Binhunt: Automatically finding semantic differences in binary programs D Gao, MK Reiter, D Song Information and Communications Security: 10th International Conference …, 2008 | 365 | 2008 |
Gray-box extraction of execution graphs for anomaly detection D Gao, MK Reiter, D Song Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 218 | 2004 |
On gray-box program tracking for anomaly detection D Gao, MK Reiter, D Song Carnegie Mellon University, 2004 | 151 | 2004 |
On challenges in evaluating malware clustering P Li, L Liu, D Gao, MK Reiter Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010 | 149 | 2010 |
iBinHunt: Binary hunting with inter-procedural control flow J Ming, M Pan, D Gao International Conference on Information Security and Cryptology, 92-109, 2012 | 147 | 2012 |
Behavioral distance measurement using hidden markov models D Gao, MK Reiter, D Song Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006 | 139 | 2006 |
Behavioral distance for intrusion detection D Gao, MK Reiter, D Song Recent Advances in Intrusion Detection: 8th International Symposium, RAID …, 2006 | 136 | 2006 |
I can be you: Questioning the use of keystroke dynamics as biometrics CM Tey, P Gupta, D Gao | 105 | 2013 |
Linear obfuscation to combat symbolic execution Z Wang, J Ming, C Jia, D Gao Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011 | 96 | 2011 |
Comparing mobile privacy protection through cross-platform applications J Han, Q Yan, D Gao, J Zhou, RH Deng Internet Society, 2013 | 73 | 2013 |
Mitigating access-driven timing channels in clouds using StopWatch P Li, D Gao, MK Reiter 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013 | 72 | 2013 |
Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance D Gao, MK Reiter, D Song IEEE Transactions on Dependable and Secure Computing 6 (2), 96-110, 2008 | 61 | 2008 |
Stopwatch: a cloud architecture for timing channel mitigation P Li, D Gao, MK Reiter ACM Transactions on Information and System Security (TISSEC) 17 (2), 1-28, 2014 | 57 | 2014 |
Ropsteg: program steganography with return oriented programming K Lu, S Xiong, D Gao Proceedings of the 4th ACM conference on Data and application security and …, 2014 | 51 | 2014 |
Launching return-oriented programming attacks against randomized relocatable executables L Liu, J Han, D Gao, J Jing, D Zha 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 50 | 2011 |
Mobipot: Understanding mobile telephony threats with honeycards M Balduzzi, P Gupta, L Gu, D Gao, M Ahamad Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 42 | 2016 |
On the effectiveness of software diversity: A systematic study on real-world vulnerabilities J Han, D Gao, RH Deng International Conference on Detection of Intrusions and Malware, and …, 2009 | 37 | 2009 |
Launching generic attacks on ios with approved third-party applications J Han, SM Kywe, Q Yan, F Bao, R Deng, D Gao, Y Li, J Zhou Applied Cryptography and Network Security: 11th International Conference …, 2013 | 35 | 2013 |
Software watermarking using return-oriented programming H Ma, K Lu, X Ma, H Zhang, C Jia, D Gao Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 34 | 2015 |
Understanding open ports in Android applications: Discovery, diagnosis, and security assessment D Wu, D Gao, RKC Chang, E He, EKT Cheng, RH Deng Internet Society, 2019 | 33 | 2019 |