Follow

Dissertations from 2013

PDF

Pose-Tolerant Face Recognition, Ramzi Abi Antoun

PDF

Reliable, Secure, Efficient Physical Unclonable Functions, Mudit Bhargava

PDF

Learning and Recognizing The Hierarchical and Sequential Structure of Human Activities, Heng-Tze Cheng

PDF

Power-Electronics-Enabled Transient Stabilization of Power Systems, Milos Cvetkovic

PDF

Bi-state Control of Microelectromechanical Nonlinear and Parametric Resonance, Congzhong Guo

PDF

Scaling Software Security Analysis to Millions of Malicious Programs and Billions of Lines of Code, Jiyong Jang

PDF

Adaptive Load Management: Multi-Layered And Multi-Temporal Optimization Of The Demand Side In Electric Energy Systems, Jhi-Young Joo

PDF

Automated Diagnosis of Chronic Performance Problems in Production Systems, Soila Kavulya

PDF

Robust, Automated Methods for Filtering and Processing Neural Signals, John W. Kelly

PDF

Communication-Efficient Algorithms For Distributed Optimization, Joao F.C. Mota

PDF

Investigation of electroforming characteristics of TiO2 based resistance switching devices, Mohammad N. Noman

PDF

Multi-Model Heterogeneous Verification of Cyber-Physical Systems, Akshay H. Rajhans

PDF

An Exploration of Mechanisms and Policies for Gateways in Real-Time Embedded Systems, Justin D. Ray

PDF

Diagnosing performance changes in distributed systems by comparing request flows, Raja R. Sambasivan

PDF

Scalable Sensor Network Field Reconstruction with Robust Basis Pursuit, Aurora C. Schmidt

PDF

Input Shaping to Achieve Service Level Objectives in Cloud Computing Environments, Andrew J. Turner

Submissions from 2008

PDF

Analysis-Resistant Malware, John Bethencourt, Dawn Song, and Brent Waters

PDF

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications, David Brumley, Pongsin Poosankam, Dawn Song, and Jiang Zheng

PDF

Would Diversity Really Increase the Robustness of the Routing Infrastructure Against Software Defects?, Juan Caballero, Theocharis Kampouris, Dawn Song, and Jia Wang

PDF

Cell Shape and Patterning Considerations for Magnetic Random Access Memory (MRAM) Fabrication, Robert Ditizio, Paul Werbaneth, Tegal Corporation, and Jian-Gang Zhu

PDF

HookFinder: Identifying and Understanding Malware Hooking Behaviors, Zhenkai Liang, Heng Yin, and Dawn Song

PDF

Limits of Learning-Based Signature Generation with Adversaries, Shobha Venkataraman, Avrim Blum, and Dawn Song

Submissions from 2007

PDF

Provable Data Possession at Untrusted Stores, Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song

PDF

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation, David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, and Dawn Song

PDF

RICH: Automatically Protecting Against Integer-Based Vulnerabilities, David Brumley, Tzi-cker Chiueh, Robert Johnson, Huijia Lin, and Dawn Song

PDF

Creating Vulnerability Signatures Using Weakest Preconditions, David Brumley, Hao Wang, Somesh Somesh, and Dawn Song

PDF

FiG: Automatic Fingerprint Generation, Juan Caballero, Shobha Venkataraman, Pongsin Poosankam, Min G. Kang, Dawn Song, and Avrim Blum

PDF

Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis, Juan Caballero, Heng Yin, Zhenkai Liang, and Dawn Song

PDF

Dynamic Spyware Analysis, Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, and Dawn Song

PDF

Distributed Evasive Scan Techniques and Countermeasures, Min G. Kang, Juan Caballero, and Dawn Song

PDF

Multi-Dimensional Range Query over Encrypted Data, Elaine Shi, John Bethencourt, T-H. H. Chan, Dawn Song, and Adrian Perrig

PDF

Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms, Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, Yuanyuan Zhou, James Newsome, David Brumley, and Dawn Song

PDF

Exploiting Network Structure for Proactive Spam Mitigation, Shoba Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, and Dawn Song

PDF

Panorama: Capturing System-Wide Information Flow for Malware Detection and Analysis, Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, and Engin Kirda

