Follow
David Lie
Title
Cited by
Cited by
Year
Architectural Support for Copy and Tamper Resistant Software
D Lie, C Thekkath, P Lincoln, M Mitchell, D Boneh, J Mitchell, M Horowitz
ACM SIGOPS Operating Systems Review 34 (5), 168--177, 2000
10532000
Pscout: analyzing the android permission specification
KWY Au, YF Zhou, Z Huang, D Lie
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
10052012
Prochlo: Strong privacy for analytics in the crowd
A Bittau, Ú Erlingsson, P Maniatis, I Mironov, A Raghunathan, D Lie, ...
Proceedings of the 26th symposium on operating systems principles, 441-459, 2017
3942017
Hypervisor support for identifying covertly executing binaries.
L Litty, HA Lagar-Cavilla, D Lie
USENIX Security Symposium 22, 70, 2008
3182008
Machine unlearning
L Bourtoule, V Chandrasekaran, CA Choquette-Choo, H Jia, A Travers, ...
2021 IEEE Symposium on Security and Privacy (SP), 141-159, 2021
3062021
Implementing an untrusted operating system on trusted hardware
D Lie, CA Thekkath, M Horowitz
Proceedings of the nineteenth ACM symposium on Operating systems principles …, 2003
3012003
Intellidroid: a targeted input generator for the dynamic analysis of android malware.
MY Wong, D Lie
NDSS 16 (2016), 21-24, 2016
2832016
Splitting interfaces: Making trust between applications and operating systems configurable
R Ta-Min, L Litty, D Lie
Proceedings of the 7th symposium on Operating systems design and …, 2006
2712006
Specifying and verifying hardware for tamper-resistant software
D Lie, J Mitchell, CA Thekkath, M Horowitz
2003 Symposium on Security and Privacy, 2003., 166-177, 2003
1532003
A buffer overflow benchmark for software model checkers
K Ku, TE Hart, M Chechik, D Lie
Proceedings of the 22nd IEEE/ACM International Conference on Automated …, 2007
1092007
Short paper: a look at smartphone permission models
KWY Au, YF Zhou, Z Huang, P Gill, D Lie
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
1062011
The state of public infrastructure-as-a-service cloud security
W Huang, A Ganjali, BH Kim, S Oh, D Lie
ACM Computing Surveys (CSUR) 47 (4), 1-31, 2015
982015
Dude, Where's That {IP}? Circumventing Measurement-based {IP} Geolocation
P Gill, Y Ganjali, B Wong
19th USENIX Security Symposium (USENIX Security 10), 2010
972010
Manitou: a layer-below approach to fighting malware
L Litty, D Lie
Proceedings of the 1st workshop on Architectural and system support for …, 2006
962006
Susceptibility of commodity systems and software to memory soft errors
A Messer, P Bernadat, G Fu, D Chen, Z Dimitrijevic, D Lie, DD Mannaru, ...
IEEE transactions on Computers 53 (12), 1557-1568, 2004
902004
Using VMM-based sensors to monitor honeypots
K Asrigo, L Litty, D Lie
Proceedings of the 2nd international conference on Virtual execution …, 2006
872006
Kivati: fast detection and prevention of atomicity violations
L Chew, D Lie
Proceedings of the 5th European conference on Computer systems, 307-320, 2010
842010
Openflow timeouts demystified
A Zarek, Y Ganjali, D Lie
Univ. of Toronto, Toronto, Ontario, Canada, 2012
772012
Tackling runtime-based obfuscation in android with {TIRO}
MY Wong, D Lie
27th USENIX security symposium (USENIX security 18), 1247-1262, 2018
662018
A simple method for extracting models for protocol code
D Lie, A Chou, D Engler, DL Dill
Proceedings of the 28th Annual International Symposium on Computer …, 2001
642001
The system can't perform the operation now. Try again later.
Articles 1–20