11171},
  eprinttype    = {arXiv},
  eprint       = {2109.11171},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-11171.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-13136,
  author       = {Dan Hendrycks and
                  Mantas Mazeika and
                  Andy Zou and
                  Sahil Patel and
                  Christine Zhu and
                  Jesus Navarro and
                  Dawn Song and
                  Bo Li and
                  Jacob Steinhardt},
  title        = {What Would Jiminy Cricket Do? Towards Agents That Behave Morally},
  journal      = {CoRR},
  volume       = {abs/2110.13136},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.13136},
  eprinttype    = {arXiv},
  eprint       = {2110.13136},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-13136.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-03642,
  author       = {Yu Gai and
                  Paras Jain and
                  Wendi Zhang and
                  Joseph E. Gonzalez and
                  Dawn Song and
                  Ion Stoica},
  title        = {Grounded Graph Decoding Improves Compositional Generalization in Question
                  Answering},
  journal      = {CoRR},
  volume       = {abs/2111.03642},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.03642},
  eprinttype    = {arXiv},
  eprint       = {2111.03642},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-03642.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-05135,
  author       = {Dan Hendrycks and
                  Andy Zou and
                  Mantas Mazeika and
                  Leonard Tang and
                  Bo Li and
                  Dawn Song and
                  Jacob Steinhardt},
  title        = {PixMix: Dreamlike Pictures Comprehensively Improve Safety Measures},
  journal      = {CoRR},
  volume       = {abs/2112.05135},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.05135},
  eprinttype    = {arXiv},
  eprint       = {2112.05135},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-05135.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-05588,
  author       = {Jialuo Chen and
                  Jingyi Wang and
                  Tinglan Peng and
                  Youcheng Sun and
                  Peng Cheng and
                  Shouling Ji and
                  Xingjun Ma and
                  Bo Li and
                  Dawn Song},
  title        = {Copy, Right? {A} Testing Framework for Copyright Protection of Deep
                  Learning Models},
  journal      = {CoRR},
  volume       = {abs/2112.05588},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.05588},
  eprinttype    = {arXiv},
  eprint       = {2112.05588},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-05588.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McCorryBYS21,
  author       = {Patrick McCorry and
                  Chris Buckland and
                  Bennet Yee and
                  Dawn Song},
  title        = {SoK: Validating Bridges as a Scaling Solution for Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1589},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1589},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/McCorryBYS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BulusuKLVS20,
  author       = {Saikiran Bulusu and
                  Bhavya Kailkhura and
                  Bo Li and
                  Pramod K. Varshney and
                  Dawn Song},
  title        = {Anomalous Example Detection in Deep Learning: {A} Survey},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {132330--132347},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3010274},
  doi          = {10.1109/ACCESS.2020.3010274},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/BulusuKLVS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/TrieuSSSS20,
  author       = {Ni Trieu and
                  Kareem Shehata and
                  Prateek Saxena and
                  Reza Shokri and
                  Dawn Song},
  title        = {Epione: Lightweight Contact Tracing with Strong Privacy},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {43},
  number       = {2},
  pages        = {95--107},
  year         = {2020},
  url          = {http://sites.computer.org/debull/A20june/p95.pdf},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/debu/TrieuSSSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/LiuTKS20,
  author       = {Xiaoyuan Liu and
                  Ni Trieu and
                  Evgenios M. Kornaropoulos and
                  Dawn Song},
  title        = {BeeTrace: {A} Unified Platform for Secure Contact Tracing that Breaks
                  Data Silos},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {43},
  number       = {2},
  pages        = {108--120},
  year         = {2020},
  url          = {http://sites.computer.org/debull/A20june/p108.pdf},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/debu/LiuTKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ZhangHCKHJJMS20,
  author       = {Fan Zhang and
                  Warren He and
                  Raymond Cheng and
                  Jernej Kos and
                  Nicholas Hynes and
                  Noah M. Johnson and
                  Ari Juels and
                  Andrew Miller and
                  Dawn Song},
  title        = {The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and
                  Performant Smart Contracts},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {3},
  pages        = {17--27},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2020.2976984},
  doi          = {10.1109/MSEC.2020.2976984},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ZhangHCKHJJMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KohlbrennerSLAS20,
  author       = {David Kohlbrenner and
                  Shweta Shinde and
                  Dayeol Lee and
                  Krste Asanovic and
                  Dawn Song},
  title        = {Building Open Trusted Execution Environments},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {5},
  pages        = {47--56},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2020.2990649},
  doi          = {10.1109/MSEC.2020.2990649},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KohlbrennerSLAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acl/HendrycksLWDKS20,
  author       = {Dan Hendrycks and
                  Xiaoyuan Liu and
                  Eric Wallace and
                  Adam Dziedzic and
                  Rishabh Krishnan and
                  Dawn Song},
  editor       = {Dan Jurafsky and
                  Joyce Chai and
                  Natalie Schluter and
                  Joel R. Tetreault},
  title        = {Pretrained Transformers Improve Out-of-Distribution Robustness},
  booktitle    = {Proceedings of the 58th Annual Meeting of the Association for Computational
                  Linguistics, {ACL} 2020, Online, July 5-10, 2020},
  pages        = {2744--2751},
  publisher    = {Association for Computational Linguistics},
  year         = {2020},
  url          = {https://doi.org/10.18653/v1/2020.acl-main.244},
  doi          = {10.18653/V1/2020.ACL-MAIN.244},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acl/HendrycksLWDKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Song20,
  author       = {Dawn Song},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {{AI} and Security: Lessons, Challenges and Future Directions},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384771},
  doi          = {10.1145/3320269.3384771},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Song20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangFZS20,
  author       = {Jiaheng Zhang and
                  Zhiyong Fang and
                  Yupeng Zhang and
                  Dawn Song},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Zero Knowledge Proofs for Decision Tree Predictions and Accuracy},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {2039--2053},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417278},
  doi          = {10.1145/3372297.3417278},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangFZS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/ZhangJP0LS20,
  author       = {Yuheng Zhang and
                  Ruoxi Jia and
                  Hengzhi Pei and
                  Wenxiao Wang and
                  Bo Li and
                  Dawn Song},
  title        = {The Secret Revealer: Generative Model-Inversion Attacks Against Deep
                  Neural Networks},
  booktitle    = {2020 {IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2020, Seattle, WA, USA, June 13-19, 2020},
  pages        = {250--258},
  publisher    = {Computer Vision Foundation / {IEEE}},
  year         = {2020},
  url          = {https://openaccess.thecvf.com/content\_CVPR\_2020/html/Zhang\_The\_Secret\_Revealer\_Generative\_Model-Inversion\_Attacks\_Against\_Deep\_Neural\_Networks\_CVPR\_2020\_paper.html},
  doi          = {10.1109/CVPR42600.2020.00033},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/ZhangJP0LS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/WallaceSS20,
  author       = {Eric Wallace and
                  Mitchell Stern and
                  Dawn Song},
  editor       = {Bonnie Webber and
                  Trevor Cohn and
                  Yulan He and
                  Yang Liu},
  title        = {Imitation Attacks and Defenses for Black-box Machine Translation Systems},
  booktitle    = {Proceedings of the 2020 Conference on Empirical Methods in Natural
                  Language Processing, {EMNLP} 2020, Online, November 16-20, 2020},
  pages        = {5531--5546},
  publisher    = {Association for Computational Linguistics},
  year         = {2020},
  url          = {https://doi.org/10.18653/v1/2020.emnlp-main.446},
  doi          = {10.18653/V1/2020.EMNLP-MAIN.446},
  timestamp    = {Wed, 23 Mar 2022 10:11:55 +0100},
  biburl       = {https://dblp.org/rec/conf/emnlp/WallaceSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/JohnsonNHS20,
  author       = {Noah M. Johnson and
                  Joseph P. Near and
                  Joseph M. Hellerstein and
                  Dawn Song},
  title        = {Chorus: a Programming Framework for Building Scalable Differential
                  Privacy Mechanisms},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2020, Genoa, Italy, September 7-11, 2020},
  pages        = {535--551},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSP48549.2020.00041},
  doi          = {10.1109/EUROSP48549.2020.00041},
  timestamp    = {Tue, 10 Nov 2020 11:45:04 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/JohnsonNHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/LeeKSAS20,
  author       = {Dayeol Lee and
                  David Kohlbrenner and
                  Shweta Shinde and
                  Krste Asanovic and
                  Dawn Song},
  editor       = {Angelos Bilas and
                  Kostas Magoutis and
                  Evangelos P. Markatos and
                  Dejan Kostic and
                  Margo I. Seltzer},
  title        = {Keystone: an open framework for architecting trusted execution environments},
  booktitle    = {EuroSys '20: Fifteenth EuroSys Conference 2020, Heraklion, Greece,
                  April 27-30, 2020},
  pages        = {38:1--38:16},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3342195.3387532},
  doi          = {10.1145/3342195.3387532},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/LeeKSAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/GuoWXXDS20,
  author       = {Wenbo Guo and
                  Lun Wang and
                  Yan Xu and
                  Xinyu Xing and
                  Min Du and
                  Dawn Song},
  editor       = {Claudia Plant and
                  Haixun Wang and
                  Alfredo Cuzzocrea and
                  Carlo Zaniolo and
                  Xindong Wu},
  title        = {Towards Inspecting and Eliminating Trojan Backdoors in Deep Neural
                  Networks},
  booktitle    = {20th {IEEE} International Conference on Data Mining, {ICDM} 2020,
                  Sorrento, Italy, November 17-20, 2020},
  pages        = {162--171},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICDM50108.2020.00025},
  doi          = {10.1109/ICDM50108.2020.00025},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdm/GuoWXXDS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/ChenLYZSL20,
  author       = {Xinyun Chen and
                  Chen Liang and
                  Adams Wei Yu and
                  Denny Zhou and
                  Dawn Song and
                  Quoc V. Le},
  title        = {Neural Symbolic Reader: Scalable Integration of Distributed and Symbolic
                  Representations for Reading Comprehension},
  booktitle    = {8th International Conference on Learning Representations, {ICLR} 2020,
                  Addis Ababa, Ethiopia, April 26-30, 2020},
  publisher    = {OpenReview.net},
  year         = {2020},
  url          = {https://openreview.net/forum?id=ryxjnREFwH},
  timestamp    = {Thu, 07 May 2020 17:11:47 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/ChenLYZSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/DuJS20,
  author       = {Min Du and
                  Ruoxi Jia and
                  Dawn Song},
  title        = {Robust anomaly detection and backdoor attack detection via differential
                  privacy},
  booktitle    = {8th International Conference on Learning Representations, {ICLR} 2020,
                  Addis Ababa, Ethiopia, April 26-30, 2020},
  publisher    = {OpenReview.net},
  year         = {2020},
  url          = {https://openreview.net/forum?id=SJx0q1rtvS},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/DuJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/ChenLYSZ20,
  author       = {Xinyun Chen and
                  Chen Liang and
                  Adams Wei Yu and
                  Dawn Song and
                  Denny Zhou},
  editor       = {Hugo Larochelle and
                  Marc'Aurelio Ranzato and
                  Raia Hadsell and
                  Maria{-}Florina Balcan and
                  Hsuan{-}Tien Lin},
  title        = {Compositional Generalization via Neural-Symbolic Stack Machines},
  booktitle    = {Advances in Neural Information Processing Systems 33: Annual Conference
                  on Neural Information Processing Systems 2020, NeurIPS 2020, December
                  6-12, 2020, virtual},
  year         = {2020},
  url          = {https://proceedings.neurips.cc/paper/2020/hash/12b1e42dc0746f22cf361267de07073f-Abstract.html},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/ChenLYSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/GuptaCCS20,
  author       = {Kavi Gupta and
                  Peter Ebert Christensen and
                  Xinyun Chen and
                  Dawn Song},
  editor       = {Hugo Larochelle and
                  Marc'Aurelio Ranzato and
                  Raia Hadsell and
                  Maria{-}Florina Balcan and
                  Hsuan{-}Tien Lin},
  title        = {Synthesize, Execute and Debug: Learning to Repair for Neural Program
                  Synthesis},
  booktitle    = {Advances in Neural Information Processing Systems 33: Annual Conference
                  on Neural Information Processing Systems 2020, NeurIPS 2020, December
                  6-12, 2020, virtual},
  year         = {2020},
  url          = {https://proceedings.neurips.cc/paper/2020/hash/cd0f74b5955dc87fd0605745c4b49ee8-Abstract.html},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/GuptaCCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/WangPS20,
  author       = {Lun Wang and
                  Qi Pang and
                  Dawn Song},
  editor       = {Hugo Larochelle and
                  Marc'Aurelio Ranzato and
                  Raia Hadsell and
                  Maria{-}Florina Balcan and
                  Hsuan{-}Tien Lin},
  title        = {Towards practical differentially private causal graph discovery},
  booktitle    = {Advances in Neural Information Processing Systems 33: Annual Conference
                  on Neural Information Processing Systems 2020, NeurIPS 2020, December
                  6-12, 2020, virtual},
  year         = {2020},
  url          = {https://proceedings.neurips.cc/paper/2020/hash/3b13b1eb44b05f57735764786fab9c2c-Abstract.html},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/WangPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/PengDL0S20,
  author       = {Yanqing Peng and
                  Min Du and
                  Feifei Li and
                  Raymond Cheng and
                  Dawn Song},
  editor       = {David Maier and
                  Rachel Pottinger and
                  AnHai Doan and
                  Wang{-}Chiew Tan and
                  Abdussalam Alawini and
                  Hung Q. Ngo},
  title        = {FalconDB: Blockchain-based Collaborative Database},
  booktitle    = {Proceedings of the 2020 International Conference on Management of
                  Data, {SIGMOD} Conference 2020, online conference [Portland, OR, USA],
                  June 14-19, 2020},
  pages        = {637--652},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3318464.3380594},
  doi          = {10.1145/3318464.3380594},
  timestamp    = {Wed, 08 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigmod/PengDL0S20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangX0S20,
  author       = {Jiaheng Zhang and
                  Tiancheng Xie and
                  Yupeng Zhang and
                  Dawn Song},
  title        = {Transparent Polynomial Delegation and Its Applications to Zero Knowledge
                  Proof},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {859--876},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00052},
  doi          = {10.1109/SP40000.2020.00052},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangX0S20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KosbaPPS20,
  author       = {Ahmed E. Kosba and
                  Dimitrios Papadopoulos and
                  Charalampos Papamanthou and
                  Dawn Song},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {{MIRAGE:} Succinct Arguments for Randomized Algorithms with Applications
                  to Universal zk-SNARKs},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2129--2146},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/kosba},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KosbaPPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/0013RZJS20,
  author       = {Tianhao Wang and
                  Johannes Rausch and
                  Ce Zhang and
                  Ruoxi Jia and
                  Dawn Song},
  editor       = {Qiang Yang and
                  Lixin Fan and
                  Han Yu},
  title        = {A Principled Approach to Data Valuation for Federated Learning},
  booktitle    = {Federated Learning - Privacy and Incentive},
  series       = {Lecture Notes in Computer Science},
  volume       = {12500},
  pages        = {153--167},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63076-8\_11},
  doi          = {10.1007/978-3-030-63076-8\_11},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/0013RZJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-05214,
  author       = {Dell Zhang and
                  Andr{\'{e}} Freitas and
                  Dacheng Tao and
                  Dawn Song},
  title        = {Proceedings of the {AAAI-20} Workshop on Intelligent Process Automation
                  {(IPA-20)}},
  journal      = {CoRR},
  volume       = {abs/2001.05214},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.05214},
  eprinttype    = {arXiv},
  eprint       = {2001.05214},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-05214.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-06979,
  author       = {Saikiran Bulusu and
                  Bhavya Kailkhura and
                  Bo Li and
                  Pramod K. Varshney and
                  Dawn Song},
  title        = {Anomalous Instance Detection in Deep Learning: {A} Survey},
  journal      = {CoRR},
  volume       = {abs/2003.06979},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.06979},
  eprinttype    = {arXiv},
  eprint       = {2003.06979},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-06979.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-06100,
  author       = {Dan Hendrycks and
                  Xiaoyuan Liu and
                  Eric Wallace and
                  Adam Dziedzic and
                  Rishabh Krishnan and
                  Dawn Song},
  title        = {Pretrained Transformers Improve Out-of-Distribution Robustness},
  journal      = {CoRR},
  volume       = {abs/2004.06100},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.06100},
  eprinttype    = {arXiv},
  eprint       = {2004.06100},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-06100.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-13293,
  author       = {Ni Trieu and
                  Kareem Shehata and
                  Prateek Saxena and
                  Reza Shokri and
                  Dawn Song},
  title        = {Epione: Lightweight Contact Tracing with Strong Privacy},
  journal      = {CoRR},
  volume       = {abs/2004.13293},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.13293},
  eprinttype    = {arXiv},
  eprint       = {2004.13293},
  timestamp    = {Sat, 02 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-13293.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-15015,
  author       = {Eric Wallace and
                  Mitchell Stern and
                  Dawn Song},
  title        = {Imitation Attacks and Defenses for Black-box Machine Translation Systems},
  journal      = {CoRR},
  volume       = {abs/2004.15015},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.15015},
  eprinttype    = {arXiv},
  eprint       = {2004.15015},
  timestamp    = {Sun, 03 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-15015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-08598,
  author       = {Lun Wang and
                  Qi Pang and
                  Dawn Song},
  title        = {Towards practical differentially private causal graph discovery},
  journal      = {CoRR},
  volume       = {abs/2006.08598},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.08598},
  eprinttype    = {arXiv},
  eprint       = {2006.08598},
  timestamp    = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-08598.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-16241,
  author       = {Dan Hendrycks and
                  Steven Basart and
                  Norman Mu and
                  Saurav Kadavath and
                  Frank Wang and
                  Evan Dorundo and
                  Rahul Desai and
                  Tyler Zhu and
                  Samyak Parajuli and
                  Mike Guo and
                  Dawn Song and
                  Jacob Steinhardt and
                  Justin Gilmer},
  title        = {The Many Faces of Robustness: {A} Critical Analysis of Out-of-Distribution
                  Generalization},
  journal      = {CoRR},
  volume       = {abs/2006.16241},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.16241},
  eprinttype    = {arXiv},
  eprint       = {2006.16241},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-16241.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-02285,
  author       = {Xiaoyuan Liu and
                  Ni Trieu and
                  Evgenios M. Kornaropoulos and
                  Dawn Song},
  title        = {BeeTrace: {A} Unified Platform for Secure Contact Tracing that Breaks
                  Data Silos},
  journal      = {CoRR},
  volume       = {abs/2007.02285},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.02285},
  eprinttype    = {arXiv},
  eprint       = {2007.02285},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-02285.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-08095,
  author       = {Kavi Gupta and
                  Peter Ebert Christensen and
                  Xinyun Chen and
                  Dawn Song},
  title        = {Synthesize, Execute and Debug: Learning to Repair for Neural Program
                  Synthesis},
  journal      = {CoRR},
  volume       = {abs/2007.08095},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.08095},
  eprinttype    = {arXiv},
  eprint       = {2007.08095},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-08095.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-02275,
  author       = {Dan Hendrycks and
                  Collin Burns and
                  Steven Basart and
                  Andrew Critch and
                  Jerry Li and
                  Dawn Song and
                  Jacob Steinhardt},
  title        = {Aligning {AI} With Shared Human Values},
  journal      = {CoRR},
  volume       = {abs/2008.02275},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.02275},
  eprinttype    = {arXiv},
  eprint       = {2008.02275},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-02275.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-06662,
  author       = {Xinyun Chen and
                  Chen Liang and
                  Adams Wei Yu and
                  Dawn Song and
                  Denny Zhou},
  title        = {Compositional Generalization via Neural-Symbolic Stack Machines},
  journal      = {CoRR},
  volume       = {abs/2008.06662},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.06662},
  eprinttype    = {arXiv},
  eprint       = {2008.06662},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-06662.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-03300,
  author       = {Dan Hendrycks and
                  Collin Burns and
                  Steven Basart and
                  Andy Zou and
                  Mantas Mazeika and
                  Dawn Song and
                  Jacob Steinhardt},
  title        = {Measuring Massive Multitask Language Understanding},
  journal      = {CoRR},
  volume       = {abs/2009.03300},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.03300},
  eprinttype    = {arXiv},
  eprint       = {2009.03300},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-03300.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-06192,
  author       = {Tianhao Wang and
                  Johannes Rausch and
                  Ce Zhang and
                  Ruoxi Jia and
                  Dawn Song},
  title        = {A Principled Approach to Data Valuation for Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2009.06192},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.06192},
  eprinttype    = {arXiv},
  eprint       = {2009.06192},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-06192.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-01017,
  author       = {Qinbin Li and
                  Bingsheng He and
                  Dawn Song},
  title        = {Model-Agnostic Round-Optimal Federated Learning via Knowledge Transfer},
  journal      = {CoRR},
  volume       = {abs/2010.01017},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.01017},
  eprinttype    = {arXiv},
  eprint       = {2010.01017},
  timestamp    = {Mon, 12 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-01017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-01175,
  author       = {Lun Wang and
                  Qi Pang and
                  Shuai Wang and
                  Dawn Song},
  title        = {F2ED-Learning: Good Fences Make Good Neighbors},
  journal      = {CoRR},
  volume       = {abs/2010.01175},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.01175},
  eprinttype    = {arXiv},
  eprint       = {2010.01175},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-01175.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-11967,
  author       = {Chenguang Wang and
                  Xiao Liu and
                  Dawn Song},
  title        = {Language Models are Open Knowledge Graphs},
  journal      = {CoRR},
  volume       = {abs/2010.11967},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.11967},
  eprinttype    = {arXiv},
  eprint       = {2010.11967},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-11967.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-13637,
  author       = {Peng Gao and
                  Fei Shao and
                  Xiaoyuan Liu and
                  Xusheng Xiao and
                  Zheng Qin and
                  Fengyuan Xu and
