Binhunt: Automatically finding semantic differences in binary programs D Gao, MK Reiter, D Song International Conference on Information and Communications Security, 238-255, 2008 | 288 | 2008 |
Gray-box extraction of execution graphs for anomaly detection D Gao, MK Reiter, D Song Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 203 | 2004 |
On gray-box program tracking for anomaly detection D Gao, MK Reiter, D Song Department of Electrical and Computing Engineering, 24, 2004 | 144 | 2004 |
On challenges in evaluating malware clustering P Li, L Liu, D Gao, MK Reiter International Workshop on Recent Advances in Intrusion Detection, 238-255, 2010 | 138 | 2010 |
Behavioral distance for intrusion detection D Gao, MK Reiter, D Song International Workshop on Recent Advances in Intrusion Detection, 63-81, 2005 | 132 | 2005 |
Behavioral distance measurement using hidden markov models D Gao, MK Reiter, D Song International Workshop on Recent Advances in Intrusion Detection, 19-40, 2006 | 130 | 2006 |
iBinHunt: Binary hunting with inter-procedural control flow J Ming, M Pan, D Gao International Conference on Information Security and Cryptology, 92-109, 2012 | 110 | 2012 |
I can be you: Questioning the use of keystroke dynamics as biometrics CM Tey, P Gupta, D Gao | 87 | 2013 |
Linear obfuscation to combat symbolic execution Z Wang, J Ming, C Jia, D Gao European Symposium on Research in Computer Security, 210-226, 2011 | 80 | 2011 |
Mitigating access-driven timing channels in clouds using StopWatch P Li, D Gao, MK Reiter 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013 | 70 | 2013 |
Comparing mobile privacy protection through cross-platform applications J Han, Q Yan, D Gao, J Zhou, RH Deng Internet Society, 2013 | 61 | 2013 |
Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance D Gao, MK Reiter, D Song IEEE Transactions on Dependable and Secure Computing 6 (2), 96-110, 2008 | 53 | 2008 |
Stopwatch: a cloud architecture for timing channel mitigation P Li, D Gao, MK Reiter ACM Transactions on Information and System Security (TISSEC) 17 (2), 1-28, 2014 | 46 | 2014 |
Launching return-oriented programming attacks against randomized relocatable executables L Liu, J Han, D Gao, J Jing, D Zha 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 45 | 2011 |
Ropsteg: program steganography with return oriented programming K Lu, S Xiong, D Gao Proceedings of the 4th ACM conference on Data and application security and …, 2014 | 40 | 2014 |
Mobipot: Understanding mobile telephony threats with honeycards M Balduzzi, P Gupta, L Gu, D Gao, M Ahamad Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 35 | 2016 |
Launching generic attacks on ios with approved third-party applications J Han, SM Kywe, Q Yan, F Bao, R Deng, D Gao, Y Li, J Zhou International Conference on Applied Cryptography and Network Security, 272-289, 2013 | 33 | 2013 |
Software watermarking using return-oriented programming H Ma, K Lu, X Ma, H Zhang, C Jia, D Gao Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 31 | 2015 |
Fighting coercion attacks in key generation using skin conductance P Gupta, D Gao 19th USENIX Security Symposium (USENIX Security 10), 2010 | 30 | 2010 |
On the effectiveness of software diversity: A systematic study on real-world vulnerabilities J Han, D Gao, RH Deng International Conference on Detection of Intrusions and Malware, and …, 2009 | 30 | 2009 |