Binhunt: Automatically finding semantic differences in binary programs D Gao, MK Reiter, D Song Information and Communications Security: 10th International Conference …, 2008 | 353 | 2008 |
Gray-box extraction of execution graphs for anomaly detection D Gao, MK Reiter, D Song Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 216 | 2004 |
On gray-box program tracking for anomaly detection D Gao, MK Reiter, D Song Carnegie Mellon University, 2004 | 152 | 2004 |
On challenges in evaluating malware clustering P Li, L Liu, D Gao, MK Reiter Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010 | 148 | 2010 |
iBinHunt: Binary hunting with inter-procedural control flow J Ming, M Pan, D Gao International Conference on Information Security and Cryptology, 92-109, 2012 | 138 | 2012 |
Behavioral distance measurement using hidden markov models D Gao, MK Reiter, D Song Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006 | 138 | 2006 |
Behavioral distance for intrusion detection D Gao, MK Reiter, D Song Recent Advances in Intrusion Detection: 8th International Symposium, RAID …, 2006 | 136 | 2006 |
I can be you: Questioning the use of keystroke dynamics as biometrics CM Tey, P Gupta, D Gao | 104 | 2013 |
Linear obfuscation to combat symbolic execution Z Wang, J Ming, C Jia, D Gao Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011 | 97 | 2011 |
Mitigating access-driven timing channels in clouds using StopWatch P Li, D Gao, MK Reiter 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013 | 75 | 2013 |
Comparing mobile privacy protection through cross-platform applications J Han, Q Yan, D Gao, J Zhou, RH Deng Internet Society, 2013 | 68 | 2013 |
Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance D Gao, MK Reiter, D Song IEEE Transactions on Dependable and Secure Computing 6 (2), 96-110, 2008 | 59 | 2008 |
Stopwatch: a cloud architecture for timing channel mitigation P Li, D Gao, MK Reiter ACM Transactions on Information and System Security (TISSEC) 17 (2), 1-28, 2014 | 56 | 2014 |
Ropsteg: program steganography with return oriented programming K Lu, S Xiong, D Gao Proceedings of the 4th ACM conference on Data and application security and …, 2014 | 50 | 2014 |
Launching return-oriented programming attacks against randomized relocatable executables L Liu, J Han, D Gao, J Jing, D Zha 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 47 | 2011 |
Mobipot: Understanding mobile telephony threats with honeycards M Balduzzi, P Gupta, L Gu, D Gao, M Ahamad Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 42 | 2016 |
Launching generic attacks on ios with approved third-party applications J Han, SM Kywe, Q Yan, F Bao, R Deng, D Gao, Y Li, J Zhou Applied Cryptography and Network Security: 11th International Conference …, 2013 | 35 | 2013 |
On the effectiveness of software diversity: A systematic study on real-world vulnerabilities J Han, D Gao, RH Deng International Conference on Detection of Intrusions and Malware, and …, 2009 | 35 | 2009 |
Software watermarking using return-oriented programming H Ma, K Lu, X Ma, H Zhang, C Jia, D Gao Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 34 | 2015 |
Your love is public now: Questioning the use of personal information in authentication P Gupta, S Gottipati, J Jiang, D Gao Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 31 | 2013 |