                  Prateek Mittal and
                  Sanjeev R. Kulkarni and
                  Dawn Song},
  title        = {Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence},
  journal      = {CoRR},
  volume       = {abs/2010.13637},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.13637},
  eprinttype    = {arXiv},
  eprint       = {2010.13637},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-13637.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-09719,
  author       = {Chawin Sitawarin and
                  Evgenios M. Kornaropoulos and
                  Dawn Song and
                  David A. Wagner},
  title        = {Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order
                  Voronoi Diagrams},
  journal      = {CoRR},
  volume       = {abs/2011.09719},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.09719},
  eprinttype    = {arXiv},
  eprint       = {2011.09719},
  timestamp    = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-09719.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-01654,
  author       = {Aishan Liu and
                  Shiyu Tang and
                  Xianglong Liu and
                  Xinyun Chen and
                  Lei Huang and
                  Zhuozhuo Tu and
                  Dawn Song and
                  Dacheng Tao},
  title        = {Towards Defending Multiple Adversarial Perturbations via Gated Batch
                  Normalization},
  journal      = {CoRR},
  volume       = {abs/2012.01654},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.01654},
  eprinttype    = {arXiv},
  eprint       = {2012.01654},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-01654.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-05291,
  author       = {Usmann Khan and
                  Lun Wang and
                  Jithendaraa Subramanian and
                  Joseph P. Near and
                  Dawn Song},
  title        = {PrivFramework: {A} System for Configurable and Automated Privacy Policy
                  Compliance},
  journal      = {CoRR},
  volume       = {abs/2012.05291},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.05291},
  eprinttype    = {arXiv},
  eprint       = {2012.05291},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-05291.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-07805,
  author       = {Nicholas Carlini and
                  Florian Tram{\`{e}}r and
                  Eric Wallace and
                  Matthew Jagielski and
                  Ariel Herbert{-}Voss and
                  Katherine Lee and
                  Adam Roberts and
                  Tom B. Brown and
                  Dawn Song and
                  {\'{U}}lfar Erlingsson and
                  Alina Oprea and
                  Colin Raffel},
  title        = {Extracting Training Data from Large Language Models},
  journal      = {CoRR},
  volume       = {abs/2012.07805},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.07805},
  eprinttype    = {arXiv},
  eprint       = {2012.07805},
  timestamp    = {Sat, 02 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-07805.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-10544,
  author       = {Micah Goldblum and
                  Dimitris Tsipras and
                  Chulin Xie and
                  Xinyun Chen and
                  Avi Schwarzschild and
                  Dawn Song and
                  Aleksander Madry and
                  Bo Li and
                  Tom Goldstein},
  title        = {Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks,
                  and Defenses},
  journal      = {CoRR},
  volume       = {abs/2012.10544},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.10544},
  eprinttype    = {arXiv},
  eprint       = {2012.10544},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-10544.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KosbaPPS20,
  author       = {Ahmed E. Kosba and
                  Dimitrios Papadopoulos and
                  Charalampos Papamanthou and
                  Dawn Song},
  title        = {{MIRAGE:} Succinct Arguments for Randomized Algorithms with Applications
                  to Universal zk-SNARKs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/278},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KosbaPPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/NearDASGWSZSSS19,
  author       = {Joseph P. Near and
                  David Darais and
                  Chike Abuah and
                  Tim Stevens and
                  Pranav Gaddamadugu and
                  Lun Wang and
                  Neel Somani and
                  Mu Zhang and
                  Nikhil Sharma and
                  Alex Shan and
                  Dawn Song},
  title        = {Duet: an expressive higher-order language and linear type system for
                  statically enforcing differential privacy},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {3},
  number       = {{OOPSLA}},
  pages        = {172:1--172:30},
  year         = {2019},
  url          = {https://doi.org/10.1145/3360598},
  doi          = {10.1145/3360598},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmpl/NearDASGWSZSSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/JiaDWHGLZSS19,
  author       = {Ruoxi Jia and
                  David Dao and
                  Boxin Wang and
                  Frances Ann Hubis and
                  Nezihe Merve G{\"{u}}rel and
                  Bo Li and
                  Ce Zhang and
                  Costas J. Spanos and
                  Dawn Song},
  title        = {Efficient Task-Specific Data Valuation for Nearest Neighbor Algorithms},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {12},
  number       = {11},
  pages        = {1610--1623},
  year         = {2019},
  url          = {http://www.vldb.org/pvldb/vol12/p1610-jia.pdf},
  doi          = {10.14778/3342263.3342637},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pvldb/JiaDWHGLZSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aft/KwonLKSK19,
  author       = {Yujin Kwon and
                  Jian Liu and
                  Minjeong Kim and
                  Dawn Song and
                  Yongdae Kim},
  title        = {Impossibility of Full Decentralization in Permissionless Blockchains},
  booktitle    = {Proceedings of the 1st {ACM} Conference on Advances in Financial Technologies,
                  {AFT} 2019, Zurich, Switzerland, October 21-23, 2019},
  pages        = {110--123},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3318041.3355463},
  doi          = {10.1145/3318041.3355463},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aft/KwonLKSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aistats/JiaDWHHGLZSS19,
  author       = {Ruoxi Jia and
                  David Dao and
                  Boxin Wang and
                  Frances Ann Hubis and
                  Nick Hynes and
                  Nezihe Merve G{\"{u}}rel and
                  Bo Li and
                  Ce Zhang and
                  Dawn Song and
                  Costas J. Spanos},
  editor       = {Kamalika Chaudhuri and
                  Masashi Sugiyama},
  title        = {Towards Efficient Data Valuation Based on the Shapley Value},
  booktitle    = {The 22nd International Conference on Artificial Intelligence and Statistics,
                  {AISTATS} 2019, 16-18 April 2019, Naha, Okinawa, Japan},
  series       = {Proceedings of Machine Learning Research},
  volume       = {89},
  pages        = {1167--1176},
  publisher    = {{PMLR}},
  year         = {2019},
  url          = {http://proceedings.mlr.press/v89/jia19a.html},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aistats/JiaDWHHGLZSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/PanWZLYS19,
  author       = {Xinlei Pan and
                  Weiyao Wang and
                  Xiaoshuai Zhang and
                  Bo Li and
                  Jinfeng Yi and
                  Dawn Song},
  editor       = {Edith Elkind and
                  Manuela Veloso and
                  Noa Agmon and
                  Matthew E. Taylor},
  title        = {How You Act Tells a Lot: Privacy-Leaking Attack on Deep Reinforcement
                  Learning},
  booktitle    = {Proceedings of the 18th International Conference on Autonomous Agents
                  and MultiAgent Systems, {AAMAS} '19, Montreal, QC, Canada, May 13-17,
                  2019},
  pages        = {368--376},
  publisher    = {International Foundation for Autonomous Agents and Multiagent Systems},
  year         = {2019},
  url          = {http://dl.acm.org/citation.cfm?id=3331715},
  timestamp    = {Tue, 17 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/PanWZLYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DuCLOS19,
  author       = {Min Du and
                  Zhi Chen and
                  Chang Liu and
                  Rajvardhan Oak and
                  Dawn Song},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Lifelong Anomaly Detection Through Unlearning},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1283--1297},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363226},
  doi          = {10.1145/3319535.3363226},
  timestamp    = {Tue, 07 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DuCLOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YuanMGYLSWL19,
  author       = {Dong Yuan and
                  Yuanli Miao and
                  Neil Zhenqiang Gong and
                  Zheng Yang and
                  Qi Li and
                  Dawn Song and
                  Qian Wang and
                  Xiao Liang},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Detecting Fake Accounts in Online Social Networks at the Time of Registrations},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1423--1438},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363198},
  doi          = {10.1145/3319535.3363198},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YuanMGYLSWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaramZWLZJS19,
  author       = {Sai Krishna Deepak Maram and
                  Fan Zhang and
                  Lun Wang and
                  Andrew Low and
                  Yupeng Zhang and
                  Ari Juels and
                  Dawn Song},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {{CHURP:} Dynamic-Committee Proactive Secret Sharing},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2369--2386},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363203},
  doi          = {10.1145/3319535.3363203},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MaramZWLZJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/XieZZPS19,
  author       = {Tiancheng Xie and
                  Jiaheng Zhang and
                  Yupeng Zhang and
                  Charalampos Papamanthou and
                  Dawn Song},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {733--764},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_24},
  doi          = {10.1007/978-3-030-26954-8\_24},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/XieZZPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/LebedevHDKLASD19,
  author       = {Ilia A. Lebedev and
                  Kyle Hogan and
                  Jules Drean and
                  David Kohlbrenner and
                  Dayeol Lee and
                  Krste Asanovic and
                  Dawn Song and
                  Srinivas Devadas},
  editor       = {J{\"{u}}rgen Teich and
                  Franco Fummi},
  title        = {Sanctorum: {A} lightweight security monitor for secure enclaves},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2019, Florence, Italy, March 25-29, 2019},
  pages        = {1142--1147},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.23919/DATE.2019.8715182},
  doi          = {10.23919/DATE.2019.8715182},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/LebedevHDKLASD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ChengZKHHJJ0S19,
  author       = {Raymond Cheng and
                  Fan Zhang and
                  Jernej Kos and
                  Warren He and
                  Nicholas Hynes and
                  Noah M. Johnson and
                  Ari Juels and
                  Andrew Miller and
                  Dawn Song},
  title        = {Ekiden: {A} Platform for Confidentiality-Preserving, Trustworthy,
                  and Performant Smart Contracts},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {185--200},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00023},
  doi          = {10.1109/EUROSP.2019.00023},
  timestamp    = {Tue, 09 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ChengZKHHJJ0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccv/XiaoDLLEYSLM19,
  author       = {Chaowei Xiao and
                  Ruizhi Deng and
                  Bo Li and
                  Taesung Lee and
                  Benjamin Edwards and
                  Jinfeng Yi and
                  Dawn Song and
                  Mingyan Liu and
                  Ian M. Molloy},
  title        = {AdvIT: Adversarial Frames Identifier Based on Temporal Consistency
                  in Videos},
  booktitle    = {2019 {IEEE/CVF} International Conference on Computer Vision, {ICCV}
                  2019, Seoul, Korea (South), October 27 - November 2, 2019},
  pages        = {3967--3976},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCV.2019.00407},
  doi          = {10.1109/ICCV.2019.00407},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccv/XiaoDLLEYSLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/ChenLS19,
  author       = {Xinyun Chen and
                  Chang Liu and
                  Dawn Song},
  title        = {Execution-Guided Neural Program Synthesis},
  booktitle    = {7th International Conference on Learning Representations, {ICLR} 2019,
                  New Orleans, LA, USA, May 6-9, 2019},
  publisher    = {OpenReview.net},
  year         = {2019},
  url          = {https://openreview.net/forum?id=H1gfOiAqYm},
  timestamp    = {Thu, 25 Jul 2019 13:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/ChenLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/HuangDSS19,
  author       = {Daniel Huang and
                  Prafulla Dhariwal and
                  Dawn Song and
                  Ilya Sutskever},
  title        = {GamePad: {A} Learning Environment for Theorem Proving},
  booktitle    = {7th International Conference on Learning Representations, {ICLR} 2019,
                  New Orleans, LA, USA, May 6-9, 2019},
  publisher    = {OpenReview.net},
  year         = {2019},
  url          = {https://openreview.net/forum?id=r1xwKoR9Y7},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/HuangDSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/ShinKGBTSS19,
  author       = {Richard Shin and
                  Neel Kant and
                  Kavi Gupta and
                  Chris Bender and
                  Brandon Trabucco and
                  Rishabh Singh and
                  Dawn Song},
  title        = {Synthetic Datasets for Neural Program Synthesis},
  booktitle    = {7th International Conference on Learning Representations, {ICLR} 2019,
                  New Orleans, LA, USA, May 6-9, 2019},
  publisher    = {OpenReview.net},
  year         = {2019},
  url          = {https://openreview.net/forum?id=ryeOSnAqYm},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/ShinKGBTSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/YangLCS19,
  author       = {Zhuolin Yang and
                  Bo Li and
                  Pin{-}Yu Chen and
                  Dawn Song},
  title        = {Characterizing Audio Adversarial Examples Using Temporal Dependency},
  booktitle    = {7th International Conference on Learning Representations, {ICLR} 2019,
                  New Orleans, LA, USA, May 6-9, 2019},
  publisher    = {OpenReview.net},
  year         = {2019},
  url          = {https://openreview.net/forum?id=r1g4E3C9t7},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/YangLCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/XiaLGLCS19,
  author       = {Zenghua Xia and
                  Chang Liu and
                  Neil Zhenqiang Gong and
                  Qi Li and
                  Yong Cui and
                  Dawn Song},
  editor       = {Ankur Teredesai and
                  Vipin Kumar and
                  Ying Li and
                  R{\'{o}}mer Rosales and
                  Evimaria Terzi and
                  George Karypis},
  title        = {Characterizing and Detecting Malicious Accounts in Privacy-Centric
                  Mobile Social Networks: {A} Case Study},
  booktitle    = {Proceedings of the 25th {ACM} {SIGKDD} International Conference on
                  Knowledge Discovery {\&} Data Mining, {KDD} 2019, Anchorage, AK,
                  USA, August 4-8, 2019},
  pages        = {2012--2022},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292500.3330702},
  doi          = {10.1145/3292500.3330702},
  timestamp    = {Sun, 27 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kdd/XiaLGLCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/HendrycksMKS19,
  author       = {Dan Hendrycks and
                  Mantas Mazeika and
                  Saurav Kadavath and
                  Dawn Song},
  editor       = {Hanna M. Wallach and
                  Hugo Larochelle and
                  Alina Beygelzimer and
                  Florence d'Alch{\'{e}}{-}Buc and
                  Emily B. Fox and
                  Roman Garnett},
  title        = {Using Self-Supervised Learning Can Improve Model Robustness and Uncertainty},
  booktitle    = {Advances in Neural Information Processing Systems 32: Annual Conference
                  on Neural Information Processing Systems 2019, NeurIPS 2019, December
                  8-14, 2019, Vancouver, BC, Canada},
  pages        = {15637--15648},
  year         = {2019},
  url          = {https://proceedings.neurips.cc/paper/2019/hash/a2b15837edac15df90721968986f7f8e-Abstract.html},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/HendrycksMKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/WuJYBSPX19,
  author       = {Zhengkai Wu and
                  Evan Johnson and
                  Wei Yang and
                  Osbert Bastani and
                  Dawn Song and
                  Jian Peng and
                  Tao Xie},
  editor       = {Marlon Dumas and
                  Dietmar Pfahl and
                  Sven Apel and
                  Alessandra Russo},
  title        = {{REINAM:} reinforcement learning for input-grammar inference},
  booktitle    = {Proceedings of the {ACM} Joint Meeting on European Software Engineering
                  Conference and Symposium on the Foundations of Software Engineering,
                  {ESEC/SIGSOFT} {FSE} 2019, Tallinn, Estonia, August 26-30, 2019},
  pages        = {488--498},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338906.3338958},
  doi          = {10.1145/3338906.3338958},
  timestamp    = {Sat, 30 Sep 2023 09:56:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/WuJYBSPX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/IyengarNSTTW19,
  author       = {Roger Iyengar and
                  Joseph P. Near and
                  Dawn Song and
                  Om Thakkar and
                  Abhradeep Thakurta and
                  Lun Wang},
  title        = {Towards Practical Differentially Private Convex Optimization},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {299--316},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00001},
  doi          = {10.1109/SP.2019.00001},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/IyengarNSTTW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Carlini0EKS19,
  author       = {Nicholas Carlini and
                  Chang Liu and
                  {\'{U}}lfar Erlingsson and
                  Jernej Kos and
                  Dawn Song},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {The Secret Sharer: Evaluating and Testing Unintended Memorization
                  in Neural Networks},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {267--284},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/carlini},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Carlini0EKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GuoMXDS19,
  author       = {Wenbo Guo and
                  Dongliang Mu and
                  Xinyu Xing and
                  Min Du and
                  Dawn Song},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {{DEEPVSA:} Facilitating Value-set Analysis with Deep Learning for
                  Postmortem Program Analysis},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1787--1804},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/guo},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GuoMXDS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vldb/WangNSGLDS19,
  author       = {Lun Wang and
                  Joseph P. Near and
                  Neel Somani and
                  Peng Gao and
                  Andrew Low and
                  David Dao and
                  Dawn Song},
  editor       = {Vijay Gadepally and
                  Timothy G. Mattson and
                  Michael Stonebraker and
                  Fusheng Wang and
                  Gang Luo and
                  Yanhui Laing and
                  Alevtina Dubovitskaya},
  title        = {Data Capsule: {A} New Paradigm for Automatic Compliance with Data
                  Privacy Regulations},
  booktitle    = {Heterogeneous Data Management, Polystores, and Analytics for Healthcare
                  - {VLDB} 2019 Workshops, Poly and DMAH, Los Angeles, CA, USA, August
                  30, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11721},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-33752-0\_1},
  doi          = {10.1007/978-3-030-33752-0\_1},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vldb/WangNSGLDS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-10275,
  author       = {Ruoxi Jia and
                  David Dao and
                  Boxin Wang and
                  Frances Ann Hubis and
                  Nick Hynes and
                  Nezihe Merve G{\"{u}}rel and
                  Bo Li and
                  Ce Zhang and
                  Dawn Song and
                  Costas J. Spanos},
  title        = {Towards Efficient Data Valuation Based on the Shapley Value},
  journal      = {CoRR},
  volume       = {abs/1902.10275},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.10275},
  eprinttype    = {arXiv},
  eprint       = {1902.10275},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-10275.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-03257,
  author       = {Alexander Ratner and
                  Dan Alistarh and
                  Gustavo Alonso and
                  David G. Andersen and
                  Peter Bailis and
                  Sarah Bird and
                  Nicholas Carlini and
                  Bryan Catanzaro and
                  Eric S. Chung and
                  Bill Dally and
                  Jeff Dean and
                  Inderjit S. Dhillon and
                  Alexandros G. Dimakis and
                  Pradeep Dubey and
                  Charles Elkan and
                  Grigori Fursin and
                  Gregory R. Ganger and
                  Lise Getoor and
                  Phillip B. Gibbons and
                  Garth A. Gibson and
                  Joseph E. Gonzalez and
                  Justin Gottschlich and
                  Song Han and
                  Kim M. Hazelwood and
                  Furong Huang and
                  Martin Jaggi and
                  Kevin G. Jamieson and
                  Michael I. Jordan and
                  Gauri Joshi and
                  Rania Khalaf and
                  Jason Knight and
                  Jakub Kone{\v{c}}n{\'y} and
                  Tim Kraska and
                  Arun Kumar and
                  Anastasios Kyrillidis and
                  Jing Li and
                  Samuel Madden and
                  H. Brendan McMahan and
                  Erik Meijer and
                  Ioannis Mitliagkas and
                  Rajat Monga and
                  Derek Gordon Murray and
                  Dimitris S. Papailiopoulos and
                  Gennady Pekhimenko and
                  Theodoros Rekatsinas and
                  Afshin Rostamizadeh and
                  Christopher R{\'{e}} and
                  Christopher De Sa and
                  Hanie Sedghi and
                  Siddhartha Sen and
                  Virginia Smith and
                  Alex Smola and
                  Dawn Song and
                  Evan R. Sparks and
                  Ion Stoica and
                  Vivienne Sze and
                  Madeleine Udell and
                  Joaquin Vanschoren and
                  Shivaram Venkataraman and
                  Rashmi Vinayak and
                  Markus Weimer and
                  Andrew Gordon Wilson and
                  Eric P. Xing and
                  Matei Zaharia and
                  Ce Zhang and
                  Ameet Talwalkar},
  title        = {SysML: The New Frontier of Machine Learning Systems},
  journal      = {CoRR},
  volume       = {abs/1904.03257},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.03257},
  eprinttype    = {arXiv},
  eprint       = {1904.03257},
  timestamp    = {Fri, 11 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-03257.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-11082,
  author       = {Xinlei Pan and
                  Weiyao Wang and
                  Xiaoshuai Zhang and
                  Bo Li and
                  Jinfeng Yi and
                  Dawn Song},
  title        = {How You Act Tells a Lot: Privacy-Leakage Attack on Deep Reinforcement
                  Learning},
  journal      = {CoRR},
  volume       = {abs/1904.11082},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.11082},
  eprinttype    = {arXiv},
  eprint       = {1904.11082},
  timestamp    = {Tue, 17 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-11082.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-05158,
  author       = {Yujin Kwon and
                  Jian Liu and
                  Minjeong Kim and
                  Dawn Song and
                  Yongdae Kim},
  title        = {Impossibility of Full Decentralization in Permissionless Blockchains},
  journal      = {CoRR},
  volume       = {abs/1905.05158},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.05158},
  eprinttype    = {arXiv},
  eprint       = {1905.05158},
  timestamp    = {Tue, 28 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-05158.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-12340,
  author       = {Dan Hendrycks and
                  Mantas Mazeika and
                  Saurav Kadavath and
                  Dawn Song},
  title        = {Using Self-Supervised Learning Can Improve Model Robustness and Uncertainty},
  journal      = {CoRR},
  volume       = {abs/1906.12340},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.12340},
  eprinttype    = {arXiv},
  eprint       = {1906.12340},
  timestamp    = {Mon, 01 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-12340.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-07174,
  author       = {Dan Hendrycks and
                  Kevin Zhao and
                  Steven Basart and
                  Jacob Steinhardt and
                  Dawn Song},
  title        = {Natural Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1907.07174},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.07174},
  eprinttype    = {arXiv},
  eprint       = {1907.07174},
  timestamp    = {Tue, 23 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-07174.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-09470,
  author       = {Chaowei Xiao and
                  Xinlei Pan and
                  Warren He and
                  Jian Peng and
                  Mingjie Sun and
                  Jinfeng Yi and
                  Mingyan Liu and
                  Bo Li and
                  Dawn Song},
  title        = {Characterizing Attacks on Deep Reinforcement Learning},
  journal      = {CoRR},
  volume       = {abs/1907.09470},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.09470},
  eprinttype    = {arXiv},
  eprint       = {1907.09470},