Submissions from 2006

PDF

New Constructions and Practical Applications for Private Stream Searching (Extended Abstract), John Bethencourt, Dawn Song, and Brent Waters

PDF

Towards Automatic Generation of Vulnerability-Based Signatures, David Brumley, James Newsome, Dawn Song, Hao Wang, and Somesh Jha

PDF

Towards Attack-Agnostic Defenses, David Brumley and Dawn Song

PDF

Secure Hierarchical In-Network Aggregation in Sensor Networks, Haowen Chan, Adrian Perrig, and Dawn Song

PDF

Behavioral Distance for Intrusion Detection, Debin Gao, Michael K. Reiter, and Dawn Song

PDF

Behavioral Distance Measurement Using Hidden Markov Models, Debin Gao, Michael K. Reiter, and Dawn Song

PDF

Replayer: Automatic Protocol Replay by Binary Analysis, James Newsome, David Brumley, Jason Franklin, and Dawn Song

PDF

Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software, James Newsome, David Brumley, and Dawn Song

PDF

Paragraph: Thwarting Signature Learning by Training Maliciously, James Newsome, Brad Karp, and Dawn Song

PDF

Black Box Anomaly Detection: is it Utopian?, Shobha Venkataraman, Juan Caballero, Dawn Song, Avrim Blum, and Jennifer Yates

Submissions from 2005

PDF

Semantics-Aware Malware Detection, Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Song, and Randal E. Bryant

PDF

Privacy-Preserving Set Operations, Lea Kissner and Dawn Song

PDF

Polygraph: Automatically Generating Signatures for Polymorphic Worms, James Newsome, Brad Karp, and Dawn Song

PDF

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software, James Newsome and Dawn Song

PDF

FIT: Fast Internet Traceback, Adrian Perrig, Abraham Yaar, and Dawn Song

PDF

New Streaming Algorithms for Fast Detection of Superspreaders, Shoba Venkataraman, Dawn Song, Phillip B. Gibbons, and Avrim Blum

Submissions from 2004

PDF

Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds, Avrim Blum, Dawn Song, and Shobha Venkataraman

PDF

Privtrans: Automatically Partitioning Programs for Privilege Separation, David Brumley and Dawn Song

PDF

Gray-Box Extraction of Execution Graphs for Anomaly Detection, Debin Gao, Michael K. Reiter, and Dawn Song

PDF

On Gray-Box Program Tracking for Anomaly Detection, Debin Gao, Michael K. Reiter, and Dawn Song

PDF

The Sybil Attack in Sensor Networks: Analysis & Defenses, James Newsome, Elaine Shi, Dawn Song, and Adrian Perrig

PDF

SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks, Abraham Yaar, Adrian Perrig, and Dawn Song

Submissions from 2003

PDF

Quasi-Efficient Revocation of Group Signatures, Giuseppe Ateniese, Dawn Song, and Gene Tsudik

PDF

Random Key Predistribution Schemes for Sensor Networks, Haowen Chan, Adrian Perrig, and Dawn Song

PDF

GEM: Graph EMbedding for Routing and Data-Centric Storage in Sensor Networks Without Geographic Information, James Newsome and Dawn Song

PDF

SIA: Secure Information Aggregation in Sensor Networks, Bartosz Przydatek, Dawn Song, and Adrian Perrig

PDF

Pi: A Path Identification Mechanism to Defend Against DDoS Attacks, Abraham Yaar, Adrian Perrig, and Dawn Song

Submissions from 1996

PDF

Orthogonal defect classification applied to a multidisciplinary design, Alex Amezquita and Daniel P. Siewiorek

PDF

Very rapid prototyping of wearable computers : a case study of custom versus off-the-shelf design methodologies, Smailagic

PDF

Cooperation schemes for autonomous agents, Sarosh Talukdar and Carnegie Mellon University.Engineering Design Research Center.

Submissions from 1995

PDF

An experiment in supporting geographically distributed engineering design, Bill Chan and Carnegie Mellon University.Engineering Design Research Center.

PDF

Thermal design of wearable computers : application to the Navigator 2, thermal management devices, and embedded electronics, Egan, Cristina H. Amon, and Carnegie Mellon University.Engineering Design Research Center.