Hypervisor support for identifying covertly executing binaries. L Litty, HA Lagar-Cavilla, D Lie USENIX Security Symposium 22, 70, 2008 | 320 | 2008 |
Splitting interfaces: Making trust between applications and operating systems configurable R Ta-Min, L Litty, D Lie Proceedings of the 7th symposium on Operating systems design and …, 2006 | 277 | 2006 |
Manitou: a layer-below approach to fighting malware L Litty, D Lie Proceedings of the 1st workshop on Architectural and system support for …, 2006 | 96 | 2006 |
Using VMM-based sensors to monitor honeypots K Asrigo, L Litty, D Lie Proceedings of the 2nd international conference on Virtual execution …, 2006 | 88 | 2006 |
Simplified simulation models for indoor MANET evaluation are not robust AL Cavilla, G Baron, TE Hart, L Litty, E De Lara 2004 First Annual IEEE Communications Society Conference on Sensor and Ad …, 2004 | 88 | 2004 |
Hypervisor-based intrusion detection L Litty University of Toronto, 2005 | 39 | 2005 |
Computer Meteorology: Monitoring Compute Clouds. L Litty, HA Lagar-Cavilla, D Lie HotOS, 2009 | 23 | 2009 |
On-demand data scan in a virtual machine S Larsen, GA Wolff, O Horovitz, L Litty, M Leventopoulos, J Kiryakoza US Patent App. 13/475,758, 2013 | 12 | 2013 |
Using hypervisors to secure commodity operating systems D Lie, L Litty Proceedings of the fifth ACM workshop on Scalable trusted computing, 11-20, 2010 | 12 | 2010 |
Patch auditing in infrastructure as a service clouds L Litty, D Lie ACM SIGPLAN Notices 46 (7), 145-156, 2011 | 11 | 2011 |
On the Robustness of Simple Indoor MANET Simulation Models. HA Lagar-Cavilla, G Baron, TE Hart, L Litty, E De Lara Ad Hoc Sens. Wirel. Networks 4 (4), 321-354, 2007 | 10 | 2007 |
Scan systems and methods of scanning virtual machines L Litty, S Larsen, GA Wolff, M Leventopoulos, J Kiryakoza US Patent 8,910,161, 2014 | 9 | 2014 |
System and method for communicating production virtual machine access events to a service appliance in a virtualized environment S Larsen, GA Wolff, L Litty, M Leventopoulos, J Kiryakoza US Patent 9,195,518, 2015 | 5 | 2015 |
Architectural Introspection and Applications L Litty University of Toronto, 2010 | 3 | 2010 |
Method and system for preventing tampering with software agent in a virtual machine L Litty, M Leventopoulos, J Schwartz US Patent 9,037,873, 2015 | | 2015 |