  timestamp    = {Sat, 18 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-09470.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-10119,
  author       = {Dayeol Lee and
                  David Kohlbrenner and
                  Shweta Shinde and
                  Dawn Song and
                  Krste Asanovic},
  title        = {Keystone: {A} Framework for Architecting TEEs},
  journal      = {CoRR},
  volume       = {abs/1907.10119},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.10119},
  eprinttype    = {arXiv},
  eprint       = {1907.10119},
  timestamp    = {Thu, 01 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-10119.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-01763,
  author       = {Wenbo Guo and
                  Lun Wang and
                  Xinyu Xing and
                  Min Du and
                  Dawn Song},
  title        = {{TABOR:} {A} Highly Accurate Approach to Inspecting and Restoring
                  Trojan Backdoors in {AI} Systems},
  journal      = {CoRR},
  volume       = {abs/1908.01763},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.01763},
  eprinttype    = {arXiv},
  eprint       = {1908.01763},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-01763.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-08619,
  author       = {Ruoxi Jia and
                  David Dao and
                  Boxin Wang and
                  Frances Ann Hubis and
                  Nezihe Merve G{\"{u}}rel and
                  Bo Li and
                  Ce Zhang and
                  Costas J. Spanos and
                  Dawn Song},
  title        = {Efficient Task-Specific Data Valuation for Nearest Neighbor Algorithms},
  journal      = {CoRR},
  volume       = {abs/1908.08619},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.08619},
  eprinttype    = {arXiv},
  eprint       = {1908.08619},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-08619.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-00077,
  author       = {Lun Wang and
                  Joseph P. Near and
                  Neel Somani and
                  Peng Gao and
                  Andrew Low and
                  David Dao and
                  Dawn Song},
  title        = {Data Capsule: {A} New Paradigm for Automatic Compliance with Data
                  Privacy Regulations},
  journal      = {CoRR},
  volume       = {abs/1909.00077},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.00077},
  eprinttype    = {arXiv},
  eprint       = {1909.00077},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-00077.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-02481,
  author       = {Joseph P. Near and
                  David Darais and
                  Chike Abuah and
                  Tim Stevens and
                  Pranav Gaddamadugu and
                  Lun Wang and
                  Neel Somani and
                  Mu Zhang and
                  Nikhil Sharma and
                  Alex Shan and
                  Dawn Song},
  title        = {Duet: An Expressive Higher-order Language and Linear Type System for
                  Statically Enforcing Differential Privacy},
  journal      = {CoRR},
  volume       = {abs/1909.02481},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.02481},
  eprinttype    = {arXiv},
  eprint       = {1909.02481},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-02481.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-07116,
  author       = {Min Du and
                  Ruoxi Jia and
                  Dawn Song},
  title        = {Robust Anomaly Detection and Backdoor Attack Detection Via Differential
                  Privacy},
  journal      = {CoRR},
  volume       = {abs/1911.07116},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.07116},
  eprinttype    = {arXiv},
  eprint       = {1911.07116},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-07116.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-07128,
  author       = {Ruoxi Jia and
                  Xuehui Sun and
                  Jiacen Xu and
                  Ce Zhang and
                  Bo Li and
                  Dawn Song},
  title        = {An Empirical and Comparative Analysis of Data Valuation with Scalable
                  Algorithms},
  journal      = {CoRR},
  volume       = {abs/1911.07128},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.07128},
  eprinttype    = {arXiv},
  eprint       = {1911.07128},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-07128.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-07135,
  author       = {Yuheng Zhang and
                  Ruoxi Jia and
                  Hengzhi Pei and
                  Wenxiao Wang and
                  Bo Li and
                  Dawn Song},
  title        = {The Secret Revealer: Generative Model-Inversion Attacks Against Deep
                  Neural Networks},
  journal      = {CoRR},
  volume       = {abs/1911.07135},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.07135},
  eprinttype    = {arXiv},
  eprint       = {1911.07135},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-07135.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-07205,
  author       = {Xinyun Chen and
                  Wenxiao Wang and
                  Chris Bender and
                  Yiming Ding and
                  Ruoxi Jia and
                  Bo Li and
                  Dawn Song},
  title        = {{REFIT:} a Unified Watermark Removal Framework for Deep Learning Systems
                  with Limited Data},
  journal      = {CoRR},
  volume       = {abs/1911.07205},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.07205},
  eprinttype    = {arXiv},
  eprint       = {1911.07205},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-07205.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-11132,
  author       = {Dan Hendrycks and
                  Steven Basart and
                  Mantas Mazeika and
                  Mohammadreza Mostajabi and
                  Jacob Steinhardt and
                  Dawn Song},
  title        = {A Benchmark for Anomaly Segmentation},
  journal      = {CoRR},
  volume       = {abs/1911.11132},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.11132},
  eprinttype    = {arXiv},
  eprint       = {1911.11132},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-11132.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-04977,
  author       = {Peter Kairouz and
                  H. Brendan McMahan and
                  Brendan Avent and
                  Aur{\'{e}}lien Bellet and
                  Mehdi Bennis and
                  Arjun Nitin Bhagoji and
                  Kallista A. Bonawitz and
                  Zachary Charles and
                  Graham Cormode and
                  Rachel Cummings and
                  Rafael G. L. D'Oliveira and
                  Salim El Rouayheb and
                  David Evans and
                  Josh Gardner and
                  Zachary Garrett and
                  Adri{\`{a}} Gasc{\'{o}}n and
                  Badih Ghazi and
                  Phillip B. Gibbons and
                  Marco Gruteser and
                  Za{\"{\i}}d Harchaoui and
                  Chaoyang He and
                  Lie He and
                  Zhouyuan Huo and
                  Ben Hutchinson and
                  Justin Hsu and
                  Martin Jaggi and
                  Tara Javidi and
                  Gauri Joshi and
                  Mikhail Khodak and
                  Jakub Kone{\v{c}}n{\'y} and
                  Aleksandra Korolova and
                  Farinaz Koushanfar and
                  Sanmi Koyejo and
                  Tancr{\`{e}}de Lepoint and
                  Yang Liu and
                  Prateek Mittal and
                  Mehryar Mohri and
                  Richard Nock and
                  Ayfer {\"{O}}zg{\"{u}}r and
                  Rasmus Pagh and
                  Mariana Raykova and
                  Hang Qi and
                  Daniel Ramage and
                  Ramesh Raskar and
                  Dawn Song and
                  Weikang Song and
                  Sebastian U. Stich and
                  Ziteng Sun and
                  Ananda Theertha Suresh and
                  Florian Tram{\`{e}}r and
                  Praneeth Vepakomma and
                  Jianyu Wang and
                  Li Xiong and
                  Zheng Xu and
                  Qiang Yang and
                  Felix X. Yu and
                  Han Yu and
                  Sen Zhao},
  title        = {Advances and Open Problems in Federated Learning},
  journal      = {CoRR},
  volume       = {abs/1912.04977},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.04977},
  eprinttype    = {arXiv},
  eprint       = {1912.04977},
  timestamp    = {Mon, 11 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-04977.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-12345,
  author       = {Richard Shin and
                  Neel Kant and
                  Kavi Gupta and
                  Christopher Bender and
                  Brandon Trabucco and
                  Rishabh Singh and
                  Dawn Song},
  title        = {Synthetic Datasets for Neural Program Synthesis},
  journal      = {CoRR},
  volume       = {abs/1912.12345},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.12345},
  eprinttype    = {arXiv},
  eprint       = {1912.12345},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-12345.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-12612,
  author       = {Roy Fox and
                  Richard Shin and
                  William Paul and
                  Yitian Zou and
                  Dawn Song and
                  Ken Goldberg and
                  Pieter Abbeel and
                  Ion Stoica},
  title        = {Hierarchical Variational Imitation Learning of Control Programs},
  journal      = {CoRR},
  volume       = {abs/1912.12612},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.12612},
  eprinttype    = {arXiv},
  eprint       = {1912.12612},
  timestamp    = {Sat, 04 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-12612.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LebedevHDKLASD19,
  author       = {Ilia A. Lebedev and
                  Kyle Hogan and
                  Jules Drean and
                  David Kohlbrenner and
                  Dayeol Lee and
                  Krste Asanovic and
                  Dawn Song and
                  Srinivas Devadas},
  title        = {Sanctorum: {A} lightweight security monitor for secure enclaves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LebedevHDKLASD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Maram0WLZJS19,
  author       = {Sai Krishna Deepak Maram and
                  Fan Zhang and
                  Lun Wang and
                  Andrew Low and
                  Yupeng Zhang and
                  Ari Juels and
                  Dawn Song},
  title        = {{CHURP:} Dynamic-Committee Proactive Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/017},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Maram0WLZJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XieZZPS19,
  author       = {Tiancheng Xie and
                  Jiaheng Zhang and
                  Yupeng Zhang and
                  Charalampos Papamanthou and
                  Dawn Song},
  title        = {Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {317},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XieZZPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangX0S19,
  author       = {Jiaheng Zhang and
                  Tiancheng Xie and
                  Yupeng Zhang and
                  Dawn Song},
  title        = {Transparent Polynomial Delegation and Its Applications to Zero Knowledge
                  Proof},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1482},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangX0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/JohnsonNS18,
  author       = {Noah M. Johnson and
                  Joseph P. Near and
                  Dawn Song},
  title        = {Towards Practical Differential Privacy for {SQL} Queries},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {11},
  number       = {5},
  pages        = {526--539},
  year         = {2018},
  url          = {http://www.vldb.org/pvldb/vol11/p526-johnson.pdf},
  doi          = {10.1145/3187009.3177733},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/JohnsonNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/HynesDYCS18,
  author       = {Nick Hynes and
                  David Dao and
                  David Yan and
                  Raymond Cheng and
                  Dawn Song},
  title        = {A Demonstration of Sterling: {A} Privacy-Preserving Data Marketplace},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {11},
  number       = {12},
  pages        = {2086--2089},
  year         = {2018},
  url          = {http://www.vldb.org/pvldb/vol11/p2086-hynes.pdf},
  doi          = {10.14778/3229863.3236266},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/HynesDYCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SongYLS18,
  author       = {Wei Song and
                  Heng Yin and
                  Chang Liu and
                  Dawn Song},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {DeepMem: Learning Graph Neural Network Models for Fast and Robust
                  Memory Forensic Analysis},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {606--618},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243813},
  doi          = {10.1145/3243734.3243813},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SongYLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/EykholtEF0RXPKS18,
  author       = {Kevin Eykholt and
                  Ivan Evtimov and
                  Earlence Fernandes and
                  Bo Li and
                  Amir Rahmati and
                  Chaowei Xiao and
                  Atul Prakash and
                  Tadayoshi Kohno and
                  Dawn Song},
  title        = {Robust Physical-World Attacks on Deep Learning Visual Classification},
  booktitle    = {2018 {IEEE} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2018, Salt Lake City, UT, USA, June 18-22, 2018},
  pages        = {1625--1634},
  publisher    = {Computer Vision Foundation / {IEEE} Computer Society},
  year         = {2018},
  url          = {http://openaccess.thecvf.com/content\_cvpr\_2018/html/Eykholt\_Robust\_Physical-World\_Attacks\_CVPR\_2018\_paper.html},
  doi          = {10.1109/CVPR.2018.00175},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/EykholtEF0RXPKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/XuCLRDS18,
  author       = {Xiaojun Xu and
                  Xinyun Chen and
                  Chang Liu and
                  Anna Rohrbach and
                  Trevor Darrell and
                  Dawn Song},
  title        = {Fooling Vision and Language Models Despite Localization and Attention
                  Mechanism},
  booktitle    = {2018 {IEEE} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2018, Salt Lake City, UT, USA, June 18-22, 2018},
  pages        = {4951--4961},
  publisher    = {Computer Vision Foundation / {IEEE} Computer Society},
  year         = {2018},
  url          = {http://openaccess.thecvf.com/content\_cvpr\_2018/html/Xu\_Fooling\_Vision\_and\_CVPR\_2018\_paper.html},
  doi          = {10.1109/CVPR.2018.00520},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/XuCLRDS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eccv/BhagojiHLS18,
  author       = {Arjun Nitin Bhagoji and
                  Warren He and
                  Bo Li and
                  Dawn Song},
  editor       = {Vittorio Ferrari and
                  Martial Hebert and
                  Cristian Sminchisescu and
                  Yair Weiss},
  title        = {Practical Black-Box Attacks on Deep Neural Networks Using Efficient
                  Query Mechanisms},
  booktitle    = {Computer Vision - {ECCV} 2018 - 15th European Conference, Munich,
                  Germany, September 8-14, 2018, Proceedings, Part {XII}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11216},
  pages        = {158--174},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01258-8\_10},
  doi          = {10.1007/978-3-030-01258-8\_10},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eccv/BhagojiHLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eccv/XiaoDLYLS18,
  author       = {Chaowei Xiao and
                  Ruizhi Deng and
                  Bo Li and
                  Fisher Yu and
                  Mingyan Liu and
                  Dawn Song},
  editor       = {Vittorio Ferrari and
                  Martial Hebert and
                  Cristian Sminchisescu and
                  Yair Weiss},
  title        = {Characterizing Adversarial Examples Based on Spatial Consistency Information
                  for Semantic Segmentation},
  booktitle    = {Computer Vision - {ECCV} 2018 - 15th European Conference, Munich,
                  Germany, September 8-14, 2018, Proceedings, Part {X}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11214},
  pages        = {220--237},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01249-6\_14},
  doi          = {10.1007/978-3-030-01249-6\_14},
  timestamp    = {Mon, 18 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eccv/XiaoDLYLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/BhagojiH0S18,
  author       = {Arjun Nitin Bhagoji and
                  Warren He and
                  Bo Li and
                  Dawn Song},
  title        = {Black-box Attacks on Deep Neural Networks via Gradient Estimation},
  booktitle    = {6th International Conference on Learning Representations, {ICLR} 2018,
                  Vancouver, BC, Canada, April 30 - May 3, 2018, Workshop Track Proceedings},
  publisher    = {OpenReview.net},
  year         = {2018},
  url          = {https://openreview.net/forum?id=SJ9nVSkvG},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/BhagojiH0S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/ChenLS18,
  author       = {Xinyun Chen and
                  Chang Liu and
                  Dawn Song},
  title        = {Towards Synthesizing Complex Programs From Input-Output Examples},
  booktitle    = {6th International Conference on Learning Representations, {ICLR} 2018,
                  Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings},
  publisher    = {OpenReview.net},
  year         = {2018},
  url          = {https://openreview.net/forum?id=Skp1ESxRZ},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/ChenLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/ChenLS18a,
  author       = {Xinyun Chen and
                  Chang Liu and
                  Dawn Song},
  title        = {Tree-to-tree Neural Networks for Program Translation},
  booktitle    = {6th International Conference on Learning Representations, {ICLR} 2018,
                  Vancouver, BC, Canada, April 30 - May 3, 2018, Workshop Track Proceedings},
  publisher    = {OpenReview.net},
  year         = {2018},
  url          = {https://openreview.net/forum?id=H1xSvMh8M},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/ChenLS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/FoxSKGSS18,
  author       = {Roy Fox and
                  Richard Shin and
                  Sanjay Krishnan and
                  Ken Goldberg and
                  Dawn Song and
                  Ion Stoica},
  title        = {Parametrized Hierarchical Procedures for Neural Programming},
  booktitle    = {6th International Conference on Learning Representations, {ICLR} 2018,
                  Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings},
  publisher    = {OpenReview.net},
  year         = {2018},
  url          = {https://openreview.net/forum?id=rJl63fZRb},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/FoxSKGSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/He0S18,
  author       = {Warren He and
                  Bo Li and
                  Dawn Song},
  title        = {Decision Boundary Analysis of Adversarial Examples},
  booktitle    = {6th International Conference on Learning Representations, {ICLR} 2018,
                  Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings},
  publisher    = {OpenReview.net},
  year         = {2018},
  url          = {https://openreview.net/forum?id=BkpiPMbA-},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/He0S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/Ma0WEWSSHB18,
  author       = {Xingjun Ma and
                  Bo Li and
                  Yisen Wang and
                  Sarah M. Erfani and
                  Sudanthi N. R. Wijewickrema and
                  Grant Schoenebeck and
                  Dawn Song and
                  Michael E. Houle and
                  James Bailey},
  title        = {Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality},
  booktitle    = {6th International Conference on Learning Representations, {ICLR} 2018,
                  Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings},
  publisher    = {OpenReview.net},
  year         = {2018},
  url          = {https://openreview.net/forum?id=B1gJ1L2aW},
  timestamp    = {Sun, 27 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/Ma0WEWSSHB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/PhilippSC18,
  author       = {George Philipp and
                  Dawn Song and
                  Jaime G. Carbonell},
  title        = {Gradients explode - Deep Networks are shallow - ResNet explained},
  booktitle    = {6th International Conference on Learning Representations, {ICLR} 2018,
                  Vancouver, BC, Canada, April 30 - May 3, 2018, Workshop Track Proceedings},
  publisher    = {OpenReview.net},
  year         = {2018},
  url          = {https://openreview.net/forum?id=rJjcdFkPM},
  timestamp    = {Thu, 04 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/PhilippSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/ShinPS18,
  author       = {Richard Shin and
                  Charles Packer and
                  Dawn Song},
  title        = {Differentiable Neural Network Architecture Search},
  booktitle    = {6th International Conference on Learning Representations, {ICLR} 2018,
                  Vancouver, BC, Canada, April 30 - May 3, 2018, Workshop Track Proceedings},
  publisher    = {OpenReview.net},
  year         = {2018},
  url          = {https://openreview.net/forum?id=BJ-MRKkwG},
  timestamp    = {Thu, 04 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/ShinPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/ShinPS18a,
  author       = {Richard Shin and
                  Illia Polosukhin and
                  Dawn Song},
  title        = {Towards Specification-Directed Program Repair},
  booktitle    = {6th International Conference on Learning Representations, {ICLR} 2018,
                  Vancouver, BC, Canada, April 30 - May 3, 2018, Workshop Track Proceedings},
  publisher    = {OpenReview.net},
  year         = {2018},
  url          = {https://openreview.net/forum?id=B1iZRFkwz},
  timestamp    = {Thu, 04 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/ShinPS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/XiaoZ0HLS18,
  author       = {Chaowei Xiao and
                  Jun{-}Yan Zhu and
                  Bo Li and
                  Warren He and
                  Mingyan Liu and
                  Dawn Song},
  title        = {Spatially Transformed Adversarial Examples},
  booktitle    = {6th International Conference on Learning Representations, {ICLR} 2018,
                  Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings},
  publisher    = {OpenReview.net},
  year         = {2018},
  url          = {https://openreview.net/forum?id=HyydRMZC-},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/XiaoZ0HLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/CaiLS18,
  author       = {Qi{-}Zhi Cai and
                  Chang Liu and
                  Dawn Song},
  editor       = {J{\'{e}}r{\^{o}}me Lang},
  title        = {Curriculum Adversarial Training},
  booktitle    = {Proceedings of the Twenty-Seventh International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2018, July 13-19, 2018, Stockholm,
                  Sweden},
  pages        = {3740--3747},
  publisher    = {ijcai.org},
  year         = {2018},
  url          = {https://doi.org/10.24963/ijcai.2018/520},
  doi          = {10.24963/IJCAI.2018/520},
  timestamp    = {Tue, 20 Aug 2019 16:19:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/CaiLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/XiaoLZHLS18,
  author       = {Chaowei Xiao and
                  Bo Li and
                  Jun{-}Yan Zhu and
                  Warren He and
                  Mingyan Liu and
                  Dawn Song},
  editor       = {J{\'{e}}r{\^{o}}me Lang},
  title        = {Generating Adversarial Examples with Adversarial Networks},
  booktitle    = {Proceedings of the Twenty-Seventh International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2018, July 13-19, 2018, Stockholm,
                  Sweden},
  pages        = {3905--3911},
  publisher    = {ijcai.org},
  year         = {2018},
  url          = {https://doi.org/10.24963/ijcai.2018/543},
  doi          = {10.24963/IJCAI.2018/543},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/XiaoLZHLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/LemieuxPSS18,
  author       = {Caroline Lemieux and
                  Rohan Padhye and
                  Koushik Sen and
                  Dawn Song},
  editor       = {Frank Tip and
                  Eric Bodden},
  title        = {PerfFuzz: automatically generating pathological inputs},
  booktitle    = {Proceedings of the 27th {ACM} {SIGSOFT} International Symposium on
                  Software Testing and Analysis, {ISSTA} 2018, Amsterdam, The Netherlands,
                  July 16-21, 2018},
  pages        = {254--265},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3213846.3213874},
  doi          = {10.1145/3213846.3213874},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issta/LemieuxPSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/ChenLS18,
  author       = {Xinyun Chen and
                  Chang Liu and
                  Dawn Song},
  editor       = {Samy Bengio and
                  Hanna M. Wallach and
                  Hugo Larochelle and
                  Kristen Grauman and
                  Nicol{\`{o}} Cesa{-}Bianchi and
                  Roman Garnett},
  title        = {Tree-to-tree Neural Networks for Program Translation},
  booktitle    = {Advances in Neural Information Processing Systems 31: Annual Conference
                  on Neural Information Processing Systems 2018, NeurIPS 2018, December
                  3-8, 2018, Montr{\'{e}}al, Canada},
  pages        = {2552--2562},
  year         = {2018},
  url          = {https://proceedings.neurips.cc/paper/2018/hash/d759175de8ea5b1d9a2660e45554894f-Abstract.html},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/ChenLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/ShinPS18,
  author       = {Richard Shin and
                  Illia Polosukhin and
                  Dawn Song},
  editor       = {Samy Bengio and
                  Hanna M. Wallach and
                  Hugo Larochelle and
                  Kristen Grauman and
                  Nicol{\`{o}} Cesa{-}Bianchi and
                  Roman Garnett},
  title        = {Improving Neural Program Synthesis with Inferred Execution Traces},
  booktitle    = {Advances in Neural Information Processing Systems 31: Annual Conference
                  on Neural Information Processing Systems 2018, NeurIPS 2018, December
                  3-8, 2018, Montr{\'{e}}al, Canada},
  pages        = {8931--8940},
  year         = {2018},
  url          = {https://proceedings.neurips.cc/paper/2018/hash/7776e88b0c189539098176589250bcba-Abstract.html},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/ShinPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KosFS18,
  author       = {Jernej Kos and
                  Ian Fischer and
                  Dawn Song},
  title        = {Adversarial Examples for Generative Models},
  booktitle    = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San
                  Francisco, CA, USA, May 24, 2018},
  pages        = {36--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SPW.2018.00014},
  doi          = {10.1109/SPW.2018.00014},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KosFS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiXLRWCZYS18,
