Dawn Song
Affiliations: | Electrical Engineering and Computer Science | University of California, Berkeley, Berkeley, CA, United States |
Area:
Operating Systems & Networking (OSNT); Security (SEC); Programming Systems (PS)Google:
"Dawn Song"Children
Sign in to add traineeJohn D. Bethencourt | grad student | 2011 | UC Berkeley |
Steven C. Hanna | grad student | 2012 | UC Berkeley |
Prateek Saxena | grad student | 2012 | UC Berkeley |
Chia Y. Cho | grad student | 2013 | UC Berkeley |
Devdatta M. Akhawe | grad student | 2014 | UC Berkeley |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Shi E, Chan T-H, Rieffel E, et al. (2017) Distributed Private Data Analysis: Lower Bounds and Practical Constructions Acm Transactions On Algorithms. 13: 50 |
Frank M, Biedert R, Ma E, et al. (2013) Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication Ieee Transactions On Information Forensics and Security. 8: 136-148 |
Caballero J, Song D. (2013) Automatic protocol reverse-engineering: Message format extraction and field semantics inference Computer Networks. 57: 451-474 |
Barth A, Rubinstein BIP, Sundararajan M, et al. (2012) A Learning-based approach to reactive security Ieee Transactions On Dependable and Secure Computing. 9: 482-493 |
Song D, Shi E, Fischer I, et al. (2012) Cloud data protection for the masses Computer. 45: 39-45 |
Chan T-H, Shi E, Song D. (2011) Private and Continual Release of Statistics Acm Transactions On Information and System Security. 14: 26 |
Ateniese G, Burns R, Curtmola R, et al. (2011) Remote data checking using provable data possession Acm Transactions On Information and System Security. 14 |
Zhu D(, Jung J, Song D, et al. (2011) TaintEraser Acm Sigops Operating Systems Review. 45: 142-154 |
Bethencourt J, Shi E, Song D. (2010) Signatures of Reputation Lecture Notes in Computer Science. 6052: 400 |
Bethencourt J, Song D, Waters B. (2009) New Techniques for Private Stream Searching Acm Transactions On Information and System Security. 12: 16 |