  author       = {Huichen Li and
                  Xiaojun Xu and
                  Chang Liu and
                  Teng Ren and
                  Kun Wu and
                  Xuezhi Cao and
                  Weinan Zhang and
                  Yong Yu and
                  Dawn Song},
  title        = {A Machine Learning Approach to Prevent Malicious Calls over Telephony
                  Networks},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {53--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00034},
  doi          = {10.1109/SP.2018.00034},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LiXLRWCZYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/SongEEF0RTPK18,
  author       = {Dawn Song and
                  Kevin Eykholt and
                  Ivan Evtimov and
                  Earlence Fernandes and
                  Bo Li and
                  Amir Rahmati and
                  Florian Tram{\`{e}}r and
                  Atul Prakash and
                  Tadayoshi Kohno},
  editor       = {Christian Rossow and
                  Yves Younan},
  title        = {Physical Adversarial Examples for Object Detectors},
  booktitle    = {12th {USENIX} Workshop on Offensive Technologies, {WOOT} 2018, Baltimore,
                  MD, USA, August 13-14, 2018},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/woot18/presentation/eykholt},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/woot/SongEEF0RTPK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/mc/18/KuznetsovSPCSS18,
  author       = {Volodymyr Kuznetsov and
                  Laszlo Szekeres and
                  Mathias Payer and
                  George Candea and
                  R. Sekar and
                  Dawn Song},
  editor       = {Per Larsen and
                  Ahmad{-}Reza Sadeghi},
  title        = {Code-pointer integrity},
  booktitle    = {The Continuing Arms Race: Code-Reuse Attacks and Defenses},
  pages        = {81--116},
  publisher    = {{ACM} / Morgan {\&} Claypool},
  year         = {2018},
  url          = {https://doi.org/10.1145/3129743.3129748},
  doi          = {10.1145/3129743.3129748},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/mc/18/KuznetsovSPCSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-02610,
  author       = {Chaowei Xiao and
                  Bo Li and
                  Jun{-}Yan Zhu and
                  Warren He and
                  Mingyan Liu and
                  Dawn Song},
  title        = {Generating Adversarial Examples with Adversarial Networks},
  journal      = {CoRR},
  volume       = {abs/1801.02610},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.02610},
  eprinttype    = {arXiv},
  eprint       = {1801.02610},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-02610.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-02612,
  author       = {Chaowei Xiao and
                  Jun{-}Yan Zhu and
                  Bo Li and
                  Warren He and
                  Mingyan Liu and
                  Dawn Song},
  title        = {Spatially Transformed Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1801.02612},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.02612},
  eprinttype    = {arXiv},
  eprint       = {1801.02612},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-02612.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-02613,
  author       = {Xingjun Ma and
                  Bo Li and
                  Yisen Wang and
                  Sarah M. Erfani and
                  Sudanthi N. R. Wijewickrema and
                  Michael E. Houle and
                  Grant Schoenebeck and
                  Dawn Song and
                  James Bailey},
  title        = {Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality},
  journal      = {CoRR},
  volume       = {abs/1801.02613},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.02613},
  eprinttype    = {arXiv},
  eprint       = {1801.02613},
  timestamp    = {Sun, 27 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-02613.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-03691,
  author       = {Xinyun Chen and
                  Chang Liu and
                  Dawn Song},
  title        = {Tree-to-tree Neural Networks for Program Translation},
  journal      = {CoRR},
  volume       = {abs/1802.03691},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.03691},
  eprinttype    = {arXiv},
  eprint       = {1802.03691},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-03691.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-08232,
  author       = {Nicholas Carlini and
                  Chang Liu and
                  Jernej Kos and
                  {\'{U}}lfar Erlingsson and
                  Dawn Song},
  title        = {The Secret Sharer: Measuring Unintended Neural Network Memorization
                  {\&} Extracting Secrets},
  journal      = {CoRR},
  volume       = {abs/1802.08232},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.08232},
  eprinttype    = {arXiv},
  eprint       = {1802.08232},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-08232.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-02566,
  author       = {Huichen Li and
                  Xiaojun Xu and
                  Chang Liu and
                  Teng Ren and
                  Kun Wu and
                  Xuezhi Cao and
                  Weinan Zhang and
                  Yong Yu and
                  Dawn Song},
  title        = {A Machine Learning Approach To Prevent Malicious Calls Over Telephony
                  Networks},
  journal      = {CoRR},
  volume       = {abs/1804.02566},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.02566},
  eprinttype    = {arXiv},
  eprint       = {1804.02566},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-02566.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-05141,
  author       = {Raymond Cheng and
                  Fan Zhang and
                  Jernej Kos and
                  Warren He and
                  Nicholas Hynes and
                  Noah M. Johnson and
                  Ari Juels and
                  Andrew Miller and
                  Dawn Song},
  title        = {Ekiden: {A} Platform for Confidentiality-Preserving, Trustworthy,
                  and Performant Smart Contract Execution},
  journal      = {CoRR},
  volume       = {abs/1804.05141},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.05141},
  eprinttype    = {arXiv},
  eprint       = {1804.05141},
  timestamp    = {Tue, 09 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-05141.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-04807,
  author       = {Qi{-}Zhi Cai and
                  Min Du and
                  Chang Liu and
                  Dawn Song},
  title        = {Curriculum Adversarial Training},
  journal      = {CoRR},
  volume       = {abs/1805.04807},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.04807},
  eprinttype    = {arXiv},
  eprint       = {1805.04807},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-04807.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-00608,
  author       = {Daniel Huang and
                  Prafulla Dhariwal and
                  Dawn Song and
                  Ilya Sutskever},
  title        = {GamePad: {A} Learning Environment for Theorem Proving},
  journal      = {CoRR},
  volume       = {abs/1806.00608},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.00608},
  eprinttype    = {arXiv},
  eprint       = {1806.00608},
  timestamp    = {Sun, 12 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-00608.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-06689,
  author       = {Nick Hynes and
                  Raymond Cheng and
                  Dawn Song},
  title        = {Efficient Deep Learning on Multi-Source Private Data},
  journal      = {CoRR},
  volume       = {abs/1807.06689},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.06689},
  eprinttype    = {arXiv},
  eprint       = {1807.06689},
  timestamp    = {Thu, 19 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-06689.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-07769,
  author       = {Kevin Eykholt and
                  Ivan Evtimov and
                  Earlence Fernandes and
                  Bo Li and
                  Amir Rahmati and
                  Florian Tram{\`{e}}r and
                  Atul Prakash and
                  Tadayoshi Kohno and
                  Dawn Song},
  title        = {Physical Adversarial Examples for Object Detectors},
  journal      = {CoRR},
  volume       = {abs/1807.07769},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.07769},
  eprinttype    = {arXiv},
  eprint       = {1807.07769},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-07769.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-07750,
  author       = {Noah M. Johnson and
                  Joseph P. Near and
                  Joseph M. Hellerstein and
                  Dawn Song},
  title        = {Chorus: Differential Privacy via Query Rewriting},
  journal      = {CoRR},
  volume       = {abs/1809.07750},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.07750},
  eprinttype    = {arXiv},
  eprint       = {1809.07750},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-07750.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-10875,
  author       = {Zhuolin Yang and
                  Bo Li and
                  Pin{-}Yu Chen and
                  Dawn Song},
  title        = {Characterizing Audio Adversarial Examples Using Temporal Dependency},
  journal      = {CoRR},
  volume       = {abs/1809.10875},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.10875},
  eprinttype    = {arXiv},
  eprint       = {1809.10875},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-10875.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-05162,
  author       = {Chaowei Xiao and
                  Ruizhi Deng and
                  Bo Li and
                  Fisher Yu and
                  Mingyan Liu and
                  Dawn Song},
  title        = {Characterizing Adversarial Examples Based on Spatial Consistency Information
                  for Semantic Segmentation},
  journal      = {CoRR},
  volume       = {abs/1810.05162},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.05162},
  eprinttype    = {arXiv},
  eprint       = {1810.05162},
  timestamp    = {Mon, 18 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-05162.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-12282,
  author       = {Charles Packer and
                  Katelyn Gao and
                  Jernej Kos and
                  Philipp Kr{\"{a}}henb{\"{u}}hl and
                  Vladlen Koltun and
                  Dawn Song},
  title        = {Assessing Generalization in Deep Reinforcement Learning},
  journal      = {CoRR},
  volume       = {abs/1810.12282},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.12282},
  eprinttype    = {arXiv},
  eprint       = {1810.12282},
  timestamp    = {Thu, 01 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-12282.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-12881,
  author       = {Mingjie Sun and
                  Jian Tang and
                  Huichen Li and
                  Bo Li and
                  Chaowei Xiao and
                  Yao Chen and
                  Dawn Song},
  title        = {Data Poisoning Attack against Unsupervised Node Embedding Methods},
  journal      = {CoRR},
  volume       = {abs/1810.12881},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.12881},
  eprinttype    = {arXiv},
  eprint       = {1810.12881},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-12881.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-10605,
  author       = {Ilia A. Lebedev and
                  Kyle Hogan and
                  Jules Drean and
                  David Kohlbrenner and
                  Dayeol Lee and
                  Krste Asanovic and
                  Dawn Song and
                  Srinivas Devadas},
  title        = {Sanctorum: {A} lightweight security monitor for secure enclaves},
  journal      = {CoRR},
  volume       = {abs/1812.10605},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.10605},
  eprinttype    = {arXiv},
  eprint       = {1812.10605},
  timestamp    = {Thu, 03 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-10605.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/talg/ShiCRS17,
  author       = {Elaine Shi and
                  T.{-}H. Hubert Chan and
                  Eleanor Gilbert Rieffel and
                  Dawn Song},
  title        = {Distributed Private Data Analysis: Lower Bounds and Practical Constructions},
  journal      = {{ACM} Trans. Algorithms},
  volume       = {13},
  number       = {4},
  pages        = {50:1--50:38},
  year         = {2017},
  url          = {https://doi.org/10.1145/3146549},
  doi          = {10.1145/3146549},
  timestamp    = {Thu, 09 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/talg/ShiCRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuLFYSS17,
  author       = {Xiaojun Xu and
                  Chang Liu and
                  Qian Feng and
                  Heng Yin and
                  Le Song and
                  Dawn Song},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Neural Network-based Graph Embedding for Cross-Platform Binary Code
                  Similarity Detection},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {363--376},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134018},
  doi          = {10.1145/3133956.3134018},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuLFYSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/GongOWCSSJB17,
  author       = {Neil Zhenqiang Gong and
                  Altay Ozen and
                  Yu Wu and
                  Xiaoyu Cao and
                  Richard Shin and
                  Dawn Song and
                  Hongxia Jin and
                  Xuan Bao},
  editor       = {Kisung Lee and
                  Ling Liu},
  title        = {{PIANO:} Proximity-Based User Authentication on Voice-Powered Internet-of-Things
                  Devices},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {2212--2219},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCS.2017.68},
  doi          = {10.1109/ICDCS.2017.68},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/GongOWCSSJB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/CaiSS17,
  author       = {Jonathon Cai and
                  Richard Shin and
                  Dawn Song},
  title        = {Making Neural Programming Architectures Generalize via Recursion},
  booktitle    = {5th International Conference on Learning Representations, {ICLR} 2017,
                  Toulon, France, April 24-26, 2017, Conference Track Proceedings},
  publisher    = {OpenReview.net},
  year         = {2017},
  url          = {https://openreview.net/forum?id=BkbY4psgg},
  timestamp    = {Thu, 04 Apr 2019 13:20:07 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/CaiSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/KosS17,
  author       = {Jernej Kos and
                  Dawn Song},
  title        = {Delving into adversarial attacks on deep policies},
  booktitle    = {5th International Conference on Learning Representations, {ICLR} 2017,
                  Toulon, France, April 24-26, 2017, Workshop Track Proceedings},
  publisher    = {OpenReview.net},
  year         = {2017},
  url          = {https://openreview.net/forum?id=BJcib5mFe},
  timestamp    = {Thu, 04 Apr 2019 13:20:08 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/KosS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/LiuCLS17,
  author       = {Yanpei Liu and
                  Xinyun Chen and
                  Chang Liu and
                  Dawn Song},
  title        = {Delving into Transferable Adversarial Examples and Black-box Attacks},
  booktitle    = {5th International Conference on Learning Representations, {ICLR} 2017,
                  Toulon, France, April 24-26, 2017, Conference Track Proceedings},
  publisher    = {OpenReview.net},
  year         = {2017},
  url          = {https://openreview.net/forum?id=Sys6GJqxl},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/LiuCLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/HeWCCS17,
  author       = {Warren He and
                  James Wei and
                  Xinyun Chen and
                  Nicholas Carlini and
                  Dawn Song},
  editor       = {William Enck and
                  Collin Mulliner},
  title        = {Adversarial Example Defense: Ensembles of Weak Defenses are not Strong},
  booktitle    = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver,
                  BC, Canada, August 14-15, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/woot17/workshop-program/presentation/he},
  timestamp    = {Mon, 01 Feb 2021 08:41:51 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/HeWCCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/FrankHJKMMPSS17,
  author       = {Mario Frank and
                  Tiffany Hwu and
                  Sakshi Jain and
                  Robert T. Knight and
                  Ivan Martinovic and
                  Prateek Mittal and
                  Daniele Perito and
                  Ivo Sluganovic and
                  Dawn Song},
  editor       = {Bhavani Thuraisingham and
                  Adam J. Lee},
  title        = {Using EEG-Based {BCI} Devices to Subliminally Probe for Private Information},
  booktitle    = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society,
                  Dallas, TX, USA, October 30 - November 3, 2017},
  pages        = {133--136},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139550.3139559},
  doi          = {10.1145/3139550.3139559},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/FrankHJKMMPSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KosFS17,
  author       = {Jernej Kos and
                  Ian Fischer and
                  Dawn Song},
  title        = {Adversarial examples for generative models},
  journal      = {CoRR},
  volume       = {abs/1702.06832},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.06832},
  eprinttype    = {arXiv},
  eprint       = {1702.06832},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KosFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GongOWCSSJB17,
  author       = {Neil Zhenqiang Gong and
                  Altay Ozen and
                  Yu Wu and
                  Xiaoyu Cao and
                  Eui Chul Richard Shin and
                  Dawn Xiaodong Song and
                  Hongxia Jin and
                  Xuan Bao},
  title        = {{PIANO:} Proximity-based User Authentication on Voice-Powered Internet-of-Things
                  Devices},
  journal      = {CoRR},
  volume       = {abs/1704.03118},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.03118},
  eprinttype    = {arXiv},
  eprint       = {1704.03118},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GongOWCSSJB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CaiSS17,
  author       = {Jonathon Cai and
                  Richard Shin and
                  Dawn Song},
  title        = {Making Neural Programming Architectures Generalize via Recursion},
  journal      = {CoRR},
  volume       = {abs/1704.06611},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.06611},
  eprinttype    = {arXiv},
  eprint       = {1704.06611},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CaiSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KosS17,
  author       = {Jernej Kos and
                  Dawn Song},
  title        = {Delving into adversarial attacks on deep policies},
  journal      = {CoRR},
  volume       = {abs/1705.06452},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.06452},
  eprinttype    = {arXiv},
  eprint       = {1705.06452},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KosS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChenLS17a,
  author       = {Xinyun Chen and
                  Chang Liu and
                  Dawn Song},
  title        = {Learning Neural Programs To Parse Programs},
  journal      = {CoRR},
  volume       = {abs/1706.01284},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.01284},
  eprinttype    = {arXiv},
  eprint       = {1706.01284},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChenLS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HeWCCS17,
  author       = {Warren He and
                  James Wei and
                  Xinyun Chen and
                  Nicholas Carlini and
                  Dawn Song},
  title        = {Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong},
  journal      = {CoRR},
  volume       = {abs/1706.04701},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.04701},
  eprinttype    = {arXiv},
  eprint       = {1706.04701},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HeWCCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JohnsonNS17,
  author       = {Noah M. Johnson and
                  Joseph P. Near and
                  Dawn Xiaodong Song},
  title        = {Practical Differential Privacy for {SQL} Queries Using Elastic Sensitivity},
  journal      = {CoRR},
  volume       = {abs/1706.09479},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.09479},
  eprinttype    = {arXiv},
  eprint       = {1706.09479},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JohnsonNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/EvtimovEFKLPRS17,
  author       = {Ivan Evtimov and
                  Kevin Eykholt and
                  Earlence Fernandes and
                  Tadayoshi Kohno and
                  Bo Li and
                  Atul Prakash and
                  Amir Rahmati and
                  Dawn Song},
  title        = {Robust Physical-World Attacks on Machine Learning Models},
  journal      = {CoRR},
  volume       = {abs/1707.08945},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.08945},
  eprinttype    = {arXiv},
  eprint       = {1707.08945},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/EvtimovEFKLPRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-06525,
  author       = {Xiaojun Xu and
                  Chang Liu and
                  Qian Feng and
                  Heng Yin and
                  Le Song and
                  Dawn Song},
  title        = {Neural Network-based Graph Embedding for Cross-Platform Binary Code
                  Similarity Detection},
  journal      = {CoRR},
  volume       = {abs/1708.06525},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.06525},
  eprinttype    = {arXiv},
  eprint       = {1708.06525},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-06525.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-08693,
  author       = {Xiaojun Xu and
                  Xinyun Chen and
                  Chang Liu and
                  Anna Rohrbach and
                  Trevor Darrell and
                  Dawn Song},
  title        = {Can you fool {AI} with adversarial examples on a visual Turing test?},
  journal      = {CoRR},
  volume       = {abs/1709.08693},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.08693},
  eprinttype    = {arXiv},
  eprint       = {1709.08693},
  timestamp    = {Tue, 23 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-08693.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-04436,
  author       = {Xiaojun Xu and
                  Chang Liu and
                  Dawn Song},
  title        = {SQLNet: Generating Structured Queries From Natural Language Without
                  Reinforcement Learning},
  journal      = {CoRR},
  volume       = {abs/1711.04436},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.04436},
  eprinttype    = {arXiv},
  eprint       = {1711.04436},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-04436.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-05526,
  author       = {Xinyun Chen and
                  Chang Liu and
                  Bo Li and
                  Kimberly Lu and
                  Dawn Song},
  title        = {Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning},
  journal      = {CoRR},
  volume       = {abs/1712.05526},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.05526},
  eprinttype    = {arXiv},
  eprint       = {1712.05526},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-05526.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-05577,
  author       = {George Philipp and
                  Dawn Song and
                  Jaime G. Carbonell},
  title        = {Gradients explode - Deep Networks are shallow - ResNet explained},
  journal      = {CoRR},
  volume       = {abs/1712.05577},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.05577},
  eprinttype    = {arXiv},
  eprint       = {1712.05577},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-05577.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-05855,
  author       = {Ion Stoica and
                  Dawn Song and
                  Raluca Ada Popa and
                  David A. Patterson and
                  Michael W. Mahoney and
                  Randy H. Katz and
                  Anthony D. Joseph and
                  Michael I. Jordan and
                  Joseph M. Hellerstein and
                  Joseph E. Gonzalez and
                  Ken Goldberg and
                  Ali Ghodsi and
                  David E. Culler and
                  Pieter Abbeel},
  title        = {A Berkeley View of Systems Challenges for {AI}},
  journal      = {CoRR},
  volume       = {abs/1712.05855},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.05855},
  eprinttype    = {arXiv},
  eprint       = {1712.05855},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-05855.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-08062,
  author       = {Kevin Eykholt and
                  Ivan Evtimov and
                  Earlence Fernandes and
                  Bo Li and
                  Dawn Song and
                  Tadayoshi Kohno and
                  Amir Rahmati and
                  Atul Prakash and
                  Florian Tram{\`{e}}r},
  title        = {Note on Attacking Object Detectors with Adversarial Stickers},
  journal      = {CoRR},
  volume       = {abs/1712.08062},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.08062},
  eprinttype    = {arXiv},
  eprint       = {1712.08062},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-08062.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-09491,
  author       = {Arjun Nitin Bhagoji and
                  Warren He and
                  Bo Li and
                  Dawn Song},
  title        = {Exploring the Space of Black-box Attacks on Deep Neural Networks},
  journal      = {CoRR},
  volume       = {abs/1712.09491},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.09491},
  eprinttype    = {arXiv},
  eprint       = {1712.09491},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-09491.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MillerXCSS16,
  author       = {Andrew Miller and
                  Yu Xia and
                  Kyle Croman and
                  Elaine Shi and
                  Dawn Song},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {The Honey Badger of {BFT} Protocols},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {31--42},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978399},
  doi          = {10.1145/2976749.2978399},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MillerXCSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HoLMHSW16,
  author       = {Grant Ho and
                  Derek Leung and
                  Pratyush Mishra and
                  Ashkan Hosseini and
                  Dawn Song and
                  David A. Wagner},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Smart Locks: Lessons for Securing Commodity Internet of Things Devices},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {461--472},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897886},
  doi          = {10.1145/2897845.2897886},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HoLMHSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CromanDEGJKMSSS16,
  author       = {Kyle Croman and
                  Christian Decker and
                  Ittay Eyal and
                  Adem Efe Gencer and
                  Ari Juels and
                  Ahmed E. Kosba and
                  Andrew Miller and
                  Prateek Saxena and
                  Elaine Shi and
                  Emin G{\"{u}}n Sirer and
                  Dawn Song and
                  Roger Wattenhofer},
  editor       = {Jeremy Clark and
                  Sarah Meiklejohn and
                  Peter Y. A. Ryan and
                  Dan S. Wallach and
                  Michael Brenner and
                  Kurt Rohloff},
  title        = {On Scaling Decentralized Blockchains - {(A} Position Paper)},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2016 International
                  Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
                  26, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9604},
  pages        = {106--125},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53357-4\_8},
  doi          = {10.1007/978-3-662-53357-4\_8},
  timestamp    = {Wed, 12 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CromanDEGJKMSSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmcad/Song16,
  author       = {Dawn Song},
  editor       = {Ruzica Piskac and
                  Muralidhar Talupur},
  title        = {Formal verification for computer security: Lessons learned and future
                  directions},
  booktitle    = {2016 Formal Methods in Computer-Aided Design, {FMCAD} 2016, Mountain
                  View, CA, USA, October 3-6, 2016},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/FMCAD.2016.7886647},
  doi          = {10.1109/FMCAD.2016.7886647},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/fmcad/Song16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/KatzSS16,
  author       = {Gilad Katz and
                  Eui Chul Richard Shin and
                  Dawn Song},
  editor       = {Francesco Bonchi and
                  Josep Domingo{-}Ferrer and
                  Ricardo Baeza{-}Yates and
                  Zhi{-}Hua Zhou and
                  Xindong Wu},
  title        = {ExploreKit: Automatic Feature Generation and Selection},
  booktitle    = {{IEEE} 16th International Conference on Data Mining, {ICDM} 2016,
                  December 12-15, 2016, Barcelona, Spain},
  pages        = {979--984},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICDM.2016.0123},
  doi          = {10.1109/ICDM.2016.0123},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/KatzSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhangSCPLDS16,
  author       = {Chao Zhang and
                  Dawn Song and
                  Scott A. Carr and
                  Mathias Payer and
                  Tongxin Li and
                  Yu Ding and
                  Chengyu Song},
  title        = {VTrust: Regaining Trust on Virtual Calls},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/vtrust-regaining-trust-virtual-calls.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhangSCPLDS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/LiuCSCS16,
  author       = {Chang Liu and
                  Xinyun Chen and
                  Eui Chul Richard Shin and
                  Mingcheng Chen and
                  Dawn Xiaodong Song},
  editor       = {Daniel D. Lee and
                  Masashi Sugiyama and
                  Ulrike von Luxburg and
                  Isabelle Guyon and
                  Roman Garnett},
  title        = {Latent Attention For If-Then Program Synthesis},
  booktitle    = {Advances in Neural Information Processing Systems 29: Annual Conference
                  on Neural Information Processing Systems 2016, December 5-10, 2016,
                  Barcelona, Spain},
  pages        = {4574--4582},
  year         = {2016},
  url          = {https://proceedings.neurips.cc/paper/2016/hash/716e1b8c6cd17b771da77391355749f3-Abstract.html},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/LiuCSCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChenLSSC16,
  author       = {Xinyun Chen and
                  Chang Liu and
                  Eui Chul Richard Shin and
                  Dawn Song and
                  Mingcheng Chen},
  title        = {Latent Attention For If-Then Program Synthesis},
  journal      = {CoRR},
  volume       = {abs/1611.01867},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.01867},
  eprinttype    = {arXiv},
  eprint       = {1611.01867},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChenLSSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiuCLS16,
  author       = {Yanpei Liu and
                  Xinyun Chen and
                  Chang Liu and
                  Dawn Song},
  title        = {Delving into Transferable Adversarial Examples and Black-box Attacks},
  journal      = {CoRR},
  volume       = {abs/1611.02770},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.02770},
  eprinttype    = {arXiv},
  eprint       = {1611.02770},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LiuCLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MillerXCSS16,
  author       = {Andrew Miller and
                  Yu Xia and
                  Kyle Croman and
                  Elaine Shi and
                  Dawn Song},
  title        = {The Honey Badger of {BFT} Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MillerXCSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/ChenHADMS15,
  author       = {Kevin Zhijie Chen and
                  Warren He and
                  Devdatta Akhawe and
                  Vijay D'Silva and
                  Prateek Mittal and
                  Dawn Song},
  editor       = {George Candea},
  title        = {{ASPIRE:} Iterative Specification Synthesis for Security},
  booktitle    = {15th Workshop on Hot Topics in Operating Systems, HotOS XV, Kartause
                  Ittingen, Switzerland, May 18-20, 2015},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/hotos15/workshop-program/presentation/chen\_kevin},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/hotos/ChenHADMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhangNCSCS15,
  author       = {Chao Zhang and
                  Mehrdad Niknami and
                  Kevin Zhijie Chen and
                  Chengyu Song and
                  Zhaofeng Chen and
                  Dawn Song},
  title        = {JITScope: Protecting web users from control-flow hijacking attacks},
  booktitle    = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015,
                  Kowloon, Hong Kong, April 26 - May 1, 2015},
  pages        = {567--575},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFOCOM.2015.7218424},
  doi          = {10.1109/INFOCOM.2015.7218424},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhangNCSCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhangSCCS15,
  author       = {Chao Zhang and
                  Chengyu Song and
                  Kevin Zhijie Chen and
                  Zhaofeng Chen and
                  Dawn Song},
  title        = {VTint: Protecting Virtual Function Tables' Integrity},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/vtint-protecting-virtual-function-tables-integrity},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhangSCCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DSilvaPS15,
  author       = {Vijay D'Silva and
                  Mathias Payer and
                  Dawn Xiaodong Song},
  title        = {The Correctness-Security Gap in Compiler Optimization},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy Workshops, {SPW} 2015,
                  San Jose, CA, USA, May 21-22, 2015},
  pages        = {73--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SPW.2015.33},
  doi          = {10.1109/SPW.2015.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/DSilvaPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ShinSM15,
  author       = {Eui Chul Richard Shin and
                  Dawn Song and
                  Reza Moazzezi},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Recognizing Functions in Binaries with Neural Networks},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {611--626},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/shin},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ShinSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tist/GongTMHSSSS14,
  author       = {Neil Zhenqiang Gong and
                  Ameet Talwalkar and
                  Lester W. Mackey and
                  Ling Huang and
                  Eui Chul Richard Shin and
                  Emil Stefanov and
                  Elaine Shi and
                  Dawn Song},
  title        = {Joint Link Prediction and Attribute Inference Using a Social-Attribute
                  Network},
  journal      = {{ACM} Trans. Intell. Syst. Technol.},
  volume       = {5},
  number       = {2},
  pages        = {27:1--27:20},
  year         = {2014},
  url          = {https://doi.org/10.1145/2594455},
  doi          = {10.1145/2594455},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tist/GongTMHSSSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HeAJSS14,
  author       = {Warren He and
                  Devdatta Akhawe and
                  Sumeet Jain and
                  Elaine Shi and
                  Dawn Xiaodong Song},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {ShadowCrypt: Encrypted Web Applications for Everyone},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1028--1039},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660326},
  doi          = {10.1145/2660267.2660326},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HeAJSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/KuznetsovSPCSS14,
  author       = {Volodymyr Kuznetsov and
                  Laszlo Szekeres and
                  Mathias Payer and
                  George Candea and
                  R. Sekar and
                  Dawn Song},
  editor       = {Jason Flinn and
                  Hank Levy},
  title        = {Code-Pointer Integrity},
  booktitle    = {11th {USENIX} Symposium on Operating Systems Design and Implementation,
                  {OSDI} '14, Broomfield, CO, USA, October 6-8, 2014},
  pages        = {147--163},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/osdi14/technical-sessions/presentation/kuznetsov},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/osdi/KuznetsovSPCSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiHAS14,
  author       = {Zhiwei Li and
                  Warren He and
                  Devdatta Akhawe and
                  Dawn Song},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {The Emperor's New Password Manager: Security Analysis of Web-based
                  Password Managers},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {465--479},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/li\_zhiwei},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LiHAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/AkhaweHLMS14,
  author       = {Devdatta Akhawe and
                  Warren He and
                  Zhiwei Li and
                  Reza Moazzezi and
                  Dawn Song},
  editor       = {Sergey Bratus and
                  Felix "FX" Lindner},
  title        = {Clickjacking Revisited: {A} Perceptual View of {UI} Security},
  booktitle    = {8th {USENIX} Workshop on Offensive Technologies, {WOOT} '14, San Diego,
                  CA, USA, August 19, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/woot14/workshop-program/presentation/akhawe},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/AkhaweHLMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/YinS13,
  author       = {Heng Yin and
                  Dawn Song},
  title        = {Automatic Malware Analysis - An Emulator Based Approach},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-5523-3},
  doi          = {10.1007/978-1-4614-5523-3},
  isbn         = {978-1-4614-5522-6},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/sbcs/YinS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/CaballeroS13,
  author       = {Juan Caballero and
                  Dawn Song},
  title        = {Automatic protocol reverse-engineering: Message format extraction
                  and field semantics inference},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {2},
  pages        = {451--474},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2012.08.003},
  doi          = {10.1016/J.COMNET.2012.08.003},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/CaballeroS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FrankBMMS13,
  author       = {Mario Frank and
                  Ralf Biedert and
                  Eugene Ma and
                  Ivan Martinovic and
                  Dawn Song},
  title        = {Touchalytics: On the Applicability of Touchscreen Input as a Behavioral
                  Biometric for Continuous Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {1},
  pages        = {136--148},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2012.2225048},
  doi          = {10.1109/TIFS.2012.2225048},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FrankBMMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaasLSTSAKS13,
  author       = {Martin Maas and
                  Eric Love and
                  Emil Stefanov and
                  Mohit Tiwari and
                  Elaine Shi and
                  Krste Asanovic and
                  John Kubiatowicz and
                  Dawn Song},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {{PHANTOM:} practical oblivious computation in a secure processor},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {311--324},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516692},
  doi          = {10.1145/2508859.2516692},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MaasLSTSAKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CaseldenBPMS13,
  author       = {Dan Caselden and
                  Alex Bazhanyuk and
                  Mathias Payer and
                  Stephen McCamant and
                  Dawn Song},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {{HI-CFG:} Construction by Binary Analysis and Application to Attack
                  Polymorphism},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {164--181},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_10},
  doi          = {10.1007/978-3-642-40203-6\_10},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CaseldenBPMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AkhaweLHSS13,
  author       = {Devdatta Akhawe and
                  Frank Li and
                  Warren He and
                  Prateek Saxena and
                  Dawn Song},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Data-Confined {HTML5} Applications},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {736--754},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_41},
  doi          = {10.1007/978-3-642-40203-6\_41},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AkhaweLHSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/DaiTWNS13,
  author       = {Shuaifu Dai and
                  Alok Tongaonkar and
                  Xiaoyin Wang and
                  Antonio Nucci and
                  Dawn Song},
  title        = {NetworkProfiler: Towards automatic fingerprinting of Android apps},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19,
                  2013},
  pages        = {809--817},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INFCOM.2013.6566868},
  doi          = {10.1109/INFCOM.2013.6566868},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/DaiTWNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/ChoDS13,
  author       = {Chia Yuan Cho and
                  Vijay D'Silva and
                  Dawn Song},
  editor       = {Ewen Denney and
                  Tevfik Bultan and
                  Andreas Zeller},
  title        = {{BLITZ:} Compositional bounded model checking for real-world programs},
  booktitle    = {2013 28th {IEEE/ACM} International Conference on Automated Software
                  Engineering, {ASE} 2013, Silicon Valley, CA, USA, November 11-15,
                  2013},
  pages        = {136--146},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASE.2013.6693074},
  doi          = {10.1109/ASE.2013.6693074},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/ChoDS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChenJDDMMWRS13,
  author       = {Kevin Zhijie Chen and
                  Noah M. Johnson and
                  Vijay D'Silva and
                  Shuaifu Dai and
                  Kyle MacNamara and
                  Thomas R. Magrino and
                  Edward XueJun Wu and
                  Martin C. Rinard and
                  Dawn Xiaodong Song},
  title        = {Contextual Policy Enforcement in Android Applications with Permission
                  Event Graphs},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/contextual-policy-enforcement-android-applications-permission-event-graphs},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ChenJDDMMWRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MittalPS13,
  author       = {Prateek Mittal and
                  Charalampos Papamanthou and
                  Dawn Xiaodong Song},
  title        = {Preserving Link Privacy in Social Network Based Systems},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/preserving-link-privacy-social-network-based-systems},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/MittalPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/TongaonkarDNS13,
  author       = {Alok Tongaonkar and
                  Shuaifu Dai and
                  Antonio Nucci and
                  Dawn Song},
  editor       = {Matthew Roughan and
                  Rocky K. C. Chang},
  title        = {Understanding Mobile App Usage Patterns Using In-App Advertisements},
  booktitle    = {Passive and Active Measurement - 14th International Conference, {PAM}
                  2013, Hong Kong, China, March 18-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7799},
  pages        = {63--72},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36516-4\_7},
  doi          = {10.1007/978-3-642-36516-4\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/TongaonkarDNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prisms/BoehmCFHKLMS13,
  author       = {Arman Boehm and
                  Dongqu Chen and
                  Mario Frank and
                  Ling Huang and
                  Cynthia Kuo and
                  Tihomir Lolic and
                  Ivan Martinovic and
                  Dawn Song},
  title        = {{SAFE:} Secure authentication with Face and Eyes},
  booktitle    = {2013 International Conference on Privacy and Security in Mobile Systems,
                  {PRISMS} 2013, Atlantic City, NJ, USA, June 24-27, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/PRISMS.2013.6927175},
  doi          = {10.1109/PRISMS.2013.6927175},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/prisms/BoehmCFHKLMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SzekeresPWS13,
  author       = {Laszlo Szekeres and
                  Mathias Payer and
                  Tao Wei and
                  Dawn Song},
  title        = {SoK: Eternal War in Memory},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {48--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.13},
  doi          = {10.1109/SP.2013.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SzekeresPWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangWCDSMSZ13,
  author       = {Chao Zhang and
                  Tao Wei and
                  Zhaofeng Chen and
                  Lei Duan and
                  Laszlo Szekeres and
                  Stephen McCamant and
                  Dawn Song and
                  Wei Zou},
  title        = {Practical Control Flow Integrity and Randomization for Binary Executables},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {559--573},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.44},
  doi          = {10.1109/SP.2013.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangWCDSMSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-6309,
  author       = {Neil Zhenqiang Gong and
                  Wenchang Xu and
                  Dawn Song},
  title        = {Reciprocity in Social Networks: Measurements, Predictions, and Implications},
  journal      = {CoRR},
  volume       = {abs/1302.6309},
  year         = {2013},
  url          = {http://arxiv.org/abs/1302.6309},
  eprinttype    = {arXiv},
  eprint       = {1302.6309},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1302-6309.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FrankHJKMMPS13,
  author       = {Mario Frank and
                  Tiffany Hwu and
                  Sakshi Jain and
                  Robert T. Knight and
                  Ivan Martinovic and
                  Prateek Mittal and
                  Daniele Perito and
                  Dawn Song},
  title        = {Subliminal Probing for Private Information via EEG-Based {BCI} Devices},
  journal      = {CoRR},
  volume       = {abs/1312.6052},
  year         = {2013},
  url          = {http://arxiv.org/abs/1312.6052},
  eprinttype    = {arXiv},
  eprint       = {1312.6052},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FrankHJKMMPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SongSFS12,
  author       = {Dawn Song and
                  Elaine Shi and
                  Ian Fischer and
                  Umesh Shankar},
  title        = {Cloud Data Protection for the Masses},
  journal      = {Computer},
  volume       = {45},
  number       = {1},
  pages        = {39--45},
  year         = {2012},
  url          = {https://doi.org/10.1109/MC.2012.1},
  doi          = {10.1109/MC.2012.1},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SongSFS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fmsd/BabicRS12,
  author       = {Domagoj Babic and
                  Daniel Reynaud and
                  Dawn Song},
  title        = {Recognizing malicious software behaviors with tree automata inference},
  journal      = {Formal Methods Syst. Des.},
  volume       = {41},
  number       = {1},
  pages        = {107--128},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10703-012-0149-1},
  doi          = {10.1007/S10703-012-0149-1},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fmsd/BabicRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BarthRSMSB12,
  author       = {Adam Barth and
                  Benjamin I. P. Rubinstein and
                  Mukund Sundararajan and
                  John C. Mitchell and
                  Dawn Song and
                  Peter L. Bartlett},
  title        = {A Learning-Based Approach to Reactive Security},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {482--493},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.42},
  doi          = {10.1109/TDSC.2011.42},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BarthRSMSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/MartignoniMPSM12,
  author       = {Lorenzo Martignoni and
                  Stephen McCamant and
                  Pongsin Poosankam and
                  Dawn Song and
                  Petros Maniatis},
  editor       = {Tim Harris and
                  Michael L. Scott},
  title        = {Path-exploration lifting: hi-fi tests for lo-fi emulators},
  booktitle    = {Proceedings of the 17th International Conference on Architectural
                  Support for Programming Languages and Operating Systems, {ASPLOS}
                  2012, London, UK, March 3-7, 2012},
  pages        = {337--348},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2150976.2151012},
  doi          = {10.1145/2150976.2151012},
  timestamp    = {Wed, 07 Jul 2021 13:23:08 +0200},
  biburl       = {https://dblp.org/rec/conf/asplos/MartignoniMPSM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/HannaHWLCS12,
  author       = {Steve Hanna and
                  Ling Huang and
                  Edward XueJun Wu and
                  Saung Li and
                  Charles Chen and
                  Dawn Song},
  editor       = {Ulrich Flegel and
                  Evangelos P. Markatos and
                  William K. Robertson},
  title        = {Juxtapp: {A} Scalable System for Detecting Code Reuse among Android
                  Applications},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece,
                  July 26-27, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7591},
  pages        = {62--81},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37300-8\_4},
  doi          = {10.1007/978-3-642-37300-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/HannaHWLCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esa/ChanSS12,
  author       = {T.{-}H. Hubert Chan and
                  Elaine Shi and
                  Dawn Song},
  editor       = {Leah Epstein and
                  Paolo Ferragina},
  title        = {Optimal Lower Bound for Differentially Private Multi-party Aggregation},
  booktitle    = {Algorithms - {ESA} 2012 - 20th Annual European Symposium, Ljubljana,
                  Slovenia, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7501},
  pages        = {277--288},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33090-2\_25},
  doi          = {10.1007/978-3-642-33090-2\_25},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/esa/ChanSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChanSS12,
  author       = {T.{-}H. Hubert Chan and
                  Elaine Shi and
                  Dawn Song},
  editor       = {Angelos D. Keromytis},
  title        = {Privacy-Preserving Stream Aggregation with Fault Tolerance},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {200--214},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_15},
  doi          = {10.1007/978-3-642-32946-3\_15},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ChanSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/FrankDFS12,
  author       = {Mario Frank and
                  Ben Dong and
                  Adrienne Porter Felt and
                  Dawn Song},
  editor       = {Mohammed Javeed Zaki and
                  Arno Siebes and
                  Jeffrey Xu Yu and
                  Bart Goethals and
                  Geoffrey I. Webb and
                  Xindong Wu},
  title        = {Mining Permission Request Patterns from Android and Facebook Applications},
  booktitle    = {12th {IEEE} International Conference on Data Mining, {ICDM} 2012,
                  Brussels, Belgium, December 10-13, 2012},
  pages        = {870--875},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDM.2012.86},
  doi          = {10.1109/ICDM.2012.86},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/FrankDFS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmla/SmithBKSGF12,
  author       = {Samuel Smith and
                  Jae Yeon (Claire) Baek and
                  Zhaoyi Kang and
                  Dawn Song and
                  Laurent El Ghaoui and
                  Mario Frank},
  title        = {Predicting Congressional Votes Based on Campaign Finance Data},
  booktitle    = {11th International Conference on Machine Learning and Applications,
                  ICMLA, Boca Raton, FL, USA, December 12-15, 2012. Volume 1},
  pages        = {640--645},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICMLA.2012.119},
  doi          = {10.1109/ICMLA.2012.119},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmla/SmithBKSGF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/GongXHMSSS12,
  author       = {Neil Zhenqiang Gong and
                  Wenchang Xu and
                  Ling Huang and
                  Prateek Mittal and
                  Emil Stefanov and
                  Vyas Sekar and
                  Dawn Song},
  editor       = {John W. Byers and
                  Jim Kurose and
                  Ratul Mahajan and
                  Alex C. Snoeren},
  title        = {Evolution of social-attribute networks: measurements, modeling, and
                  implications using google+},
  booktitle    = {Proceedings of the 12th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} '12, Boston, MA, USA, November 14-16, 2012},
  pages        = {131--144},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2398776.2398792},
  doi          = {10.1145/2398776.2398792},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/GongXHMSSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/MaganisSCS12,
  author       = {Gabriel Maganis and
                  Elaine Shi and
                  Hao Chen and
                  Dawn Song},
  editor       = {Nigel Davies and
                  Srinivasan Seshan and
                  Lin Zhong},
  title        = {Opaak: using mobile phones to limit anonymous identities online},
  booktitle    = {The 10th International Conference on Mobile Systems, Applications,
                  and Services, MobiSys'12, Ambleside, United Kingdom - June 25 - 29,
                  2012},
  pages        = {295--308},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2307636.2307664},
  doi          = {10.1145/2307636.2307664},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/MaganisSCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ReynaudSMWS12,
  author       = {Daniel Reynaud and
                  Dawn Xiaodong Song and
                  Thomas R. Magrino and
                  Edward XueJun Wu and
                  Eui Chul Richard Shin},
  title        = {FreeMarket: Shopping for free in Android applications},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/freemarket-shopping-free-android-applications},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ReynaudSMWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/StefanovSS12,
  author       = {Emil Stefanov and
                  Elaine Shi and
                  Dawn Xiaodong Song},
  title        = {Towards Practical Oblivious {RAM}},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/towards-practical-oblivious-ram},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/StefanovSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/StefanovSS12,
  author       = {Emil Stefanov and
                  Elaine Shi and
                  Dawn Song},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Policy-Enhanced Private Set Intersection: Sharing Information While
                  Enforcing Privacy Policies},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {413--430},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_25},
  doi          = {10.1007/978-3-642-30057-8\_25},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/StefanovSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/MohanTSSC12,
  author       = {Prashanth Mohan and
                  Abhradeep Thakurta and
                  Elaine Shi and
                  Dawn Song and
                  David E. Culler},
  editor       = {K. Sel{\c{c}}uk Candan and
                  Yi Chen and
                  Richard T. Snodgrass and
                  Luis Gravano and
                  Ariel Fuxman},
  title        = {{GUPT:} privacy preserving data analysis made easy},
  booktitle    = {Proceedings of the {ACM} {SIGMOD} International Conference on Management
                  of Data, {SIGMOD} 2012, Scottsdale, AZ, USA, May 20-24, 2012},
  pages        = {349--360},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2213836.2213876},
  doi          = {10.1145/2213836.2213876},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigmod/MohanTSSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NarayananPGBSSS12,
  author       = {Arvind Narayanan and
                  Hristo S. Paskov and
                  Neil Zhenqiang Gong and
                  John Bethencourt and
                  Emil Stefanov and
                  Eui Chul Richard Shin and
                  Dawn Song},
  title        = {On the Feasibility of Internet-Scale Author Identification},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {300--314},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.46},
  doi          = {10.1109/SP.2012.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/NarayananPGBSSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/MartignoniPZHMSPPSS12,
  author       = {Lorenzo Martignoni and
                  Pongsin Poosankam and
                  Matei Zaharia and
                  Jun Han and
                  Stephen McCamant and
                  Dawn Song and
                  Vern Paxson and
                  Adrian Perrig and
                  Scott Shenker and
                  Ion Stoica},
  editor       = {Gernot Heiser and
                  Wilson C. Hsieh},
  title        = {Cloud Terminal: Secure Access to Sensitive Applications from Untrusted
                  Systems},
  booktitle    = {2012 {USENIX} Annual Technical Conference, Boston, MA, USA, June 13-15,
                  2012},
  pages        = {165--182},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/atc12/technical-sessions/presentation/martignoni},
  timestamp    = {Mon, 01 Feb 2021 08:43:32 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/MartignoniPZHMSPPSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MartinovicDFPRS12,
  author       = {Ivan Martinovic and
                  Doug Davies and
                  Mario Frank and
                  Daniele Perito and
                  Tomas Ros and
                  Dawn Song},
  editor       = {Tadayoshi Kohno},
  title        = {On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {143--158},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/martinovic},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/MartinovicDFPRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AkhaweSS12,
  author       = {Devdatta Akhawe and
                  Prateek Saxena and
                  Dawn Song},
  editor       = {Tadayoshi Kohno},
  title        = {Privilege Separation in {HTML5} Applications},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {429--444},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/akhawe},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AkhaweSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TiwariMOASLSA12,
  author       = {Mohit Tiwari and
                  Prashanth Mohan and
                  Andrew Osheroff and
                  Hilfi Alkaff and
                  Elaine Shi and
                  Eric Love and
                  Dawn Song and
                  Krste Asanovic},
  editor       = {Patrick Traynor},
  title        = {Context-centric Security},
  booktitle    = {7th {USENIX} Workshop on Hot Topics in Security, HotSec'12, Bellevue,
                  WA, USA, August 7, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/hotsec12/workshop-program/presentation/tiwari},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/TiwariMOASLSA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1207-6231,
  author       = {Mario Frank and
                  Ralf Biedert and
                  Eugene Ma and
                  Ivan Martinovic and
                  Dawn Song},
  title        = {Touchalytics: On the Applicability of Touchscreen Input as a Behavioral
                  Biometric for Continuous Authentication},
  journal      = {CoRR},
  volume       = {abs/1207.6231},
  year         = {2012},
  url          = {http://arxiv.org/abs/1207.6231},
  eprinttype    = {arXiv},
  eprint       = {1207.6231},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1207-6231.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-6189,
  author       = {Prateek Mittal and
                  Charalampos Papamanthou and
                  Dawn Song},
  title        = {Preserving Link Privacy in Social Network Based Systems},
  journal      = {CoRR},
  volume       = {abs/1208.6189},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.6189},
  eprinttype    = {arXiv},
  eprint       = {1208.6189},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-6189.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1209-0835,
  author       = {Neil Zhenqiang Gong and
                  Wenchang Xu and
                  Ling Huang and
                  Prateek Mittal and
                  Emil Stefanov and
                  Vyas Sekar and
                  Dawn Song},
  title        = {Evolution of Social-Attribute Networks: Measurements, Modeling, and
                  Implications using Google+},
  journal      = {CoRR},
  volume       = {abs/1209.0835},
  year         = {2012},
  url          = {http://arxiv.org/abs/1209.0835},
  eprinttype    = {arXiv},
  eprint       = {1209.0835},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1209-0835.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-2429,
  author       = {Mario Frank and
                  Ben Dong and
                  Adrienne Porter Felt and
                  Dawn Song},
  title        = {Mining Permission Request Patterns from Android and Facebook Applications
                  (extended author version)},
  journal      = {CoRR},
  volume       = {abs/1210.2429},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.2429},
  eprinttype    = {arXiv},
  eprint       = {1210.2429},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-2429.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanSS12,
  author       = {T.{-}H. Hubert Chan and
                  Elaine Shi and
                  Dawn Song},
  title        = {Optimal Lower Bound for Differentially Private Multi-Party Aggregation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {373},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/373},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftdb/ChanHPS11,
  author       = {Haowen Chan and
                  Hsu{-}Chun Hsiao and
                  Adrian Perrig and
                  Dawn Song},
  title        = {Secure Distributed Data Aggregation},
  journal      = {Found. Trends Databases},
  volume       = {3},
  number       = {3},
  pages        = {149--201},
  year         = {2011},
  url          = {https://doi.org/10.1561/1900000025},
  doi          = {10.1561/1900000025},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ftdb/ChanHPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/ZhuJSKW11,
  author       = {David (Yu) Zhu and
                  Jaeyeon Jung and
                  Dawn Song and
                  Tadayoshi Kohno and
                  David Wetherall},
  title        = {TaintEraser: protecting sensitive data leaks using application-level
                  taint tracking},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {45},
  number       = {1},
  pages        = {142--154},
  year         = {2011},
  url          = {https://doi.org/10.1145/1945023.1945039},
  doi          = {10.1145/1945023.1945039},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/ZhuJSKW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AtenieseBCHKKPS11,
  author       = {Giuseppe Ateniese and
                  Randal C. Burns and
                  Reza Curtmola and
                  Joseph Herring and
                  Osama Khan and
                  Lea Kissner and
                  Zachary N. J. Peterson and
                  Dawn Song},
  title        = {Remote data checking using provable data possession},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {12:1--12:34},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952994},
  doi          = {10.1145/1952982.1952994},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AtenieseBCHKKPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChanSS11,
  author       = {T.{-}H. Hubert Chan and
                  Elaine Shi and
                  Dawn Song},
  title        = {Private and Continual Release of Statistics},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {26:1--26:24},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043621.2043626},
  doi          = {10.1145/2043621.2043626},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ChanSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/BabicRS11,
  author       = {Domagoj Babic and
                  Daniel Reynaud and
                  Dawn Song},
  editor       = {Ganesh Gopalakrishnan and
                  Shaz Qadeer},
  title        = {Malware Analysis with Tree Automata Inference},
  booktitle    = {Computer Aided Verification - 23rd International Conference, {CAV}
                  2011, Snowbird, UT, USA, July 14-20, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6806},
  pages        = {116--131},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22110-1\_10},
  doi          = {10.1007/978-3-642-22110-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/BabicRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SamuelSS11,
  author       = {Mike Samuel and
                  Prateek Saxena and
                  Dawn Song},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Context-sensitive auto-sanitization in web templating languages using
                  type qualifiers},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {587--600},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046775},
  doi          = {10.1145/2046707.2046775},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SamuelSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FeltCHSW11,
  author       = {Adrienne Porter Felt and
                  Erika Chin and
                  Steve Hanna and
                  Dawn Song and
                  David A. Wagner},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Android permissions demystified},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {627--638},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046779},
  doi          = {10.1145/2046707.2046779},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FeltCHSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WeinbergerSAFSS11,
  author       = {Joel Weinberger and
                  Prateek Saxena and
                  Devdatta Akhawe and
                  Matthew Finifter and
                  Eui Chul Richard Shin and
                  Dawn Song},
  editor       = {Vijay Atluri and
                  Claudia D{\'{\i}}az},
  title        = {A Systematic Analysis of {XSS} Sanitization in Web Application Frameworks},
  booktitle    = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
                  in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6879},
  pages        = {150--171},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23822-2\_9},
  doi          = {10.1007/978-3-642-23822-2\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WeinbergerSAFSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/ManiatisAFSS11,
  author       = {Petros Maniatis and
                  Devdatta Akhawe and
                  Kevin R. Fall and
                  Elaine Shi and
                  Dawn Song},
  editor       = {Matt Welsh},
  title        = {Do You Know Where Your Data Are? Secure Data Capsules for Deployable
                  Data Protection},
  booktitle    = {13th Workshop on Hot Topics in Operating Systems, HotOS XIII, Napa,
                  California, USA, May 9-11, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/hotosxiii/do-you-know-where-your-data-are-secure-data-capsules-deployable-data-protection},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/hotos/ManiatisAFSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/ThomasGSP11,
  author       = {Kurt Thomas and
                  Chris Grier and
                  Dawn Song and
                  Vern Paxson},
  editor       = {Patrick Thiran and
                  Walter Willinger},
  title        = {Suspended accounts in retrospect: an analysis of twitter spam},
  booktitle    = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} '11, Berlin, Germany, November 2-, 2011},
  pages        = {243--258},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2068816.2068840},
  doi          = {10.1145/2068816.2068840},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/ThomasGSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/BabicMMS11,
  author       = {Domagoj Babic and
                  Lorenzo Martignoni and
                  Stephen McCamant and
                  Dawn Song},
  editor       = {Matthew B. Dwyer and
                  Frank Tip},
  title        = {Statically-directed dynamic automated test generation},
  booktitle    = {Proceedings of the 20th International Symposium on Software Testing
                  and Analysis, {ISSTA} 2011, Toronto, ON, Canada, July 17-21, 2011},
  pages        = {12--22},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2001420.2001423},
  doi          = {10.1145/2001420.2001423},
  timestamp    = {Tue, 29 Dec 2020 18:31:45 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/BabicMMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KangMPS11,
  author       = {Min Gyung Kang and
                  Stephen McCamant and
                  Pongsin Poosankam and
                  Dawn Song},
  title        = {{DTA++:} Dynamic Taint Analysis with Targeted Control-Flow Propagation},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/KangMPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ShiCRCS11,
  author       = {Elaine Shi and
                  T.{-}H. Hubert Chan and
                  Eleanor Gilbert Rieffel and
                  Richard Chow and
                  Dawn Song},
  title        = {Privacy-Preserving Aggregation of Time-Series Data},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  url          = {https://www.ndss-symposium.org/ndss2011/privacy-preserving-aggregation-of-time-series-data},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ShiCRCS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/MashimaSSLCS11,
  author       = {Daisuke Mashima and
                  Prateek Sarkar and
                  Elaine Shi and
                  Chris Li and
                  Richard Chow and
                  Dawn Song},
  title        = {Privacy settings from contextual attributes: {A} case study using
                  Google Buzz},
  booktitle    = {Ninth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2011, 21-25 March 2011, Seattle, WA, USA,
                  Workshop Proceedings},
  pages        = {257--262},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PERCOMW.2011.5766879},
  doi          = {10.1109/PERCOMW.2011.5766879},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/MashimaSSLCS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JohnsonCCMPRS11,
  author       = {Noah M. Johnson and
                  Juan Caballero and
                  Kevin Zhijie Chen and
                  Stephen McCamant and
                  Pongsin Poosankam and
                  Daniel Reynaud and
                  Dawn Song},
  title        = {Differential Slicing: Identifying Causal Execution Differences for
                  Security Applications},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {347--362},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.41},
  doi          = {10.1109/SP.2011.41},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JohnsonCCMPRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ThomasGMPS11,
  author       = {Kurt Thomas and
                  Chris Grier and
                  Justin Ma and
                  Vern Paxson and
                  Dawn Song},
  title        = {Design and Evaluation of a Real-Time {URL} Spam Filtering Service},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {447--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.25},
  doi          = {10.1109/SP.2011.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ThomasGMPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChoBPCWS11,
  author       = {Chia Yuan Cho and
                  Domagoj Babic and
                  Pongsin Poosankam and
                  Kevin Zhijie Chen and
                  Edward XueJun Wu and
                  Dawn Song},
  title        = {{MACE:} Model-inference-Assisted Concolic Exploration for Protocol
                  and Vulnerability Discovery},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Cho.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChoBPCWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HannaRMPBFS11,
  author       = {Steve Hanna and
                  Rolf Rolles and
                  Andres Molina{-}Markham and
                  Pongsin Poosankam and
                  Jeremiah Blocki and
                  Kevin Fu and
                  Dawn Song},
  editor       = {Ben Adida and
                  Umesh Shankar},
  title        = {Take Two Software Updates and See Me in the Morning: The Case for
                  Software Security Evaluations of Medical Devices},
  booktitle    = {2nd {USENIX} Workshop on Health Security and Privacy, HealthSec'11,
                  San Francisco, CA, USA, August 9, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/healthsec11/take-two-software-updates-and-see-me-morning-case-software-security},
  timestamp    = {Mon, 01 Feb 2021 17:03:06 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HannaRMPBFS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WeinbergerBS11,
  author       = {Joel Weinberger and
                  Adam Barth and
                  Dawn Song},
  editor       = {Patrick D. McDaniel},
  title        = {Towards Client-side {HTML} Security Policies},
  booktitle    = {6th {USENIX} Workshop on Hot Topics in Security, HotSec'11, San Francisco,
                  CA, USA, August 9, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/hotsec11/towards-client-side-html-security-policies},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WeinbergerBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1106-3652,
  author       = {Emil Stefanov and
                  Elaine Shi and
                  Dawn Song},
  title        = {Towards Practical Oblivious {RAM}},
  journal      = {CoRR},
  volume       = {abs/1106.3652},
  year         = {2011},
  url          = {http://arxiv.org/abs/1106.3652},
  eprinttype    = {arXiv},
  eprint       = {1106.3652},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1106-3652.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1109-0507,
  author       = {Adam Barth and
                  Saung Li and
                  Benjamin I. P. Rubinstein and
                  Dawn Song},
  title        = {How Open Should Open Source Be?},
  journal      = {CoRR},
  volume       = {abs/1109.0507},
  year         = {2011},
  url          = {http://arxiv.org/abs/1109.0507},
  eprinttype    = {arXiv},
  eprint       = {1109.0507},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1109-0507.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1112-3265,
  author       = {Neil Zhenqiang Gong and
                  Ameet Talwalkar and
                  Lester W. Mackey and
                  Ling Huang and
                  Eui Chul Richard Shin and
                  Emil Stefanov and
                  Elaine Shi and
                  Dawn Song},
  title        = {Predicting Links and Inferring Attributes using a Social-Attribute
                  Network {(SAN)}},
  journal      = {CoRR},
  volume       = {abs/1112.3265},
  year         = {2011},
  url          = {http://arxiv.org/abs/1112.3265},
  eprinttype    = {arXiv},
  eprint       = {1112.3265},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1112-3265.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StefanovSS11,
  author       = {Emil Stefanov and
                  Elaine Shi and
                  Dawn Song},
  title        = {Policy-Enhanced Private Set Intersection: Sharing Information While
                  Enforcing Privacy Policies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {509},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/509},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StefanovSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanSS11,
  author       = {T.{-}H. Hubert Chan and
                  Elaine Shi and
                  Dawn Song},
  title        = {Privacy-Preserving Stream Aggregation with Fault Tolerance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {655},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/655},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaballeroPMBS10,
  author       = {Juan Caballero and
                  Pongsin Poosankam and
                  Stephen McCamant and
                  Domagoj Babic and
                  Dawn Song},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Input generation via decomposition and re-stitching: finding bugs
                  in Malware},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {413--425},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866354},
  doi          = {10.1145/1866307.1866354},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CaballeroPMBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChocSS10,
  author       = {Chia Yuan Cho and
                  Domagoj Babic and
                  Eui Chul Richard Shin and
                  Dawn Song},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Inference and analysis of formal models of botnet command and control
                  protocols},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {426--439},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866355},
  doi          = {10.1145/1866307.1866355},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChocSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AkhaweBLMS10,
  author       = {Devdatta Akhawe and
                  Adam Barth and
                  Peifung E. Lam and
                  John C. Mitchell and
                  Dawn Song},
  title        = {Towards a Formal Foundation of Web Security},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {290--304},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.27},
  doi          = {10.1109/CSF.2010.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/AkhaweBLMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/YinPHS10,
  author       = {Heng Yin and
                  Pongsin Poosankam and
                  Steve Hanna and
                  Dawn Xiaodong Song},
  editor       = {Christian Kreibich and
                  Marko Jahnke},
  title        = {HookScout: Proactive Binary-Centric Hook Detection},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  7th International Conference, {DIMVA} 2010, Bonn, Germany, July 8-9,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6201},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14215-4\_1},
  doi          = {10.1007/978-3-642-14215-4\_1},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/YinPHS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BarthRSMSB10,
  author       = {Adam Barth and
                  Benjamin I. P. Rubinstein and
                  Mukund Sundararajan and
                  John C. Mitchell and
                  Dawn Song and
                  Peter L. Bartlett},
  editor       = {Radu Sion},
  title        = {A Learning-Based Approach to Reactive Security},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {192--206},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_16},
  doi          = {10.1007/978-3-642-14577-3\_16},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BarthRSMSB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BethencourtSS10,
  author       = {John Bethencourt and
                  Elaine Shi and
                  Dawn Song},
  editor       = {Radu Sion},
  title        = {Signatures of Reputation},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {400--407},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_35},
  doi          = {10.1007/978-3-642-14577-3\_35},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BethencourtSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/ChanSS10,
  author       = {T.{-}H. Hubert Chan and
                  Elaine Shi and
                  Dawn Song},
  editor       = {Samson Abramsky and
                  Cyril Gavoille and
                  Claude Kirchner and
                  Friedhelm Meyer auf der Heide and
                  Paul G. Spirakis},
  title        = {Private and Continual Release of Statistics},
  booktitle    = {Automata, Languages and Programming, 37th International Colloquium,
                  {ICALP} 2010, Bordeaux, France, July 6-10, 2010, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6199},
  pages        = {405--417},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14162-1\_34},
  doi          = {10.1007/978-3-642-14162-1\_34},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/ChanSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/ChoCGPS10,
  author       = {Chia Yuan Cho and
                  Juan Caballero and
                  Chris Grier and
                  Vern Paxson and
                  Dawn Song},
  editor       = {Michael D. Bailey},
  title        = {Insights from the Inside: {A} View of Botnet Management from Infiltration},
  booktitle    = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '10, San Jose, CA, USA, April 27, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/leet-10/insights-inside-view-botnet-management-infiltration},
  timestamp    = {Mon, 20 Nov 2023 09:09:49 +0100},
  biburl       = {https://dblp.org/rec/conf/leet/ChoCGPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CaballeroJMS10,
  author       = {Juan Caballero and
                  Noah M. Johnson and
                  Stephen McCamant and
                  Dawn Song},
  title        = {Binary Code Extraction and Interface Identification for Security Applications},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
                  2010},
  publisher    = {The Internet Society},
  year         = {2010},
  url          = {https://www.ndss-symposium.org/ndss2010/binary-code-extraction-and-interface-identification-security-applications},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/CaballeroJMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SaxenaHPS10,
  author       = {Prateek Saxena and
                  Steve Hanna and
                  Pongsin Poosankam and
                  Dawn Song},
  title        = {{FLAX:} Systematic Discovery of Client-side Validation Vulnerabilities
                  in Rich Web Applications},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
                  2010},
  publisher    = {The Internet Society},
  year         = {2010},
  url          = {https://www.ndss-symposium.org/ndss2010/flax-systematic-discovery-client-side-validation-vulnerabilities-rich-web-applications},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SaxenaHPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SaxenaAHMMS10,
  author       = {Prateek Saxena and
                  Devdatta Akhawe and
                  Steve Hanna and
                  Feng Mao and
                  Stephen McCamant and
                  Dawn Song},
  title        = {A Symbolic Execution Framework for JavaScript},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {513--528},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.38},
  doi          = {10.1109/SP.2010.38},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SaxenaAHMMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BarfordDDFGJJLLNOSSSTWY10,
  author       = {Paul Barford and
                  Marc Dacier and
                  Thomas G. Dietterich and
                  Matt Fredrikson and
                  Jonathon T. Giffin and
                  Sushil Jajodia and
                  Somesh Jha and
                  Jason H. Li and
                  Peng Liu and
                  Peng Ning and
                  Xinming Ou and
                  Dawn Song and
                  Laura Strater and
                  Vipin Swarup and
                  George P. Tadda and
                  C. Wang and
                  John Yen},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber {SA:} Situational Awareness for Cyber Defense},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {3--13},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_1},
  doi          = {10.1007/978-1-4419-0140-8\_1},
  timestamp    = {Wed, 25 Sep 2019 17:41:05 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BarfordDDFGJJLLNOSSSTWY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanSS10,
  author       = {T.{-}H. Hubert Chan and
                  Elaine Shi and
                  Dawn Song},
  title        = {Private and Continual Release of Statistics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GaoRS09,
  author       = {Debin Gao and
                  Michael K. Reiter and
                  Dawn Xiaodong Song},
  title        = {Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based
                  Behavioral Distance},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {6},
  number       = {2},
  pages        = {96--110},
  year         = {2009},
  url          = {https://doi.org/10.1109/TDSC.2008.39},
  doi          = {10.1109/TDSC.2008.39},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GaoRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BethencourtSW09,
  author       = {John Bethencourt and
                  Dawn Xiaodong Song and
                  Brent Waters},
  title        = {New Techniques for Private Stream Searching},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {16:1--16:32},
  year         = {2009},
  url          = {https://doi.org/10.1145/1455526.1455529},
  doi          = {10.1145/1455526.1455529},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BethencourtSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KangYHMS09,
  author       = {Min Gyung Kang and
                  Heng Yin and
                  Steve Hanna and
                  Stephen McCamant and
                  Dawn Song},
  editor       = {Angelos Stavrou},
  title        = {Emulating emulation-resistant malware},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Virtual Machine Security,
                  VMSec '09, Chicago, Illinois, USA, November 9, 2009},
  pages        = {11--22},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655148.1655151},
  doi          = {10.1145/1655148.1655151},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KangYHMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaballeroPKS09,
  author       = {Juan Caballero and
                  Pongsin Poosankam and
                  Christian Kreibich and
                  Dawn Xiaodong Song},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Dispatcher: enabling active botnet infiltration using automatic protocol
                  reverse-engineering},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {621--634},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653737},
  doi          = {10.1145/1653662.1653737},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CaballeroPKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/SaxenaPMS09,
  author       = {Prateek Saxena and
                  Pongsin Poosankam and
                  Stephen McCamant and
                  Dawn Song},
  editor       = {Gregg Rothermel and
                  Laura K. Dillon},
  title        = {Loop-extended symbolic execution on binary programs},
  booktitle    = {Proceedings of the Eighteenth International Symposium on Software
                  Testing and Analysis, {ISSTA} 2009, Chicago, IL, USA, July 19-23,
                  2009},
  pages        = {225--236},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1572272.1572299},
  doi          = {10.1145/1572272.1572299},
  timestamp    = {Tue, 06 Nov 2018 16:57:30 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/SaxenaPMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NadjiSS09,
  author       = {Yacin Nadji and
                  Prateek Saxena and
                  Dawn Song},
  title        = {Document Structure Integrity: {A} Robust Basis for Cross-site Scripting
                  Defense},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/document-structure-integrity-a-robust-basis-for-cross-site-scripting-defense/},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/NadjiSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/VenkataramanBSSS09,
  author       = {Shobha Venkataraman and
                  Avrim Blum and
                  Dawn Song and
                  Subhabrata Sen and
                  Oliver Spatscheck},
  editor       = {Yoshua Bengio and
                  Dale Schuurmans and
                  John D. Lafferty and
                  Christopher K. I. Williams and
                  Aron Culotta},
  title        = {Tracking Dynamic Sources of Malicious Activity at Internet Scale},
  booktitle    = {Advances in Neural Information Processing Systems 22: 23rd Annual
                  Conference on Neural Information Processing Systems 2009. Proceedings
                  of a meeting held 7-10 December 2009, Vancouver, British Columbia,
                  Canada},
  pages        = {1946--1954},
  publisher    = {Curran Associates, Inc.},
  year         = {2009},
  url          = {https://proceedings.neurips.cc/paper/2009/hash/b6edc1cd1f36e45daf6d7824d7bb2283-Abstract.html},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/VenkataramanBSSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/NewsomeMS09,
  author       = {James Newsome and
                  Stephen McCamant and
                  Dawn Song},
  editor       = {Stephen Chong and
                  David A. Naumann},
  title        = {Measuring channel capacity to distinguish undue influence},
  booktitle    = {Proceedings of the 2009 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2009, Dublin, Ireland, 15-21 June, 2009},
  pages        = {73--85},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1554339.1554349},
  doi          = {10.1145/1554339.1554349},
  timestamp    = {Fri, 25 Jun 2021 14:48:54 +0200},
  biburl       = {https://dblp.org/rec/conf/pldi/NewsomeMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CaballeroLPS09,
  author       = {Juan Caballero and
                  Zhenkai Liang and
                  Pongsin Poosankam and
                  Dawn Song},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Towards Generating High Coverage Vulnerability-Based Signatures with
                  Protocol-Level Constraint-Guided Exploration},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {161--181},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_9},
  doi          = {10.1007/978-3-642-04342-0\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CaballeroLPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BarthCS09,
  author       = {Adam Barth and
                  Juan Caballero and
                  Dawn Song},
  title        = {Secure Content Sniffing for Web Browsers, or How to Stop Papers from
                  Reviewing Themselves},
  booktitle    = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May
                  2009, Oakland, California, {USA}},
  pages        = {360--371},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SP.2009.3},
  doi          = {10.1109/SP.2009.3},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BarthCS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BarthWS09,
  author       = {Adam Barth and
                  Joel Weinberger and
                  Dawn Song},
  editor       = {Fabian Monrose},
  title        = {Cross-Origin JavaScript Capability Leaks: Detection, Exploitation,
                  and Defense},
  booktitle    = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14,
                  2009, Proceedings},
  pages        = {187--198},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {http://www.usenix.org/events/sec09/tech/full\_papers/barth.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BarthWS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009ccsw,
  editor       = {Radu Sion and
                  Dawn Song},
  title        = {Proceedings of the first {ACM} Cloud Computing Security Workshop,
                  {CCSW} 2009, Chicago, IL, USA, November 13, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {http://dl.acm.org/citation.cfm?id=1655008},
  isbn         = {978-1-60558-784-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2009ccsw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0912-1155,
  author       = {Adam Barth and
                  Benjamin I. P. Rubinstein and
                  Mukund Sundararajan and
                  John C. Mitchell and
                  Dawn Xiaodong Song and
                  Peter L. Bartlett},
  title        = {A Learning-Based Approach to Reactive Security},
  journal      = {CoRR},
  volume       = {abs/0912.1155},
  year         = {2009},
  url          = {http://arxiv.org/abs/0912.1155},
  eprinttype    = {arXiv},
  eprint       = {0912.1155},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0912-1155.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BrumleyNSWJ08,
  author       = {David Brumley and
                  James Newsome and
                  Dawn Song and
                  Hao Wang and
                  Somesh Jha},
  title        = {Theory and Techniques for Automatic Generation of Vulnerability-Based
                  Signatures},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {5},
  number       = {4},
  pages        = {224--241},
  year         = {2008},
  url          = {https://doi.org/10.1109/TDSC.2008.55},
  doi          = {10.1109/TDSC.2008.55},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BrumleyNSWJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/GaoRS08,
  author       = {Debin Gao and
                  Michael K. Reiter and
                  Dawn Xiaodong Song},
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {BinHunt: Automatically Finding Semantic Differences in Binary Programs},
  booktitle    = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  pages        = {238--255},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9\_16},
  doi          = {10.1007/978-3-540-88625-9\_16},
  timestamp    = {Sun, 22 Jan 2023 01:36:25 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/GaoRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SongBYCJKLNPS08,
  author       = {Dawn Xiaodong Song and
                  David Brumley and
                  Heng Yin and
                  Juan Caballero and
                  Ivan Jager and
                  Min Gyung Kang and
                  Zhenkai Liang and
                  James Newsome and
                  Pongsin Poosankam and
                  Prateek Saxena},
  editor       = {R. Sekar and
                  Arun K. Pujari},
  title        = {BitBlaze: {A} New Approach to Computer Security via Binary Analysis},
  booktitle    = {Information Systems Security, 4th International Conference, {ICISS}
                  2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89862-7\_1},
  doi          = {10.1007/978-3-540-89862-7\_1},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/SongBYCJKLNPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BethencourtSW08,
  author       = {John Bethencourt and
                  Dawn Song and
                  Brent Waters},
  title        = {Analysis-Resistant Malware},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/analysis-resistant-malware/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BethencourtSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CaballeroKSW08,
  author       = {Juan Caballero and
                  Theocharis Kampouris and
                  Dawn Song and
                  Jia Wang},
  title        = {Would Diversity Really Increase the Robustness of the Routing Infrastructure
                  against Software Defects?},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/would-diversity-really-increase-robustness-routing-infrastructure-against-software-defects/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/CaballeroKSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/VenkataramanBS08,
  author       = {Shobha Venkataraman and
                  Avrim Blum and
                  Dawn Song},
  title        = {Limits of Learning-based Signature Generation with Adversaries},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/limits-of-learning-based-signature-generation-with-adversaries/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/VenkataramanBS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/YinLS08,
  author       = {Heng Yin and
                  Zhenkai Liang and
                  Dawn Song},
  title        = {HookFinder: Identifying and Understanding Malware Hooking Behaviors},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/hookfinder-identifying-and-understanding-malware-hooking-behaviors/},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/YinLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BrumleyPSZ08,
  author       = {David Brumley and
                  Pongsin Poosankam and
                  Dawn Xiaodong Song and
                  Jiang Zheng},
  title        = {Automatic Patch-Based Exploit Generation is Possible: Techniques and
                  Implications},
  booktitle    = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May
                  2008, Oakland, California, {USA}},
  pages        = {143--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SP.2008.17},
  doi          = {10.1109/SP.2008.17},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BrumleyPSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BrumleyHLNSY08,
  author       = {David Brumley and
                  Cody Hartwig and
                  Zhenkai Liang and
                  James Newsome and
                  Dawn Xiaodong Song and
                  Heng Yin},
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {Automatically Identifying Trigger-based Behavior in Malware},
  booktitle    = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  pages        = {65--88},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-68768-1\_4},
  doi          = {10.1007/978-0-387-68768-1\_4},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/BrumleyHLNSY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ChanPPS07,
  author       = {Haowen Chan and
                  Adrian Perrig and
                  Bartosz Przydatek and
                  Dawn Xiaodong Song},
  title        = {{SIA:} Secure information aggregation in sensor networks},
  journal      = {J. Comput. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {69--102},
  year         = {2007},
  url          = {https://doi.org/10.3233/jcs-2007-15104},
  doi          = {10.3233/JCS-2007-15104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ChanPPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YinSEKK07,
  author       = {Heng Yin and
                  Dawn Xiaodong Song and
                  Manuel Egele and
                  Christopher Kruegel and
                  Engin Kirda},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Panorama: capturing system-wide information flow for malware detection
                  and analysis},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {116--127},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315261},
  doi          = {10.1145/1315245.1315261},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YinSEKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaballeroYLS07,
  author       = {Juan Caballero and
                  Heng Yin and
                  Zhenkai Liang and
                  Dawn Xiaodong Song},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Polyglot: automatic extraction of protocol message format using dynamic
                  binary analysis},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {317--329},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315286},
  doi          = {10.1145/1315245.1315286},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CaballeroYLS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseBCHKPS07,
  author       = {Giuseppe Ateniese and
                  Randal C. Burns and
                  Reza Curtmola and
                  Joseph Herring and
                  Lea Kissner and
                  Zachary N. J. Peterson and
                  Dawn Xiaodong Song},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Provable data possession at untrusted stores},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {598--609},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315318},
  doi          = {10.1145/1315245.1315318},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseBCHKPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BrumleyWJS07,
  author       = {David Brumley and
                  Hao Wang and
                  Somesh Jha and
                  Dawn Xiaodong Song},
  title        = {Creating Vulnerability Signatures Using Weakest Preconditions},
  booktitle    = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8
                  July 2007, Venice, Italy},
  pages        = {311--325},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CSF.2007.17},
  doi          = {10.1109/CSF.2007.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BrumleyWJS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/KangCS07,
  author       = {Min Gyung Kang and
                  Juan Caballero and
                  Dawn Xiaodong Song},
  editor       = {Bernhard M. H{\"{a}}mmerli and
                  Robin Sommer},
  title        = {Distributed Evasive Scan Techniques and Countermeasures},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  4th International Conference, {DIMVA} 2007, Lucerne, Switzerland,
                  July 12-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4579},
  pages        = {157--174},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73614-1\_10},
  doi          = {10.1007/978-3-540-73614-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/KangCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/TucekNLHXBZS07,
  author       = {Joseph A. Tucek and
                  James Newsome and
                  Shan Lu and
                  Chengdu Huang and
                  Spiros Xanthos and
                  David Brumley and
                  Yuanyuan Zhou and
                  Dawn Xiaodong Song},
  editor       = {Paulo Ferreira and
                  Thomas R. Gross and
                  Lu{\'{\i}}s Veiga},
  title        = {Sweeper: a lightweight end-to-end system for defending against fast
                  worms},
  booktitle    = {Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March
                  21-23, 2007},
  pages        = {115--128},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1272996.1273010},
  doi          = {10.1145/1272996.1273010},
  timestamp    = {Thu, 12 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/TucekNLHXBZS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/GaoZSVCSK07,
  author       = {Yan Gao and
                  Yao Zhao and
                  Robert T. Schweller and
                  Shobha Venkataraman and
                  Yan Chen and
                  Dawn Xiaodong Song and
                  Ming{-}Yang Kao},
  title        = {Detecting Stealthy Spreaders Using Online Outdegree Histograms},
  booktitle    = {Fifteenth {IEEE} International Workshop on Quality of Service, IWQoS
                  2007, Evanston, Illinois, USA, June 21-22, 2007},
  pages        = {145--153},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/IWQOS.2007.376561},
  doi          = {10.1109/IWQOS.2007.376561},
  timestamp    = {Wed, 22 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/GaoZSVCSK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BrumleySCJL07,
  author       = {David Brumley and
                  Dawn Xiaodong Song and
                  Tzi{-}cker Chiueh and
                  Rob Johnson and
                  Huijia Lin},
  title        = {{RICH:} Automatically Protecting Against Integer-Based Vulnerabilities},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March
                  2007},
  publisher    = {The Internet Society},
  year         = {2007},
  url          = {https://www.ndss-symposium.org/ndss2007/rich-automatically-protecting-against-integer-based-vulnerabilities/},
  timestamp    = {Mon, 01 Feb 2021 08:42:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BrumleySCJL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/VenkataramanCPKS07,
  author       = {Shobha Venkataraman and
                  Juan Caballero and
                  Pongsin Poosankam and
                  Min Gyung Kang and
                  Dawn Xiaodong Song},
  title        = {Fig: Automatic Fingerprint Generation},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March
                  2007},
  publisher    = {The Internet Society},
  year         = {2007},
  url          = {https://www.ndss-symposium.org/ndss2007/fig-automatic-fingerprint-generation/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/VenkataramanCPKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ShiBCSP07,
  author       = {Elaine Shi and
                  John Bethencourt and
                  T.{-}H. Hubert Chan and
                  Dawn Xiaodong Song and
                  Adrian Perrig},
  title        = {Multi-Dimensional Range Query over Encrypted Data},
  booktitle    = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23
                  May 2007, Oakland, California, {USA}},
  pages        = {350--364},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SP.2007.29},
  doi          = {10.1109/SP.2007.29},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ShiBCSP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/EgeleKKYS07,
  author       = {Manuel Egele and
                  Christopher Kruegel and
                  Engin Kirda and
                  Heng Yin and
                  Dawn Xiaodong Song},
  editor       = {Jeff Chase and
                  Srinivasan Seshan},
  title        = {Dynamic Spyware Analysis},
  booktitle    = {Proceedings of the 2007 {USENIX} Annual Technical Conference, Santa
                  Clara, CA, USA, June 17-22, 2007},
  pages        = {233--246},
  publisher    = {{USENIX}},
  year         = {2007},
  url          = {http://www.usenix.org/events/usenix07/tech/egele.html},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/EgeleKKYS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/VenkataramanSSHS07,
  author       = {Shobha Venkataraman and
                  Subhabrata Sen and
                  Oliver Spatscheck and
                  Patrick Haffner and
                  Dawn Song},
  editor       = {Niels Provos},
  title        = {Exploiting Network Structure for Proactive Spam Mitigation},
  booktitle    = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA,
                  August 6-10, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/16th-usenix-security-symposium/exploiting-network-structure-proactive-spam-mitigation},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/VenkataramanSSHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BrumleyNS07,
  author       = {David Brumley and
                  James Newsome and
                  Dawn Song},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Sting: An End-to-End Self-Healing System for Defending against Internet
                  Worms},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {147--170},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_7},
  doi          = {10.1007/978-0-387-44599-1\_7},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BrumleyNS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/27,
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1},
  doi          = {10.1007/978-0-387-44599-1},
  isbn         = {978-0-387-32720-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/27.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseBCHKPS07,
  author       = {Giuseppe Ateniese and
                  Randal C. Burns and
                  Reza Curtmola and
                  Joseph Herring and
                  Lea Kissner and
                  Zachary N. J. Peterson and
                  Dawn Song},
  title        = {Provable Data Possession at Untrusted Stores},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseBCHKPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/YaarPS06,
  author       = {Abraham Yaar and
                  Adrian Perrig and
                  Dawn Song},
  title        = {StackPi: New Packet Marking and Filtering Mechanisms for DDoS and
                  {IP} Spoofing Defense},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {24},
  number       = {10},
  pages        = {1853--1863},
  year         = {2006},
  url          = {https://doi.org/10.1109/JSAC.2006.877138},
  doi          = {10.1109/JSAC.2006.877138},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/YaarPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BrumleyLPS06,
  author       = {David Brumley and
                  Li{-}Hao Liu and
                  Pongsin Poosankam and
                  Dawn Xiaodong Song},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Design space and analysis of worm defense strategies},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {125--137},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128837},
  doi          = {10.1145/1128817.1128837},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BrumleyLPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChanPS06,
  author       = {Haowen Chan and
                  Adrian Perrig and
                  Dawn Xiaodong Song},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Secure hierarchical in-network aggregation in sensor networks},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {278--287},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180440},
  doi          = {10.1145/1180405.1180440},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChanPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NewsomeBFS06,
  author       = {James Newsome and
                  David Brumley and
                  Jason Franklin and
                  Dawn Xiaodong Song},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Replayer: automatic protocol replay by binary analysis},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {311--321},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180444},
  doi          = {10.1145/1180405.1180444},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NewsomeBFS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/VenkataramanCSB06,
  author       = {Shobha Venkataraman and
                  Juan Caballero and
                  Dawn Song and
                  Avrim Blum and
                  Jennifer Yates},
  editor       = {Eddie Kohler and
                  Greg Minshall},
  title        = {Black Box Anomaly Detection: Is It Utopian?},
  booktitle    = {5th {ACM} Workshop on Hot Topics in Networks - HotNets-V, Irvine,
                  California, USA, November 29-30, 2006},
  publisher    = {{ACM} {SIGCOMM}},
  year         = {2006},
  url          = {http://conferences.sigcomm.org/hotnets/2006/venkataraman06black.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotnets/VenkataramanCSB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NewsomeBSCK06,
  author       = {James Newsome and
                  David Brumley and
                  Dawn Xiaodong Song},
  title        = {Vulnerability-Specific Execution Filtering for Exploit Prevention
                  on Commodity Software},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2006, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2006},
  url          = {https://www.ndss-symposium.org/ndss2006/vulnerability-specific-execution-filtering-exploit-prevention-commodity-software/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/NewsomeBSCK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GaoRS06,
  author       = {Debin Gao and
                  Michael K. Reiter and
                  Dawn Xiaodong Song},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Behavioral Distance Measurement Using Hidden Markov Models},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {19--40},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_2},
  doi          = {10.1007/11856214\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GaoRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NewsomeKS06,
  author       = {James Newsome and
                  Brad Karp and
                  Dawn Xiaodong Song},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Paragraph: Thwarting Signature Learning by Training Maliciously},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {81--105},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_5},
  doi          = {10.1007/11856214\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NewsomeKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BrumleyNSWJ06,
  author       = {David Brumley and
                  James Newsome and
                  Dawn Xiaodong Song and
                  Hao Wang and
                  Somesh Jha},
  title        = {Towards Automatic Generation of Vulnerability-Based Signatures},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {2--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.41},
  doi          = {10.1109/SP.2006.41},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BrumleyNSWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BethencourtSW06,
  author       = {John Bethencourt and
                  Dawn Xiaodong Song and
                  Brent Waters},
  title        = {New Constructions and Practical Applications for Private Stream Searching
                  (Extended Abstract)},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {132--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.27},
  doi          = {10.1109/SP.2006.27},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BethencourtSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BrumleyS06,
  author       = {David Brumley and
                  Dawn Song},
  title        = {Towards Attack-Agnostic Defenses},
  booktitle    = {1st {USENIX} Workshop on Hot Topics in Security, HotSec'06, Vancouver,
                  BC, Canada, July 31, 2006},
  publisher    = {{USENIX} Association},
  year         = {2006},
  url          = {https://www.usenix.org/conference/hotsec-06/towards-attack-agnostic-defenses},
  timestamp    = {Mon, 01 Feb 2021 08:43:09 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BrumleyS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KissnerS05,
  author       = {Lea Kissner and
                  Dawn Xiaodong Song},
  editor       = {Victor Shoup},
  title        = {Privacy-Preserving Set Operations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {241--257},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_15},
  doi          = {10.1007/11535218\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KissnerS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/YaarPS05,
  author       = {Abraham Yaar and
                  Adrian Perrig and
                  Dawn Xiaodong Song},
  title        = {{FIT:} fast Internet traceback},
  booktitle    = {{INFOCOM} 2005. 24th Annual Joint Conference of the {IEEE} Computer
                  and Communications Societies, 13-17 March 2005, Miami, FL, {USA}},
  pages        = {1395--1406},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/INFCOM.2005.1498364},
  doi          = {10.1109/INFCOM.2005.1498364},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/YaarPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwap/XueSZF05,
  author       = {Rui Xue and
                  Dawn Song and
                  Zhenfeng Zhang and
                  Dengguo Feng},
  editor       = {Jianying Zhou and
                  Meng{-}Chow Kang and
                  Feng Bao and
                  HweeHwa Pang},
  title        = {A Generic Scheme for Zero-Knowledge Sets},
  booktitle    = {Applied Public Key Infrastructure - 4th International Workshop: {IWAP}
                  2005, Singapore, September 21-23, 2005},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {128},
  pages        = {249--263},
  publisher    = {{IOS} Press},
  year         = {2005},
  url          = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=1247},
  timestamp    = {Fri, 03 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwap/XueSZF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NewsomeS05,
  author       = {James Newsome and
                  Dawn Xiaodong Song},
  title        = {Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration
                  of Exploits on Commodity Software},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2005, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2005},
  url          = {https://www.ndss-symposium.org/ndss2005/dynamic-taint-analysis-automatic-detection-analysis-and-signaturegeneration-exploits-commodity/},
  timestamp    = {Mon, 01 Feb 2021 08:42:12 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/NewsomeS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/VenkataramanSGB05,
  author       = {Shobha Venkataraman and
                  Dawn Xiaodong Song and
                  Phillip B. Gibbons and
                  Avrim Blum},
  title        = {New Streaming Algorithms for Fast Detection of Superspreaders},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2005, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2005},
  url          = {https://www.ndss-symposium.org/ndss2005/new-streaming-algorithms-fast-detection-superspreaders/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/VenkataramanSGB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GaoRS05,
  author       = {Debin Gao and
                  Michael K. Reiter and
                  Dawn Xiaodong Song},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Behavioral Distance for Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {63--81},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_4},
  doi          = {10.1007/11663812\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GaoRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChristodorescuJSSB05,
  author       = {Mihai Christodorescu and
                  Somesh Jha and
                  Sanjit A. Seshia and
                  Dawn Xiaodong Song and
                  Randal E. Bryant},
  title        = {Semantics-Aware Malware Detection},
  booktitle    = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11
                  May 2005, Oakland, CA, {USA}},
  pages        = {32--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SP.2005.20},
  doi          = {10.1109/SP.2005.20},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ChristodorescuJSSB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NewsomeKS05,
  author       = {James Newsome and
                  Brad Karp and
                  Dawn Xiaodong Song},
  title        = {Polygraph: Automatically Generating Signatures for Polymorphic Worms},
  booktitle    = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11
                  May 2005, Oakland, CA, {USA}},
  pages        = {226--241},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SP.2005.15},
  doi          = {10.1109/SP.2005.15},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/NewsomeKS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4082,
  author       = {Adrian Perrig and
                  Dawn Song and
                  Ran Canetti and
                  J. D. Tygar and
                  Bob Briscoe},
  title        = {Timed Efficient Stream Loss-Tolerant Authentication {(TESLA):} Multicast
                  Source Authentication Transform Introduction},
  journal      = {{RFC}},
  volume       = {4082},
  pages        = {1--22},
  year         = {2005},
  url          = {https://doi.org/10.17487/RFC4082},
  doi          = {10.17487/RFC4082},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4082.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KissnerORSY04,
  author       = {Lea Kissner and
                  Alina Oprea and
                  Michael K. Reiter and
                  Dawn Xiaodong Song and
                  Ke Yang},
  editor       = {Markus Jakobsson and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Private Keyword-Based Push and Pull with Applications to Anonymous
                  Communication},
  booktitle    = {Applied Cryptography and Network Security, Second International Conference,
                  {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3089},
  pages        = {16--30},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24852-1\_2},
  doi          = {10.1007/978-3-540-24852-1\_2},
  timestamp    = {Fri, 05 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/KissnerORSY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GaoRS04,
  author       = {Debin Gao and
                  Michael K. Reiter and
                  Dawn Xiaodong Song},
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {Gray-box extraction of execution graphs for anomaly detection},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages        = {318--329},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1030083.1030126},
  doi          = {10.1145/1030083.1030126},
  timestamp    = {Fri, 13 Nov 2020 16:10:44 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GaoRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/WongWSBG04,
  author       = {Cynthia Wong and
                  Chenxi Wang and
                  Dawn Xiaodong Song and
                  Stan Bielski and
                  Gregory R. Ganger},
  title        = {Dynamic Quarantine of Internet Worms},
  booktitle    = {2004 International Conference on Dependable Systems and Networks {(DSN}
                  2004), 28 June - 1 July 2004, Florence, Italy, Proceedings},
  pages        = {73--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/DSN.2004.1311878},
  doi          = {10.1109/DSN.2004.1311878},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/WongWSBG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipsn/NewsomeSSP04,
  author       = {James Newsome and
                  Elaine Shi and
                  Dawn Xiaodong Song and
                  Adrian Perrig},
  editor       = {Kannan Ramchandran and
                  Janos Sztipanovits and
                  Jennifer C. Hou and
                  Thrasyvoulos N. Pappas},
  title        = {The sybil attack in sensor networks: analysis {\&} defenses},
  booktitle    = {Proceedings of the Third International Symposium on Information Processing
                  in Sensor Networks, {IPSN} 2004, Berkeley, California, USA, April
                  26-27, 2004},
  pages        = {259--268},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/984622.984660},
  doi          = {10.1145/984622.984660},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/ipsn/NewsomeSSP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BlumSV04,
  author       = {Avrim Blum and
                  Dawn Xiaodong Song and
                  Shobha Venkataraman},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {Detection of Interactive Stepping Stones: Algorithms and Confidence
                  Bounds},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {258--277},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_14},
  doi          = {10.1007/978-3-540-30143-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BlumSV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/YaarPS04,
  author       = {Abraham Yaar and
                  Adrian Perrig and
                  Dawn Xiaodong Song},
  title        = {{SIFF:} {A} Stateless Internet Flow Filter to Mitigate DDoS Flooding
                  Attacks},
  booktitle    = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12
                  May 2004, Berkeley, CA, {USA}},
  pages        = {130},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SECPRI.2004.1301320},
  doi          = {10.1109/SECPRI.2004.1301320},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/YaarPS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BrumleyS04,
  author       = {David Brumley and
                  Dawn Xiaodong Song},
  editor       = {Matt Blaze},
  title        = {Privtrans: Automatically Partitioning Programs for Privilege Separation},
  booktitle    = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
                  2004, San Diego, CA, {USA}},
  pages        = {57--72},
  publisher    = {{USENIX}},
  year         = {2004},
  url          = {http://www.usenix.org/publications/library/proceedings/sec04/tech/brumley.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BrumleyS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GaoRS04,
  author       = {Debin Gao and
                  Michael K. Reiter and
                  Dawn Xiaodong Song},
  editor       = {Matt Blaze},
  title        = {On Gray-Box Program Tracking for Anomaly Detection},
  booktitle    = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
                  2004, San Diego, CA, {USA}},
  pages        = {103--118},
  publisher    = {{USENIX}},
  year         = {2004},
  url          = {http://www.usenix.org/publications/library/proceedings/sec04/tech/gao.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GaoRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/NewsomeS03,
  author       = {James Newsome and
                  Dawn Xiaodong Song},
  editor       = {Ian F. Akyildiz and
                  Deborah Estrin and
                  David E. Culler and
                  Mani B. Srivastava},
  title        = {{GEM:} graph eMbedding for routing and data-centric storage in sensor
                  networks without geographic information},
  booktitle    = {Proceedings of the 1st International Conference on Embedded Networked
                  Sensor Systems, SenSys 2003, Los Angeles, California, USA, November
                  5-7, 2003},
  pages        = {76--88},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/958491.958501},
  doi          = {10.1145/958491.958501},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sensys/NewsomeS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/PrzydatekSP03,
  author       = {Bartosz Przydatek and
                  Dawn Xiaodong Song and
                  Adrian Perrig},
  editor       = {Ian F. Akyildiz and
                  Deborah Estrin and
                  David E. Culler and
                  Mani B. Srivastava},
  title        = {{SIA:} secure information aggregation in sensor networks},
  booktitle    = {Proceedings of the 1st International Conference on Embedded Networked
                  Sensor Systems, SenSys 2003, Los Angeles, California, USA, November
                  5-7, 2003},
  pages        = {255--265},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/958491.958521},
  doi          = {10.1145/958491.958521},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sensys/PrzydatekSP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/YaarPS03,
  author       = {Abraham Yaar and
                  Adrian Perrig and
                  Dawn Xiaodong Song},
  title        = {Pi: {A} Path Identification Mechanism to Defend against DDoS Attack},
  booktitle    = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14
                  May 2003, Berkeley, CA, {USA}},
  pages        = {93},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199330},
  doi          = {10.1109/SECPRI.2003.1199330},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/YaarPS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChanPS03,
  author       = {Haowen Chan and
                  Adrian Perrig and
                  Dawn Xiaodong Song},
  title        = {Random Key Predistribution Schemes for Sensor Networks},
  booktitle    = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14
                  May 2003, Berkeley, CA, {USA}},
  pages        = {197},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199337},
  doi          = {10.1109/SECPRI.2003.1199337},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ChanPS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JohnsonMSW02,
  author       = {Robert Johnson and
                  David Molnar and
                  Dawn Xiaodong Song and
                  David A. Wagner},
  editor       = {Bart Preneel},
  title        = {Homomorphic Signature Schemes},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {244--262},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_17},
  doi          = {10.1007/3-540-45760-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JohnsonMSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AtenieseST02,
  author       = {Giuseppe Ateniese and
                  Dawn Xiaodong Song and
                  Gene Tsudik},
  editor       = {Matt Blaze},
  title        = {Quasi-Efficient Revocation in Group Signatures},
  booktitle    = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
                  Bermuda, March 11-14, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2357},
  pages        = {183--197},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36504-4\_14},
  doi          = {10.1007/3-540-36504-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AtenieseST02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SongTZ02,
  author       = {Dawn Xiaodong Song and
                  J. D. Tygar and
                  David Zuckerman},
  title        = {Expander Graphs for Digital Stream Authentication and Robust Overlay
                  Networks},
  booktitle    = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 12-15, 2002},
  pages        = {258--270},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/SECPRI.2002.1004376},
  doi          = {10.1109/SECPRI.2002.1004376},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SongTZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SongBP01,
  author       = {Dawn Xiaodong Song and
                  Sergey Berezin and
                  Adrian Perrig},
  title        = {Athena: {A} Novel Approach to Efficient Automatic Security Protocol
                  Analysis},
  journal      = {J. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {47--74},
  year         = {2001},
  url          = {https://doi.org/10.3233/jcs-2001-91-203},
  doi          = {10.3233/JCS-2001-91-203},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SongBP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/SongPP01,
  author       = {Dawn Xiaodong Song and
                  Adrian Perrig and
                  Doantam Phan},
  editor       = {G{\'{e}}rard Berry and
                  Hubert Comon and
                  Alain Finkel},
  title        = {{AGVI} - Automatic Generation, Verification, and Implementation of
                  Security Protocols},
  booktitle    = {Computer Aided Verification, 13th International Conference, {CAV}
                  2001, Paris, France, July 18-22, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2102},
  pages        = {241--245},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44585-4\_21},
  doi          = {10.1007/3-540-44585-4\_21},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/SongPP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CrosbyGJSW01,
  author       = {Scott A. Crosby and
                  Ian Goldberg and
                  Robert Johnson and
                  Dawn Xiaodong Song and
                  David A. Wagner},
  editor       = {Tomas Sander},
  title        = {A Cryptanalysis of the High-Bandwidth Digital Content Protection System},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {192--200},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_12},
  doi          = {10.1007/3-540-47870-1\_12},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CrosbyGJSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Song01,
  author       = {Dawn Xiaodong Song},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Practical forward secure group signature schemes},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {225--234},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502015},
  doi          = {10.1145/501983.502015},
  timestamp    = {Tue, 10 Nov 2020 20:00:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Song01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/SongP01,
  author       = {Dawn Xiaodong Song and
                  Adrian Perrig},
  title        = {Advanced and Authenticated Marking Schemes for {IP} Traceback},
  booktitle    = {Proceedings {IEEE} {INFOCOM} 2001, The Conference on Computer Communications,
                  Twentieth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, Twenty years into the communications odyssey, Anchorage,
                  Alaska, USA, April 22-26, 2001},
  pages        = {878--886},
  publisher    = {{IEEE} Comptuer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/INFCOM.2001.916279},
  doi          = {10.1109/INFCOM.2001.916279},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/SongP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/PerrigSST01,
  author       = {Adrian Perrig and
                  Sean W. Smith and
                  Dawn Xiaodong Song and
                  J. D. Tygar},
  title        = {{SAM:} {A} Flexible and Secure Auction Architecture Using Trusted
                  Hardware},
  booktitle    = {Proceedings of the 15th International Parallel {\&} Distributed
                  Processing Symposium (IPDPS-01), San Francisco, CA, USA, April 23-27,
                  2001},
  pages        = {170},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/IPDPS.2001.925165},
  doi          = {10.1109/IPDPS.2001.925165},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/PerrigSST01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PerrigCST01,
  author       = {Adrian Perrig and
                  Ran Canetti and
                  Dawn Xiaodong Song and
                  J. D. Tygar},
  title        = {Efficient and Secure Source Authentication for Multicast},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2001, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2001},
  url          = {https://www.ndss-symposium.org/ndss2001/efficient-and-secure-source-authentication-multicast/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/PerrigCST01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PerrigST01,
  author       = {Adrian Perrig and
                  Dawn Xiaodong Song and
                  J. D. Tygar},
  title        = {ELK, {A} New Protocol for Efficient Large-Group Key Distribution},
  booktitle    = {2001 {IEEE} Symposium on Security and Privacy, Oakland, California,
                  {USA} May 14-16, 2001},
  pages        = {247--262},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SECPRI.2001.924302},
  doi          = {10.1109/SECPRI.2001.924302},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/PerrigST01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SongWT01,
  author       = {Dawn Xiaodong Song and
                  David A. Wagner and
                  Xuqing Tian},
  editor       = {Dan S. Wallach},
  title        = {Timing Analysis of Keystrokes and Timing Attacks on {SSH}},
  booktitle    = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington,
                  D.C., {USA}},
  publisher    = {{USENIX}},
  year         = {2001},
  url          = {http://www.usenix.org/publications/library/proceedings/sec01/song.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SongWT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseST01,
  author       = {Giuseppe Ateniese and
                  Dawn Song and
                  Gene Tsudik},
  title        = {Quasi-Efficient Revocation of Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseST01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/PerrigS00,
  author       = {Adrian Perrig and
                  Dawn Song},
  title        = {Looking for Diamonds in the Desert - Extending Automatic Protocol
                  Generation to Three-Party Authentication and Key Agreement Protocols},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {64--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856926},
  doi          = {10.1109/CSFW.2000.856926},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/PerrigS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PerrigS00,
  author       = {Adrian Perrig and
                  Dawn Xiaodong Song},
  title        = {A First Step Towards the Automatic Generation of Security Protocols},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2000, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2000},
  url          = {https://www.ndss-symposium.org/ndss2000/first-step-towards-automatic-generation-security-protocols-paper/},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/PerrigS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SongWP00,
  author       = {Dawn Xiaodong Song and
                  David A. Wagner and
                  Adrian Perrig},
  title        = {Practical Techniques for Searches on Encrypted Data},
  booktitle    = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 14-17, 2000},
  pages        = {44--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/SECPRI.2000.848445},
  doi          = {10.1109/SECPRI.2000.848445},
  timestamp    = {Thu, 21 Sep 2023 15:57:29 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SongWP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PerrigCTS00,
  author       = {Adrian Perrig and
                  Ran Canetti and
                  J. D. Tygar and
                  Dawn Xiaodong Song},
  title        = {Efficient Authentication and Signing of Multicast Streams over Lossy
                  Channels},
  booktitle    = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 14-17, 2000},
  pages        = {56--73},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/SECPRI.2000.848446},
  doi          = {10.1109/SECPRI.2000.848446},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/PerrigCTS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Song99,
  author       = {Dawn Xiaodong Song},
  title        = {Athena: {A} New Efficient Automatic Checker for Security Protocol
                  Analysis},
  booktitle    = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} 1999, Mordano, Italy, June 28-30, 1999},
  pages        = {192--202},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSFW.1999.779773},
  doi          = {10.1109/CSFW.1999.779773},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Song99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics